Information Communication Technologies
暂无分享,去创建一个
[1] Lluís Màrquez i Villodre,et al. SVMTool: A general POS Tagger Generator Based on Support Vector Machines , 2004, LREC.
[2] Yi Zhang,et al. Integrating non-blocking synchronisation in parallel applications: performance advantages and methodologies , 2002, WOSP '02.
[3] H. T. Mouftah,et al. Secure multipath routing for AMI network in Smart Grid , 2012, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC).
[4] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[5] Hamid Sharif,et al. A Secure Data Aggregation and Dispatch Scheme for Home Area Networks in Smart Grid , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[6] Adrian Perrig,et al. SNAPP: stateless network-authenticated path pinning , 2008, ASIACCS '08.
[7] Heng Yin,et al. Renovo: a hidden code extractor for packed executables , 2007, WORM '07.
[8] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[9] Max Mühlhäuser,et al. Analysis of privacy-enhancing protocols based on anonymity networks , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[10] Robert S. Gray,et al. Using sensor networks and data fusion for early detection of active worms , 2003, SPIE Defense + Commercial Sensing.
[11] Oliver Kramer,et al. Power Prediction in Smart Grids with Evolutionary Local Kernel Regression , 2010, HAIS.
[12] Divyakant Agrawal,et al. Detectives: detecting coalition hit inflation attacks in advertising networks streams , 2007, WWW '07.
[13] Christopher Krügel,et al. A solution for the automated detection of clickjacking attacks , 2010, ASIACCS '10.
[14] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[15] Farnam Jahanian,et al. Shedding Light on the Configuration of Dark Addresses , 2007, NDSS.
[16] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.
[17] James S. Thorp,et al. Synchronized Phasor Measurement Applications in Power Systems , 2010, IEEE Transactions on Smart Grid.
[18] Yong Guan,et al. Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[19] Xiaowei Yang,et al. A DoS-limiting network architecture , 2005, SIGCOMM '05.
[20] V. Venkatasubramanian,et al. New Wide-Area Algorithms for Detection and Mitigation of Angle Instability using Synchrophasors , 2007, 2007 IEEE Power Engineering Society General Meeting.
[21] Chris Kanich,et al. Spamcraft: An Inside Look At Spam Campaign Orchestration , 2009, LEET.
[22] Xin Zhao,et al. The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus Distribution , 2010, LEET.
[23] Clark Hochgraf,et al. Smart Grid Charger for Electric Vehicles Using Existing Cellular Networks and SMS Text Messages , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[24] Marcus A. Maloof,et al. Learning to Detect and Classify Malicious Executables in the Wild , 2006, J. Mach. Learn. Res..
[25] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[26] Robert Tappan Morris,et al. ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.
[27] Suresh Singh,et al. An Algorithm for Anomaly-based Botnet Detection , 2006, SRUTI.
[28] Dmitry Podkuiko,et al. Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.
[29] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[30] Andrew Warfield,et al. Practical taint-based protection using demand emulation , 2006, EuroSys.
[31] A. Perrig,et al. Secure and Efficient Capability-Based Power Management in the Smart Grid , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
[32] A. Muzet. Environmental noise, sleep and health. , 2007, Sleep medicine reviews.
[33] Nir Kshetri,et al. The Economics of Click Fraud , 2010, IEEE Secur. Priv..
[34] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[35] Hamid Sharif,et al. A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[36] Yasusi Sinohara,et al. Virtual energy demand data: Estimating energy load and protecting consumers' privacy , 2011, ISGT 2011.
[37] Marek Jawurek,et al. Smart metering de-pseudonymization , 2011, ACSAC '11.
[38] Sotiris Ioannidis,et al. D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks , 2010, ESORICS.
[39] Marco Bindi,et al. Air temperature-related human health outcomes: current impact and estimations of future risks in Central Italy. , 2012, The Science of the total environment.
[40] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[41] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[42] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, CCS '10.
[43] Niels Provos,et al. Data reduction for the scalable automated analysis of distributed darknet traffic , 2005, IMC '05.
[44] João Gama,et al. Stream-Based Electricity Load Forecast , 2007, PKDD.
[45] Guanhua Yan,et al. SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection , 2009, RAID.
