Information Communication Technologies

This deliverable presents a survey of research works and data collection initiatives in the areas of malware detection and analysis and on- line fraud.

[1]  Lluís Màrquez i Villodre,et al.  SVMTool: A general POS Tagger Generator Based on Support Vector Machines , 2004, LREC.

[2]  Yi Zhang,et al.  Integrating non-blocking synchronisation in parallel applications: performance advantages and methodologies , 2002, WOSP '02.

[3]  H. T. Mouftah,et al.  Secure multipath routing for AMI network in Smart Grid , 2012, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC).

[4]  Georgios Kalogridis,et al.  Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[5]  Hamid Sharif,et al.  A Secure Data Aggregation and Dispatch Scheme for Home Area Networks in Smart Grid , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[6]  Adrian Perrig,et al.  SNAPP: stateless network-authenticated path pinning , 2008, ASIACCS '08.

[7]  Heng Yin,et al.  Renovo: a hidden code extractor for packed executables , 2007, WORM '07.

[8]  Galen C. Hunt,et al.  Detours: binary interception of Win32 functions , 1999 .

[9]  Max Mühlhäuser,et al.  Analysis of privacy-enhancing protocols based on anonymity networks , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[10]  Robert S. Gray,et al.  Using sensor networks and data fusion for early detection of active worms , 2003, SPIE Defense + Commercial Sensing.

[11]  Oliver Kramer,et al.  Power Prediction in Smart Grids with Evolutionary Local Kernel Regression , 2010, HAIS.

[12]  Divyakant Agrawal,et al.  Detectives: detecting coalition hit inflation attacks in advertising networks streams , 2007, WWW '07.

[13]  Christopher Krügel,et al.  A solution for the automated detection of clickjacking attacks , 2010, ASIACCS '10.

[14]  Zhuoqing Morley Mao,et al.  Automated Classification and Analysis of Internet Malware , 2007, RAID.

[15]  Farnam Jahanian,et al.  Shedding Light on the Configuration of Dark Addresses , 2007, NDSS.

[16]  Robert Tappan Morris,et al.  a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.

[17]  James S. Thorp,et al.  Synchronized Phasor Measurement Applications in Power Systems , 2010, IEEE Transactions on Smart Grid.

[18]  Yong Guan,et al.  Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[19]  Xiaowei Yang,et al.  A DoS-limiting network architecture , 2005, SIGCOMM '05.

[20]  V. Venkatasubramanian,et al.  New Wide-Area Algorithms for Detection and Mitigation of Angle Instability using Synchrophasors , 2007, 2007 IEEE Power Engineering Society General Meeting.

[21]  Chris Kanich,et al.  Spamcraft: An Inside Look At Spam Campaign Orchestration , 2009, LEET.

[22]  Xin Zhao,et al.  The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution , 2010, LEET.

[23]  Clark Hochgraf,et al.  Smart Grid Charger for Electric Vehicles Using Existing Cellular Networks and SMS Text Messages , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[24]  Marcus A. Maloof,et al.  Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..

[25]  Stephen McCamant,et al.  DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.

[26]  Robert Tappan Morris,et al.  ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.

[27]  Suresh Singh,et al.  An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.

[28]  Dmitry Podkuiko,et al.  Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.

[29]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[30]  Andrew Warfield,et al.  Practical taint-based protection using demand emulation , 2006, EuroSys.

[31]  A. Perrig,et al.  Secure and Efficient Capability-Based Power Management in the Smart Grid , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.

[32]  A. Muzet Environmental noise, sleep and health. , 2007, Sleep medicine reviews.

[33]  Nir Kshetri,et al.  The Economics of Click Fraud , 2010, IEEE Secur. Priv..

[34]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[35]  Hamid Sharif,et al.  A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[36]  Yasusi Sinohara,et al.  Virtual energy demand data: Estimating energy load and protecting consumers' privacy , 2011, ISGT 2011.

[37]  Marek Jawurek,et al.  Smart metering de-pseudonymization , 2011, ACSAC '11.

[38]  Sotiris Ioannidis,et al.  D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks , 2010, ESORICS.

[39]  Marco Bindi,et al.  Air temperature-related human health outcomes: current impact and estimations of future risks in Central Italy. , 2012, The Science of the total environment.

[40]  David Brumley,et al.  All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.

[41]  Adrian Perrig,et al.  The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.

