Identifying counterfeit smart grid devices: A lightweight system level framework
暂无分享,去创建一个
[1] Weibo Gong,et al. Anomaly detection using call stack information , 2003, 2003 Symposium on Security and Privacy, 2003..
[2] Zachary A. Collier,et al. Cybersecurity Standards: Managing Risk and Creating Resilience , 2014, Computer.
[3] Michael A. Temple,et al. Physical layer identification of embedded devices using RF-DNA fingerprinting , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[4] Mark Mohammad Tehranipoor,et al. Anti-counterfeit Techniques: From Design to Resign , 2013, 2013 14th International Workshop on Microprocessor Test and Verification.
[5] Andreas Pitsillides,et al. Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.
[6] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[7] John O'Brien,et al. Counterfeit mobile devices - the duck test , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[8] Salvatore J. Stolfo,et al. Modeling system calls for intrusion detection with dynamic window sizes , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[9] Yiorgos Makris,et al. Counterfeit electronics: A rising threat in the semiconductor manufacturing industry , 2013, 2013 IEEE International Test Conference (ITC).
[10] Xinyu Yang,et al. Towards optimal PMU placement against data integrity attacks in smart grid , 2016, 2016 Annual Conference on Information Science and Systems (CISS).
[11] Miodrag Potkonjak,et al. Can EDA combat the rise of electronic counterfeiting? , 2012, DAC Design Automation Conference 2012.
[12] Carl Kriger,et al. A Detailed Analysis of the GOOSE Message Structure in an IEC 61850 Standard-Based Substation Automation System , 2013, Int. J. Comput. Commun. Control.
[13] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[14] Anna Magdalena Kosek,et al. Contextual anomaly detection for cyber-physical security in Smart Grids based on an artificial neural network model , 2016, 2016 Joint Workshop on Cyber- Physical Security and Resilience in Smart Grids (CPSR-SG).
[15] Suman Jana,et al. Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts , 2015, HotOS.
[16] Raheem A. Beyah,et al. A network-based approach to counterfeit detection , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[17] Annabelle Lee,et al. Guidelines for Smart Grid Cyber Security , 2010 .
[18] Yang Liu,et al. A cyber-physical monitoring system for attack detection in smart grid , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[19] Michal Frivaldsky,et al. Detection of electronic counterfeit components , 2015, 2015 16th International Scientific Conference on Electric Power Engineering (EPE).