[46] Yogesh L. Simmhan,et al. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds , 2011, 2011 IEEE 4th International Conference on Cloud Computing.
[47] Anna R. Karlin,et al. Practical network support for IP traceback , 2000, SIGCOMM.
[48] Guofei Gu,et al. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection , 2008, USENIX Security Symposium.
[49] Eylem Ekici,et al. A multicast routing algorithm for LEO satellite IP networks , 2002, TNET.
[50] Cédric Augonnet,et al. PEPPHER: Efficient and Productive Usage of Hybrid Computing Systems , 2011, IEEE Micro.
[51] George Danezis,et al. Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.
[52] Alessandro Barenghi,et al. Smart metering in power grids: Application scenarios and security , 2011, 2011 IEEE PES Innovative Smart Grid Technologies.
[53] Xuxian Jiang,et al. Billing Attacks on SIP-Based VoIP Systems , 2007, WOOT.
[54] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[55] Yih-Chun Hu,et al. SPV: secure path vector routing for securing BGP , 2004, SIGCOMM 2004.
[56] Thorsten Holz,et al. As the net churns: Fast-flux botnet observations , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[57] Vinod Yegneswaran,et al. On the Design and Use of Internet Sinks for Network Abuse Monitoring , 2004, RAID.
[58] Somesh Jha,et al. FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution , 2013, USENIX Security Symposium.
[59] Janaka Ekanayake,et al. Demand side primary frequency response support through smart meter control , 2009, 2009 44th International Universities Power Engineering Conference (UPEC).
[60] Dawn Xiaodong Song,et al. SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[61] Robert C. Green,et al. Artificial immune system based intrusion detection in a distributed hierarchical network architecture of smart grid , 2011, 2011 IEEE Power and Energy Society General Meeting.
[62] Stefano Zanero,et al. A social-engineering-centric data collection initiative to study phishing , 2011, BADGERS '11.
[63] Niels Provos,et al. A Hybrid Honeypot Architecture for Scalable Network Monitoring , 2004 .
[64] Peder Wolkoff,et al. The dichotomy of relative humidity on indoor air quality. , 2007, Environment international.
[65] H. Aung,et al. Fine particulate matter from urban ambient and wildfire sources from California's San Joaquin Valley initiate differential inflammatory, oxidative stress, and xenobiotic responses in human bronchial epithelial cells. , 2011, Toxicology in vitro : an international journal published in association with BIBRA.
[66] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[67] Philippas Tsigas,et al. GPU-Quicksort: A practical Quicksort algorithm for graphics processors , 2010, JEAL.
[68] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM 2002.
[69] João Gama,et al. Hierarchical Clustering of Time-Series Data Streams , 2008, IEEE Transactions on Knowledge and Data Engineering.
[70] Yang Xiao,et al. A survey of communication/networking in Smart Grids , 2012, Future Gener. Comput. Syst..
[71] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[72] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[73] Philip Koopman,et al. Low cost multicast authentication via validity voting in time-triggered embedded control networks , 2010, WESS '10.
[74] Anne-Marie Kermarrec,et al. The many faces of publish/subscribe , 2003, CSUR.
[75] Felix C. Freiling,et al. Measuring and Detecting Fast-Flux Service Networks , 2008, NDSS.
[76] Bobji Mungamuru,et al. Competition and Fraud in Online Advertising Markets , 2008, Financial Cryptography.
[77] Herbert Bos,et al. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation , 2006, EuroSys.
[78] Steven B. Wicker,et al. Decreased time delay and security enhancement recommendations for AMI smart meter networks , 2010, 2010 Innovative Smart Grid Technologies (ISGT).
[79] Hristo Bojinov,et al. Embedded management interfaces emerging massive insecurity , 2009 .
[80] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[81] Eric Chien,et al. W32.Duqu: The Precursor to the Next Stuxnet , 2012, LEET.
[82] John R. Williams,et al. Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream Mining , 2012, PAISI.
[83] Christof Paar,et al. All You Can Eat or Breaking a Real-World Contactless Payment System , 2010, Financial Cryptography.
[84] Minaxi Gupta,et al. Behind Phishing: An Examination of Phisher Modi Operandi , 2008, LEET.
[85] Y. Amitai,et al. Neuropsychological impairment from acute low-level exposure to carbon monoxide. , 1998, Archives of neurology.