[42]  Jun Hu,et al.  Detecting and characterizing social spam campaigns , 2010, CCS '10.

[43]  Niels Provos,et al.  Data reduction for the scalable automated analysis of distributed darknet traffic , 2005, IMC '05.

[44]  João Gama,et al.  Stream-Based Electricity Load Forecast , 2007, PKDD.

[45]  Guanhua Yan,et al.  SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection , 2009, RAID.

[46]  Yogesh L. Simmhan,et al.  An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[47]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[48]  Guofei Gu,et al.  BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.

[49]  Eylem Ekici,et al.  A multicast routing algorithm for LEO satellite IP networks , 2002, TNET.

[50]  Cédric Augonnet,et al.  PEPPHER: Efficient and Productive Usage of Hybrid Computing Systems , 2011, IEEE Micro.

[51]  George Danezis,et al.  Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.

[52]  Alessandro Barenghi,et al.  Smart metering in power grids: Application scenarios and security , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.

[53]  Xuxian Jiang,et al.  Billing Attacks on SIP-Based VoIP Systems , 2007, WOOT.

[54]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[55]  Yih-Chun Hu,et al.  SPV: secure path vector routing for securing BGP , 2004, SIGCOMM 2004.

[56]  Thorsten Holz,et al.  As the net churns: Fast-flux botnet observations , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).

[57]  Vinod Yegneswaran,et al.  On the Design and Use of Internet Sinks for Network Abuse Monitoring , 2004, RAID.

[58]  Somesh Jha,et al.  FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution , 2013, USENIX Security Symposium.

[59]  Janaka Ekanayake,et al.  Demand side primary frequency response support through smart meter control , 2009, 2009 44th International Universities Power Engineering Conference (UPEC).

[60]  Dawn Xiaodong Song,et al.  SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[61]  Robert C. Green,et al.  Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid , 2011, 2011 IEEE Power and Energy Society General Meeting.

[62]  Stefano Zanero,et al.  A social-engineering-centric data collection initiative to study phishing , 2011, BADGERS '11.

[63]  Niels Provos,et al.  A Hybrid Honeypot Architecture for Scalable Network Monitoring , 2004 .

[64]  Peder Wolkoff,et al.  The dichotomy of relative humidity on indoor air quality. , 2007, Environment international.

[65]  H. Aung,et al.  Fine particulate matter from urban ambient and wildfire sources from California's San Joaquin Valley initiate differential inflammatory, oxidative stress, and xenobiotic responses in human bronchial epithelial cells. , 2011, Toxicology in vitro : an international journal published in association with BIBRA.

[66]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[67]  Philippas Tsigas,et al.  GPU-Quicksort: A practical Quicksort algorithm for graphics processors , 2010, JEAL.

[68]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM 2002.

[69]  João Gama,et al.  Hierarchical Clustering of Time-Series Data Streams , 2008, IEEE Transactions on Knowledge and Data Engineering.

[70]  Yang Xiao,et al.  A survey of communication/networking in Smart Grids , 2012, Future Gener. Comput. Syst..

[71]  James Newsome,et al.  Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.

[72]  Stephen T. Kent,et al.  Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.

[73]  Philip Koopman,et al.  Low cost multicast authentication via validity voting in time-triggered embedded control networks , 2010, WESS '10.

[74]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[75]  Felix C. Freiling,et al.  Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.

[76]  Bobji Mungamuru,et al.  Competition and Fraud in Online Advertising Markets , 2008, Financial Cryptography.

[77]  Herbert Bos,et al.  Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.

[78]  Steven B. Wicker,et al.  Decreased time delay and security enhancement recommendations for AMI smart meter networks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).

[79]  Hristo Bojinov,et al.  Embedded management interfaces emerging massive insecurity , 2009 .

[80]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[81]  Eric Chien,et al.  W32.Duqu: The Precursor to the Next Stuxnet , 2012, LEET.

[82]  John R. Williams,et al.  Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining , 2012, PAISI.

[83]  Christof Paar,et al.  All You Can Eat or Breaking a Real-World Contactless Payment System , 2010, Financial Cryptography.

[84]  Minaxi Gupta,et al.  Behind Phishing: An Examination of Phisher Modi Operandi , 2008, LEET.

[85]  Y. Amitai,et al.  Neuropsychological impairment from acute low-level exposure to carbon monoxide. , 1998, Archives of neurology.

[86]  Carsten Willems,et al.  Learning and Classification of Malware Behavior , 2008, DIMVA.