[86] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[87] Xiaoqian Jiang,et al. A Randomized Response Model for Privacy Preserving Smart Metering , 2012, IEEE Transactions on Smart Grid.
[88] Philippas Tsigas,et al. Understanding the Performance of Concurrent Data Structures on Graphics Processors , 2012, Euro-Par.
[89] Vern Paxson,et al. Proceedings of the 13th USENIX Security Symposium , 2022 .
[90] Christoph Sorge,et al. A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.
[91] Alfonso Valdes,et al. Intrusion Monitoring in Process Control Systems , 2009 .
[92] Mathias Uslar,et al. Survey of Smart Grid standardization studies and recommendations — Part 2 , 2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe).
[93] Ernest Foo,et al. Gap analysis of intrusion detection in smart grids , 2011 .
[94] Christopher Krügel,et al. The Underground Economy of Fake Antivirus Software , 2011, WEIS.
[95] Ying Xing,et al. The Design of the Borealis Stream Processing Engine , 2005, CIDR.
[96] George Candea,et al. The S2E Platform: Design, Implementation, and Applications , 2012, TOCS.
[97] David E. Culler,et al. Taming the underlying challenges of reliable multihop routing in sensor networks , 2003, SenSys '03.
[98] Nick Feamster,et al. Building a Dynamic Reputation System for DNS , 2010, USENIX Security Symposium.
[99] Vern Paxson,et al. On the Potential of Proactive Domain Blacklisting , 2010, LEET.
[100] V. O. K. Li,et al. On Wireless Sensors Communication for Overhead Transmission Line Monitoring in Power Delivery Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[101] Bilal Erman Bilgin,et al. Performance evaluations of ZigBee in different smart grid environments , 2012, Comput. Networks.
[102] Leyla Bilge,et al. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis , 2011, NDSS.
[103] George Candea,et al. Testing Closed-Source Binary Device Drivers with DDT , 2010, USENIX Annual Technical Conference.
[104] Marina Papatriantafilou,et al. Off the Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service Attacks , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.
[105] Christopher Krügel,et al. Dynamic Analysis of Malicious Code , 2006, Journal in Computer Virology.
[106] Christopher Krügel,et al. Detecting System Emulators , 2007, ISC.
[107] Steven Myers,et al. The Nuts and Bolts of a Forum Spam Automator , 2011, LEET.
[108] Dawn Xiaodong Song,et al. Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[109] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[110] William H. Sanders,et al. AMI threats, intrusion detection requirements and deployment recommendations , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[111] William H. Sanders,et al. Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[112] Zhe Chen,et al. Cognitive Radio Network for the Smart Grid: Experimental System Architecture, Control Algorithms, Security, and Microgrid Testbed , 2011, IEEE Transactions on Smart Grid.
[113] Philippe Bonnet,et al. Towards Sensor Database Systems , 2001, Mobile Data Management.
[114] Georgios Kalogridis,et al. ElecPrivacy: Evaluating the Privacy Protection of Electricity Management Algorithms , 2011, IEEE Transactions on Smart Grid.
[115] Frederic T. Chong,et al. Minos: Architectural support for protecting control data , 2006, TACO.
[116] Markus Jakobsson,et al. Badvertisements: Stealthy Click-Fraud with Unwitting Accessories , 2006, J. Digit. Forensic Pract..
[117] Geoff Hulten,et al. Mining high-speed data streams , 2000, KDD '00.
[118] Philip Levis,et al. Four-Bit Wireless Link Estimation , 2007, HotNets.
[119] Xinghuo Yu,et al. Semi-supervised classification of characterized patterns for demand forecasting using smart electricity meters , 2011, 2011 International Conference on Electrical Machines and Systems.
[120] Chen-Ching Liu,et al. Cyber-power system security in a smart grid environment , 2012, 2012 IEEE PES Innovative Smart Grid Technologies (ISGT).
[121] I-Tai Lu,et al. Cognitive Radio Based Wireless Sensor Network architecture for smart grid utility , 2011, 2011 IEEE Long Island Systems, Applications and Technology Conference.
[122] Patrick Traynor,et al. PinDr0p: using single-ended audio features to determine call provenance , 2010, CCS '10.
[123] J. Veitch. Psychological Processes Influencing Lighting Quality , 2001 .