[87]  Xiaoqian Jiang,et al.  A Randomized Response Model for Privacy Preserving Smart Metering , 2012, IEEE Transactions on Smart Grid.

[88]  Philippas Tsigas,et al.  Understanding the Performance of Concurrent Data Structures on Graphics Processors , 2012, Euro-Par.

[89]  Vern Paxson,et al.  Proceedings of the 13th USENIX Security Symposium , 2022 .

[90]  Christoph Sorge,et al.  A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.

[91]  Alfonso Valdes,et al.  Intrusion Monitoring in Process Control Systems , 2009 .

[92]  Mathias Uslar,et al.  Survey of Smart Grid standardization studies and recommendations — Part 2 , 2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe).

[93]  Ernest Foo,et al.  Gap analysis of intrusion detection in smart grids , 2011 .

[94]  Christopher Krügel,et al.  The Underground Economy of Fake Antivirus Software , 2011, WEIS.

[95]  Ying Xing,et al.  The Design of the Borealis Stream Processing Engine , 2005, CIDR.

[96]  George Candea,et al.  The S2E Platform: Design, Implementation, and Applications , 2012, TOCS.

[97]  David E. Culler,et al.  Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.

[98]  Nick Feamster,et al.  Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.

[99]  Vern Paxson,et al.  On the Potential of Proactive Domain Blacklisting , 2010, LEET.

[100]  V. O. K. Li,et al.  On Wireless Sensors Communication for Overhead Transmission Line Monitoring in Power Delivery Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[101]  Bilal Erman Bilgin,et al.  Performance evaluations of ZigBee in different smart grid environments , 2012, Comput. Networks.

[102]  Leyla Bilge,et al.  EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.

[103]  George Candea,et al.  Testing Closed-Source Binary Device Drivers with DDT , 2010, USENIX Annual Technical Conference.

[104]  Marina Papatriantafilou,et al.  Off the Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service Attacks , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.

[105]  Christopher Krügel,et al.  Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.

[106]  Christopher Krügel,et al.  Detecting System Emulators , 2007, ISC.

[107]  Steven Myers,et al.  The Nuts and Bolts of a Forum Spam Automator , 2011, LEET.

[108]  Dawn Xiaodong Song,et al.  Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[109]  Joseph Bonneau,et al.  What's in a Name? , 2020, Financial Cryptography.

[110]  William H. Sanders,et al.  AMI threats, intrusion detection requirements and deployment recommendations , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[111]  William H. Sanders,et al.  Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[112]  Zhe Chen,et al.  Cognitive Radio Network for the Smart Grid: Experimental System Architecture, Control Algorithms, Security, and Microgrid Testbed , 2011, IEEE Transactions on Smart Grid.

[113]  Philippe Bonnet,et al.  Towards Sensor Database Systems , 2001, Mobile Data Management.

[114]  Georgios Kalogridis,et al.  ElecPrivacy: Evaluating the Privacy Protection of Electricity Management Algorithms , 2011, IEEE Transactions on Smart Grid.

[115]  Frederic T. Chong,et al.  Minos: Architectural support for protecting control data , 2006, TACO.

[116]  Markus Jakobsson,et al.  Badvertisements: Stealthy Click-Fraud with Unwitting Accessories , 2006, J. Digit. Forensic Pract..

[117]  Geoff Hulten,et al.  Mining high-speed data streams , 2000, KDD '00.

[118]  Philip Levis,et al.  Four-Bit Wireless Link Estimation , 2007, HotNets.

[119]  Xinghuo Yu,et al.  Semi-supervised classification of characterized patterns for demand forecasting using smart electricity meters , 2011, 2011 International Conference on Electrical Machines and Systems.

[120]  Chen-Ching Liu,et al.  Cyber-power system security in a smart grid environment , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).

[121]  I-Tai Lu,et al.  Cognitive Radio Based Wireless Sensor Network architecture for smart grid utility , 2011, 2011 IEEE Long Island Systems, Applications and Technology Conference.

[122]  Patrick Traynor,et al.  PinDr0p: using single-ended audio features to determine call provenance , 2010, CCS '10.

[123]  J. Veitch Psychological Processes Influencing Lighting Quality , 2001 .

[124]  Wenye Wang,et al.  Review and evaluation of security threats on the communication networks in the smart grid , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[125]  Geoff Hulten,et al.  Mining time-changing data streams , 2001, KDD '01.