[124] Wenye Wang,et al. Review and evaluation of security threats on the communication networks in the smart grid , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[125] Geoff Hulten,et al. Mining time-changing data streams , 2001, KDD '01.
[126] Chris Kanich,et al. Botnet Judo: Fighting Spam with Itself , 2010, NDSS.
[127] Evangelos Kranakis,et al. DNS-based Detection of Scanning Worms in an Enterprise Network , 2005, NDSS.
[128] Tim Kraska,et al. Stormy: an elastic and highly available streaming service in the cloud , 2012, EDBT-ICDT '12.
[129] Xu Chen,et al. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[130] Ing-Ray Chen,et al. Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.
[131] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[132] Giovanni Vigna,et al. Intrusion detection: a brief history and overview , 2002 .
[133] William Kersting,et al. Distribution System Modeling and Analysis , 2001, Electric Power Generation, Transmission, and Distribution: The Electric Power Engineering Handbook.
[134] Dawn Xiaodong Song,et al. Insights from the Inside: A View of Botnet Management from Infiltration , 2010, LEET.
[135] Dogan Kesdogan,et al. GridPriv: A Smart Metering Architecture Offering k-Anonymity , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[136] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[137] Xuxian Jiang,et al. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities , 2006, NDSS.
[138] Farnam Jahanian,et al. The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.
[139] Ian F. Akyildiz,et al. A survey on wireless mesh networks , 2005, IEEE Communications Magazine.
[140] Anna Scaglione,et al. Power Line Communications and the Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[141] Thorsten Holz,et al. NoSEBrEaK - attacking honeynets , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[142] Husheng Li,et al. Compressed Meter Reading for Delay-Sensitive and Secure Load Report in Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[143] Carlos E. Pedreira,et al. Neural networks for short-term load forecasting: a review and evaluation , 2001 .
[144] Michael Vrable,et al. Scalability, fidelity, and containment in the potemkin virtual honeyfarm , 2005, SOSP '05.
[145] H Markiewicz,et al. Voltage Disturbances Standard EN 50160 - Voltage Characteristics in Public Distribution Systems , 2008 .
[146] Hamid Sharif,et al. A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.
[147] Christoph Sorge,et al. Do not snoop my habits: preserving privacy in the smart grid , 2012, IEEE Communications Magazine.
[148] Olivier Bonaventure,et al. The HoneyTank: a scalable approach to collect malicious internet traffic , 2008, Int. J. Crit. Infrastructures.
[149] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[150] Kun-Lung Wu,et al. Elastic scaling of data parallel operators in stream processing , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[151] Jeffrey Carr,et al. Inside Cyber Warfare: Mapping the Cyber Underworld , 2009 .
[152] Xuxian Jiang,et al. Collapsar: A VM-Based Architecture for Network Attack Detention Center , 2004, USENIX Security Symposium.
[153] Engin Kirda,et al. A View on Current Malware Behaviors , 2009, LEET.
[154] Xudong Wang,et al. Security Framework for Wireless Communications in Smart Distribution Grid , 2011, IEEE Transactions on Smart Grid.
[155] Choong Seon Hong,et al. A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network , 2008, ICCSA.
[156] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[157] Victor O. K. Li,et al. Satellite-based Internet: a tutorial , 2001, IEEE Commun. Mag..
[158] Angelos D. Keromytis,et al. Detecting Targeted Attacks Using Shadow Honeypots , 2005, USENIX Security Symposium.
[159] George Candea,et al. Reverse engineering of binary device drivers with RevNIC , 2010, EuroSys '10.
[160] Mathias Uslar,et al. Survey of Smart Grid Standardization Studies and Recommendations , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[161] J. Giri,et al. Wanted: A more intelligent grid , 2009, IEEE Power and Energy Magazine.
[162] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[163] Georgios Kalogridis,et al. Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[164] Jerry R. Hobbs,et al. An algebraic approach to IP traceback , 2002, TSEC.
[165] Simon Haykin,et al. Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.
[166] Federico Maggi. Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[167] Gianluca Stringhini,et al. The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns , 2011, LEET.
[168] Lorenzo Martignoni,et al. A Fistful of Red-Pills: How to Automatically Generate Procedures to Detect CPU Emulators , 2009, WOOT.