[126]  Chris Kanich,et al.  Botnet Judo: Fighting Spam with Itself , 2010, NDSS.

[127]  Evangelos Kranakis,et al.  DNS-based Detection of Scanning Worms in an Enterprise Network , 2005, NDSS.

[128]  Tim Kraska,et al.  Stormy: an elastic and highly available streaming service in the cloud , 2012, EDBT-ICDT '12.

[129]  Xu Chen,et al.  Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).

[130]  Ing-Ray Chen,et al.  Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.

[131]  Brian Rexroad,et al.  Wide-Scale Botnet Detection and Characterization , 2007, HotBots.

[132]  Giovanni Vigna,et al.  Intrusion detection: a brief history and overview , 2002 .

[133]  William Kersting,et al.  Distribution System Modeling and Analysis , 2001, Electric Power Generation, Transmission, and Distribution: The Electric Power Engineering Handbook.

[134]  Dawn Xiaodong Song,et al.  Insights from the Inside: A View of Botnet Management from Infiltration , 2010, LEET.

[135]  Dogan Kesdogan,et al.  GridPriv: A Smart Metering Architecture Offering k-Anonymity , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[136]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[137]  Xuxian Jiang,et al.  Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.

[138]  Farnam Jahanian,et al.  The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.

[139]  Ian F. Akyildiz,et al.  A survey on wireless mesh networks , 2005, IEEE Communications Magazine.

[140]  Anna Scaglione,et al.  Power Line Communications and the Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[141]  Thorsten Holz,et al.  NoSEBrEaK - attacking honeynets , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[142]  Husheng Li,et al.  Compressed Meter Reading for Delay-Sensitive and Secure Load Report in Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[143]  Carlos E. Pedreira,et al.  Neural networks for short-term load forecasting: a review and evaluation , 2001 .

[144]  Michael Vrable,et al.  Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.

[145]  H Markiewicz,et al.  Voltage Disturbances Standard EN 50160 - Voltage Characteristics in Public Distribution Systems , 2008 .

[146]  Hamid Sharif,et al.  A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.

[147]  Christoph Sorge,et al.  Do not snoop my habits: preserving privacy in the smart grid , 2012, IEEE Communications Magazine.

[148]  Olivier Bonaventure,et al.  The HoneyTank: a scalable approach to collect malicious internet traffic , 2008, Int. J. Crit. Infrastructures.

[149]  Vinod Yegneswaran,et al.  BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.

[150]  Kun-Lung Wu,et al.  Elastic scaling of data parallel operators in stream processing , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[151]  Jeffrey Carr,et al.  Inside Cyber Warfare: Mapping the Cyber Underworld , 2009 .

[152]  Xuxian Jiang,et al.  Collapsar: A VM-Based Architecture for Network Attack Detention Center , 2004, USENIX Security Symposium.

[153]  Engin Kirda,et al.  A View on Current Malware Behaviors , 2009, LEET.

[154]  Xudong Wang,et al.  Security Framework for Wireless Communications in Smart Distribution Grid , 2011, IEEE Transactions on Smart Grid.

[155]  Choong Seon Hong,et al.  A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network , 2008, ICCSA.

[156]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[157]  Victor O. K. Li,et al.  Satellite-based Internet: a tutorial , 2001, IEEE Commun. Mag..

[158]  Angelos D. Keromytis,et al.  Detecting Targeted Attacks Using Shadow Honeypots , 2005, USENIX Security Symposium.

[159]  George Candea,et al.  Reverse engineering of binary device drivers with RevNIC , 2010, EuroSys '10.

[160]  Mathias Uslar,et al.  Survey of Smart Grid Standardization Studies and Recommendations , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[161]  J. Giri,et al.  Wanted: A more intelligent grid , 2009, IEEE Power and Energy Magazine.

[162]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[163]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[164]  Jerry R. Hobbs,et al.  An algebraic approach to IP traceback , 2002, TSEC.

[165]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[166]  Federico Maggi Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[167]  Gianluca Stringhini,et al.  The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns , 2011, LEET.

[168]  Lorenzo Martignoni,et al.  A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.

[169]  Min Gyung Kang,et al.  Emulating emulation-resistant malware , 2009, VMSec '09.

[170]  Zhou Peng,et al.  Applications of McWiLL broadband multimedia trunk communication technology in Smart Grid , 2010, 2010 International Conference on Optics, Photonics and Energy Engineering (OPEE).

[171]  Yacine Challal,et al.  A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.

[172]  S. Shankar Sastry,et al.  Research Challenges for the Security of Control Systems , 2008, HotSec.

[173]  Sachin Katti,et al.  Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM 2007.

[174]  Patrice Godefroid,et al.  Automated Whitebox Fuzz Testing , 2008, NDSS.

[175]  Marco Zuniga,et al.  JamLab: Augmenting sensornet testbeds with realistic and controlled interference generation , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.

[176]  Aiko Pras,et al.  Intrusion Detection in SCADA Networks , 2010, AIMS.

[177]  Thorsten Holz,et al.  Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.

[178]  Xiaowei Wang,et al.  Performance of chirp spread spectrum in wireless communication systems , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.

[179]  Jens-Tobias Zerbst,et al.  Zone principles as Cyber Security architecture element for Smart Grids , 2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe).

[180]  Thorsten Holz,et al.  A Pointillist Approach for Comparing Honeypots , 2005, DIMVA.

[181]  Yi Xu,et al.  A survey on the communication architectures in smart grid , 2011, Comput. Networks.

[182]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[183]  Philip Levis,et al.  The κ factor: inferring protocol performance using inter-link reception correlation , 2010, MobiCom.

[184]  Salvatore J. Stolfo,et al.  Defending Embedded Systems with Software Symbiotes , 2011, RAID.

[185]  Eric Li,et al.  Optimization of Frequent Itemset Mining on Multiple-Core Processor , 2007, VLDB.

[186]  João Gama,et al.  A system for analysis and prediction of electricity-load streams , 2009, Intell. Data Anal..

[187]  Michael Stonebraker,et al.  The 8 requirements of real-time stream processing , 2005, SGMD.

[188]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[189]  Christian Platzer,et al.  Covertly Probing Underground Economy Marketplaces , 2010, DIMVA.

[190]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[191]  Vern Paxson,et al.  What's Clicking What? Techniques and Innovations of Today's Clickbots , 2011, DIMVA.

[192]  J.A. Gutierrez,et al.  IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks , 2001, IEEE Network.

[193]  Bastian Schlich,et al.  Model checking of software for microcontrollers , 2010, TECS.

[194]  Christopher Krügel,et al.  Efficient Detection of Split Personalities in Malware , 2010, NDSS.

[195]  Alex A. Freitas,et al.  A Survey of Parallel Data Mining , 1996 .

[196]  Sumeet Singh,et al.  The EarlyBird System for Real-time Detection of Unknown Worms , 2005 .

[197]  Frank C. Lambert,et al.  A survey on communication networks for electric system automation , 2006, Comput. Networks.

[198]  Evangelos P. Markatos,et al.  A Systematic Characterization of IM Threats using Honeypots , 2010, NDSS.

[199]  Marc Dacier,et al.  ScriptGen: an automated script generation tool for Honeyd , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[200]  Angelos D. Keromytis,et al.  A Dynamic Mechanism for Recovering from Buffer Overflow Attacks , 2005, ISC.

[201]  Niels Provos,et al.  A Virtual Honeypot Framework , 2004, USENIX Security Symposium.

[202]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[203]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[204]  Crispan Cowan,et al.  StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.

[205]  Chris Kanich,et al.  On the Spam Campaign Trail , 2008, LEET.

[206]  A. Blakeborough,et al.  Vibration Perception and Comfort Levels for an Audience Occupying a Grandstand with Perceivable Motion , 2009 .

[207]  Gildas Avoine Fraud Within Asymmetric Multi-hop Cellular Networks , 2005, Financial Cryptography.

[208]  Ulf Lindqvist,et al.  Using Model-based Intrusion Detection for SCADA Networks , 2006 .

[209]  Simin Nadjm-Tehrani,et al.  Embedded Cyber-Physical Anomaly Detection in Smart Meters , 2012, CRITIS.

[210]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[211]  Y. Simmhan,et al.  Towards Reliable, Performant Workflows for Streaming-Applications on Cloud Platforms , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[212]  Vinod Yegneswaran,et al.  Characteristics of internet background radiation , 2004, IMC '04.

[213]  Christopher Krügel,et al.  Scalable, Behavior-Based Malware Clustering , 2009, NDSS.

[214]  Philip Levis,et al.  The β-factor: measuring wireless link burstiness , 2008, SenSys '08.