[169] Min Gyung Kang,et al. Emulating emulation-resistant malware , 2009, VMSec '09.
[170] Zhou Peng,et al. Applications of McWiLL broadband multimedia trunk communication technology in Smart Grid , 2010, 2010 International Conference on Optics, Photonics and Energy Engineering (OPEE).
[171] Yacine Challal,et al. A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.
[172] S. Shankar Sastry,et al. Research Challenges for the Security of Control Systems , 2008, HotSec.
[173] Sachin Katti,et al. Trading structure for randomness in wireless opportunistic routing , 2007, SIGCOMM 2007.
[174] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[175] Marco Zuniga,et al. JamLab: Augmenting sensornet testbeds with realistic and controlled interference generation , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.
[176] Aiko Pras,et al. Intrusion Detection in SCADA Networks , 2010, AIMS.
[177] Thorsten Holz,et al. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation , 2007, HotBots.
[178] Xiaowei Wang,et al. Performance of chirp spread spectrum in wireless communication systems , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[179] Jens-Tobias Zerbst,et al. Zone principles as Cyber Security architecture element for Smart Grids , 2010, 2010 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe).
[180] Thorsten Holz,et al. A Pointillist Approach for Comparing Honeypots , 2005, DIMVA.
[181] Yi Xu,et al. A survey on the communication architectures in smart grid , 2011, Comput. Networks.
[182] Prashant J. Shenoy,et al. Private memoirs of a smart meter , 2010, BuildSys '10.
[183] Philip Levis,et al. The κ factor: inferring protocol performance using inter-link reception correlation , 2010, MobiCom.
[184] Salvatore J. Stolfo,et al. Defending Embedded Systems with Software Symbiotes , 2011, RAID.
[185] Eric Li,et al. Optimization of Frequent Itemset Mining on Multiple-Core Processor , 2007, VLDB.
[186] João Gama,et al. A system for analysis and prediction of electricity-load streams , 2009, Intell. Data Anal..
[187] Michael Stonebraker,et al. The 8 requirements of real-time stream processing , 2005, SGMD.
[188] Robert C. Green,et al. Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .
[189] Christian Platzer,et al. Covertly Probing Underground Economy Marketplaces , 2010, DIMVA.
[190] Srdjan Capkun,et al. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[191] Vern Paxson,et al. What's Clicking What? Techniques and Innovations of Today's Clickbots , 2011, DIMVA.
[192] J.A. Gutierrez,et al. IEEE 802.15.4: a developing standard for low-power low-cost wireless personal area networks , 2001, IEEE Network.
[193] Bastian Schlich,et al. Model checking of software for microcontrollers , 2010, TECS.
[194] Christopher Krügel,et al. Efficient Detection of Split Personalities in Malware , 2010, NDSS.
[195] Alex A. Freitas,et al. A Survey of Parallel Data Mining , 1996 .
[196] Sumeet Singh,et al. The EarlyBird System for Real-time Detection of Unknown Worms , 2005 .
[197] Frank C. Lambert,et al. A survey on communication networks for electric system automation , 2006, Comput. Networks.
[198] Evangelos P. Markatos,et al. A Systematic Characterization of IM Threats using Honeypots , 2010, NDSS.
[199] Marc Dacier,et al. ScriptGen: an automated script generation tool for Honeyd , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[200] Angelos D. Keromytis,et al. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks , 2005, ISC.
[201] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[202] Louis D. Brandeis,et al. The Right to Privacy , 1890 .
[203] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[204] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[205] Chris Kanich,et al. On the Spam Campaign Trail , 2008, LEET.
[206] A. Blakeborough,et al. Vibration Perception and Comfort Levels for an Audience Occupying a Grandstand with Perceivable Motion , 2009 .
[207] Gildas Avoine. Fraud Within Asymmetric Multi-hop Cellular Networks , 2005, Financial Cryptography.
[208] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[209] Simin Nadjm-Tehrani,et al. Embedded Cyber-Physical Anomaly Detection in Smart Meters , 2012, CRITIS.
[210] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[211] Y. Simmhan,et al. Towards Reliable, Performant Workflows for Streaming-Applications on Cloud Platforms , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.
[212] Vinod Yegneswaran,et al. Characteristics of internet background radiation , 2004, IMC '04.