[215]  Michael Stonebraker,et al.  Aurora: a new model and architecture for data stream management , 2003, The VLDB Journal.

[216]  David G. Andersen,et al.  Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .

[217]  Christopher Krügel,et al.  Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.

[218]  Rajat Raina,et al.  Large-scale deep unsupervised learning using graphics processors , 2009, ICML '09.

[219]  Claudio A. Canizares,et al.  Distribution System Voltage Regulation and Var Compensation for Different Static Load Models , 2000 .

[220]  Yi Zhang,et al.  Evaluating the performance of non-blocking synchronization on shared-memory multiprocessors , 2001, SIGMETRICS '01.

[221]  Nada Golmie,et al.  A Methodology to Evaluate Wireless Technologies for the Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[222]  Dawn Xiaodong Song,et al.  New Streaming Algorithms for Fast Detection of Superspreaders , 2005, NDSS.

[223]  Philip Levis,et al.  Collection tree protocol , 2009, SenSys '09.

[224]  Euhanna Ghadimi,et al.  Low power, low delay: Opportunistic routing meets duty cycling , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).

[225]  Dawson R. Engler,et al.  KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.

[226]  Sanjam Garg,et al.  Unified Architecture for Large-Scale Attested Metering , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[227]  Jon Crowcroft,et al.  Honeycomb , 2004, Comput. Commun. Rev..

[228]  Robert Roach,et al.  Acute mountain sickness: pathophysiology, prevention, and treatment. , 2010, Progress in cardiovascular diseases.

[229]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[230]  Marina Papatriantafilou,et al.  NBmalloc: Allocating Memory in a Lock-Free Manner , 2008, Algorithmica.

[231]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[232]  Michael K. Reiter,et al.  Traffic Aggregation for Malware Detection , 2008, DIMVA.

[233]  Dong Wei,et al.  Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.

[234]  Wei Hong,et al.  Beyond Average: Toward Sophisticated Sensing with Queries , 2003, IPSN.

[235]  Yogesh L. Simmhan,et al.  Adaptive rate stream processing for smart grid applications on clouds , 2011, ScienceCloud '11.

[236]  George Danezis,et al.  Privacy-preserving smart metering , 2011, ISSE.

[237]  K J Biba,et al.  Integrity Considerations for Secure Computer Systems , 1977 .

[238]  N. Theethayi,et al.  Channel Characterization for Indoor Power-Line Networks , 2009, IEEE Transactions on Power Delivery.

[239]  Guofei Gu,et al.  HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.

[240]  Stephen McCamant,et al.  Differential Slicing: Identifying Causal Execution Differences for Security Applications , 2011, 2011 IEEE Symposium on Security and Privacy.

[241]  V. Madani,et al.  Online dimension reduction of synchrophasor data , 2012, PES T&D 2012.

[242]  Young-Jin Kim,et al.  A secure decentralized data-centric information infrastructure for smart grid , 2010, IEEE Communications Magazine.

[243]  Catherine J Karr,et al.  Infant exposure to fine particulate matter and traffic and risk of hospitalization for RSV bronchiolitis in a region with lower ambient air pollution. , 2009, Environmental research.

[244]  Sanjay Kumar Jena,et al.  A survey on secure hierarchical routing protocols in wireless sensor networks , 2011, ICCCS '11.

[245]  Jörg Widmer,et al.  In-network aggregation techniques for wireless sensor networks: a survey , 2007, IEEE Wireless Communications.

[246]  Srinivasan Seshan,et al.  Synopsis diffusion for robust aggregation in sensor networks , 2004, SenSys '04.

[247]  Arun G. Phadke,et al.  Fast on-line voltage security monitoring using synchronized phasor measurements and decision trees , 2001, 2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194).

[248]  Guofei Gu,et al.  TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.

[249]  Sherali Zeadally,et al.  Smart Grid Privacy: Issues and Solutions , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[250]  EDDIE KOHLER,et al.  The click modular router , 2000, TOCS.

[251]  Lorenzo Martignoni,et al.  FluXOR: Detecting and Monitoring Fast-Flux Service Networks , 2008, DIMVA.

[252]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[253]  Viktor K. Prasanna,et al.  On Using Cloud Platforms in a Software Architecture for Smart Energy Grids , 2010 .

[254]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[255]  Jalel Ben-Othman,et al.  On Securing HWMP Using IBC , 2011, 2011 IEEE International Conference on Communications (ICC).

[256]  W. Timothy Strayer,et al.  Detecting Botnets with Tight Command and Control , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.

[257]  B. Karp,et al.  Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.

[258]  Salvatore J. Stolfo,et al.  When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.

[259]  Wenke Lee,et al.  Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces , 2009, 2009 Annual Computer Security Applications Conference.

[260]  Benny Pinkas,et al.  On the Security of Pay-per-Click and Other Web Advertising Schemes , 1999, Comput. Networks.

[261]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[262]  Tobias Lauinger,et al.  Honeybot, Your Man in the Middle for Automated Social Engineering , 2010, LEET.

[263]  Jean-Pierre Seifert,et al.  SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale , 2011, USENIX Security Symposium.

[264]  John Mark Agosta,et al.  An adaptive anomaly detector for worm detection , 2007 .

[265]  Christopher Krügel,et al.  Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.

[266]  Valentin Tudor,et al.  Remote Control of Smart Meters: Friend or Foe? , 2011, 2011 Seventh European Conference on Computer Network Defense.

[267]  Tyler Moore,et al.  Evaluating the Wisdom of Crowds in Assessing Phishing Websites , 2008, Financial Cryptography.

[268]  Klara Nahrstedt,et al.  Time Valid One-Time Signature for Time-Critical Multicast Data Authentication , 2009, IEEE INFOCOM 2009.

[269]  Stephen J Genuis,et al.  Fielding a current idea: exploring the public health impact of electromagnetic radiation. , 2008, Public health.

[270]  Taskin Koçak,et al.  Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.

[271]  Deepa Kundur,et al.  Bloom filter based intrusion detection for smart grid SCADA , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[272]  Nick Feamster,et al.  Dynamics of Online Scam Hosting Infrastructure , 2009, PAM.

[273]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[274]  John Newbury,et al.  Power line communications : theory and applications for narrowband and broadband communications over power lines , 2010 .

[275]  Boris Lau,et al.  Measuring virtual machine detection in malware using DSD tracer , 2008, Journal in Computer Virology.

[276]  Ross J. Anderson,et al.  The Economics of Online Crime , 2009 .

[277]  Luis Ceze,et al.  Characterizing the Performance and Energy Efficiency of Lock-Free Data Structures , 2011, 2011 15th Workshop on Interaction between Compilers and Computer Architectures.

[278]  Ross Anderson,et al.  Who Controls the off Switch? , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[279]  Florian Skopik,et al.  A Survey on Threats and Vulnerabilities in Smart Metering Infrastructures , 2012 .

[280]  Duane Wessels,et al.  Passive Monitoring of DNS Anomalies , 2007, DIMVA.

[281]  Vern Paxson,et al.  @spam: the underground on 140 characters or less , 2010, CCS '10.

[282]  Guofei Gu,et al.  BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.

[283]  Patrice Godefroid,et al.  SAGE: Whitebox Fuzzing for Security Testing , 2012, ACM Queue.

[284]  Hesham K. Alfares,et al.  Electric load forecasting: Literature survey and classification of methods , 2002, Int. J. Syst. Sci..

[285]  Sebnem Rusitschka,et al.  Smart Grid Data Cloud: A Model for Utilizing Cloud Computing in the Smart Grid Domain , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[286]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[287]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[288]  James Newsome,et al.  Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[289]  Angelos D. Keromytis,et al.  Countering DoS attacks with stateless multipath overlays , 2005, CCS '05.

[290]  S. Shankar Sastry,et al.  Time synchronization attacks in sensor networks , 2005, SASN '05.

[291]  T. Su,et al.  Effects of Occupational Noise Exposure on 24-Hour Ambulatory Vascular Properties in Male Workers , 2007, Environmental health perspectives.

[292]  Klemens Böhm,et al.  Re-identification of Smart Meter data , 2012, Personal and Ubiquitous Computing.

[293]  Leyla Bilge,et al.  Automatically Generating Models for Botnet Detection , 2009, ESORICS.

[294]  A. Ghassemi,et al.  Cognitive Radio for Smart Grid Communications , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[295]  Angelos D. Keromytis,et al.  An Analysis of Rogue AV Campaigns , 2010, RAID.

[296]  Lennart Söder,et al.  Distributed generation : a definition , 2001 .

[297]  Wei Hong,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .

[298]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[299]  Felix C. Freiling,et al.  Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..