[213] Christopher Krügel,et al. Scalable, Behavior-Based Malware Clustering , 2009, NDSS.
[214] Philip Levis,et al. The β-factor: measuring wireless link burstiness , 2008, SenSys '08.
[215] Michael Stonebraker,et al. Aurora: a new model and architecture for data stream management , 2003, The VLDB Journal.
[216] David G. Andersen,et al. Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .
[217] Christopher Krügel,et al. Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.
[218] Rajat Raina,et al. Large-scale deep unsupervised learning using graphics processors , 2009, ICML '09.
[219] Claudio A. Canizares,et al. Distribution System Voltage Regulation and Var Compensation for Different Static Load Models , 2000 .
[220] Yi Zhang,et al. Evaluating the performance of non-blocking synchronization on shared-memory multiprocessors , 2001, SIGMETRICS '01.
[221] Nada Golmie,et al. A Methodology to Evaluate Wireless Technologies for the Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[222] Dawn Xiaodong Song,et al. New Streaming Algorithms for Fast Detection of Superspreaders , 2005, NDSS.
[223] Philip Levis,et al. Collection tree protocol , 2009, SenSys '09.
[224] Euhanna Ghadimi,et al. Low power, low delay: Opportunistic routing meets duty cycling , 2012, 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN).
[225] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[226] Sanjam Garg,et al. Unified Architecture for Large-Scale Attested Metering , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[227] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[228] Robert Roach,et al. Acute mountain sickness: pathophysiology, prevention, and treatment. , 2010, Progress in cardiovascular diseases.
[229] Peng Ning,et al. Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.
[230] Marina Papatriantafilou,et al. NBmalloc: Allocating Memory in a Lock-Free Manner , 2008, Algorithmica.
[231] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[232] Michael K. Reiter,et al. Traffic Aggregation for Malware Detection , 2008, DIMVA.
[233] Dong Wei,et al. Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.
[234] Wei Hong,et al. Beyond Average: Toward Sophisticated Sensing with Queries , 2003, IPSN.
[235] Yogesh L. Simmhan,et al. Adaptive rate stream processing for smart grid applications on clouds , 2011, ScienceCloud '11.
[236] George Danezis,et al. Privacy-preserving smart metering , 2011, ISSE.
[237] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[238] N. Theethayi,et al. Channel Characterization for Indoor Power-Line Networks , 2009, IEEE Transactions on Power Delivery.
[239] Guofei Gu,et al. HoneyStat: Local Worm Detection Using Honeypots , 2004, RAID.
[240] Stephen McCamant,et al. Differential Slicing: Identifying Causal Execution Differences for Security Applications , 2011, 2011 IEEE Symposium on Security and Privacy.
[241] V. Madani,et al. Online dimension reduction of synchrophasor data , 2012, PES T&D 2012.
[242] Young-Jin Kim,et al. A secure decentralized data-centric information infrastructure for smart grid , 2010, IEEE Communications Magazine.
[243] Catherine J Karr,et al. Infant exposure to fine particulate matter and traffic and risk of hospitalization for RSV bronchiolitis in a region with lower ambient air pollution. , 2009, Environmental research.
[244] Sanjay Kumar Jena,et al. A survey on secure hierarchical routing protocols in wireless sensor networks , 2011, ICCCS '11.
[245] Jörg Widmer,et al. In-network aggregation techniques for wireless sensor networks: a survey , 2007, IEEE Wireless Communications.
[246] Srinivasan Seshan,et al. Synopsis diffusion for robust aggregation in sensor networks , 2004, SenSys '04.
[247] Arun G. Phadke,et al. Fast on-line voltage security monitoring using synchronized phasor measurements and decision trees , 2001, 2001 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.01CH37194).
[248] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[249] Sherali Zeadally,et al. Smart Grid Privacy: Issues and Solutions , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[250] EDDIE KOHLER,et al. The click modular router , 2000, TOCS.
[251] Lorenzo Martignoni,et al. FluXOR: Detecting and Monitoring Fast-Flux Service Networks , 2008, DIMVA.
[252] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[253] Viktor K. Prasanna,et al. On Using Cloud Platforms in a Software Architecture for Smart Energy Grids , 2010 .
[254] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[255] Jalel Ben-Othman,et al. On Securing HWMP Using IBC , 2011, 2011 IEEE International Conference on Communications (ICC).
[256] W. Timothy Strayer,et al. Detecting Botnets with Tight Command and Control , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[257] B. Karp,et al. Autograph: Toward Automated, Distributed Worm Signature Detection , 2004, USENIX Security Symposium.
[258] Salvatore J. Stolfo,et al. When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.
[259] Wenke Lee,et al. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces , 2009, 2009 Annual Computer Security Applications Conference.
[260] Benny Pinkas,et al. On the Security of Pay-per-Click and Other Web Advertising Schemes , 1999, Comput. Networks.
[261] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[262] Tobias Lauinger,et al. Honeybot, Your Man in the Middle for Automated Social Engineering , 2010, LEET.
[263] Jean-Pierre Seifert,et al. SMS of Death: From Analyzing to Attacking Mobile Phones on a Large Scale , 2011, USENIX Security Symposium.
[264] John Mark Agosta,et al. An adaptive anomaly detector for worm detection , 2007 .
[265] Christopher Krügel,et al. Polymorphic Worm Detection Using Structural Information of Executables , 2005, RAID.
[266] Valentin Tudor,et al. Remote Control of Smart Meters: Friend or Foe? , 2011, 2011 Seventh European Conference on Computer Network Defense.
[267] Tyler Moore,et al. Evaluating the Wisdom of Crowds in Assessing Phishing Websites , 2008, Financial Cryptography.
[268] Klara Nahrstedt,et al. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication , 2009, IEEE INFOCOM 2009.
[269] Stephen J Genuis,et al. Fielding a current idea: exploring the public health impact of electromagnetic radiation. , 2008, Public health.
[270] Taskin Koçak,et al. Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.
[271] Deepa Kundur,et al. Bloom filter based intrusion detection for smart grid SCADA , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[272] Nick Feamster,et al. Dynamics of Online Scam Hosting Infrastructure , 2009, PAM.
[273] Peng Liu,et al. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[274] John Newbury,et al. Power line communications : theory and applications for narrowband and broadband communications over power lines , 2010 .
[275] Boris Lau,et al. Measuring virtual machine detection in malware using DSD tracer , 2008, Journal in Computer Virology.
[276] Ross J. Anderson,et al. The Economics of Online Crime , 2009 .
[277] Luis Ceze,et al. Characterizing the Performance and Energy Efficiency of Lock-Free Data Structures , 2011, 2011 15th Workshop on Interaction between Compilers and Computer Architectures.
[278] Ross Anderson,et al. Who Controls the off Switch? , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[279] Florian Skopik,et al. A Survey on Threats and Vulnerabilities in Smart Metering Infrastructures , 2012 .
[280] Duane Wessels,et al. Passive Monitoring of DNS Anomalies , 2007, DIMVA.
[281] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[282] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[283] Patrice Godefroid,et al. SAGE: Whitebox Fuzzing for Security Testing , 2012, ACM Queue.
[284] Hesham K. Alfares,et al. Electric load forecasting: Literature survey and classification of methods , 2002, Int. J. Syst. Sci..
[285] Sebnem Rusitschka,et al. Smart Grid Data Cloud: A Model for Utilizing Cloud Computing in the Smart Grid Domain , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[286] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[287] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[288] James Newsome,et al. Polygraph: automatically generating signatures for polymorphic worms , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[289] Angelos D. Keromytis,et al. Countering DoS attacks with stateless multipath overlays , 2005, CCS '05.
[290] S. Shankar Sastry,et al. Time synchronization attacks in sensor networks , 2005, SASN '05.
[291] T. Su,et al. Effects of Occupational Noise Exposure on 24-Hour Ambulatory Vascular Properties in Male Workers , 2007, Environmental health perspectives.
[292] Klemens Böhm,et al. Re-identification of Smart Meter data , 2012, Personal and Ubiquitous Computing.
[293] Leyla Bilge,et al. Automatically Generating Models for Botnet Detection , 2009, ESORICS.
[294] A. Ghassemi,et al. Cognitive Radio for Smart Grid Communications , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[295] Angelos D. Keromytis,et al. An Analysis of Rogue AV Campaigns , 2010, RAID.
[296] Lennart Söder,et al. Distributed generation : a definition , 2001 .
[297] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[298] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[299] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..