Security and Privacy in Smart Grids
暂无分享,去创建一个
[1] David L Donoho,et al. Compressed sensing , 2006, IEEE Transactions on Information Theory.
[2] Michael Gastpar,et al. Ergodic Interference Alignment , 2012, IEEE Trans. Inf. Theory.
[3] Christian Nagel. Enterprise Services with the .NET Framework: Developing Distributed Business Solutions with .NET Enterprise Services (Microsoft Net Development Series) , 2005 .
[4] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[5] Pablo A. Parrilo,et al. Rank-Sparsity Incoherence for Matrix Decomposition , 2009, SIAM J. Optim..
[6] Raghuram Ranganathan,et al. A comparative study of complex gradient and fixed-point ICA algorithms for interference suppression in static and dynamic channels , 2008, Signal Process..
[7] Mahesh K. Varanasi,et al. The degrees of freedom region of the MIMO cognitive interference channel with no CSIT , 2010, 2010 IEEE International Symposium on Information Theory.
[8] Anand Sivasubramaniam,et al. Profiling, Prediction, and Capping of Power Consumption in Consolidated Environments , 2008, 2008 IEEE International Symposium on Modeling, Analysis and Simulation of Computers and Telecommunication Systems.
[9] Marbin Pazos-Revilla,et al. An Experimental Model of a FPGA-based Fuzzy Intrusion Detection System , 2011, CATA.
[10] Yi Ma,et al. Robust principal component analysis? , 2009, JACM.
[11] Jeffrey O. Kephart,et al. Coordinated management of power usage and runtime performance , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[12] Ian T. Jolliffe,et al. Principal Component Analysis , 2002, International Encyclopedia of Statistical Science.
[13] Zbynek Koldovský,et al. Blind Instantaneous Noisy Mixture Separation with Best Interference-Plus-Noise Rejection , 2007, ICA.
[14] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[15] Mathias Uslar,et al. Survey of Smart Grid Standardization Studies and Recommendations , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[16] Simon Haykin,et al. Spectrum Sensing for Cognitive Radio , 2009, Proceedings of the IEEE.
[17] Amir K. Khandani,et al. Communication Over MIMO X Channels: Interference Alignment, Decomposition, and Performance Analysis , 2008, IEEE Transactions on Information Theory.
[18] Jianying Zhou,et al. Wireless Sensor Network Security , 2008 .
[19] Edward Y. Chang,et al. Formulating distance functions via the kernel trick , 2005, KDD '05.
[20] Emmanuel J. Candès,et al. Exact Matrix Completion via Convex Optimization , 2009, Found. Comput. Math..
[21] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[22] Pavel Ocenasek,et al. Towards Security Issues in ZigBee Architecture , 2009, HCI.
[23] Husheng Li,et al. Compressed Meter Reading for Delay-Sensitive and Secure Load Report in Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[24] Eamonn J. Keogh,et al. Dimensionality Reduction for Fast Similarity Search in Large Time Series Databases , 2001, Knowledge and Information Systems.
[25] Emmanuel J. Candès,et al. A Singular Value Thresholding Algorithm for Matrix Completion , 2008, SIAM J. Optim..
[26] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[27] Y. Tina Lee,et al. INFORMATION MODELING : FROM DESIGN TO IMPLEMENTATION , 1999 .
[28] Torsten Cegrell,et al. Power system control technology , 1986 .
[29] Changshui Zhang,et al. Kernel Trick Embedded Gaussian Mixture Model , 2003, ALT.
[30] Rajarshi Das,et al. A multi-agent systems approach to autonomic computing , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[31] Adrian Zafiu,et al. Theory, Algorithms and Applications for Solar Panel MPP Tracking , 2010 .
[32] Shivakant Mishra,et al. INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks , 2002 .
[33] John R. Vacca,et al. Defense in Depth: Firewall Topologies , 2005 .
[34] Terrence J. Sejnowski,et al. ICA Mixture Models for Unsupervised Classification of Non-Gaussian Classes and Automatic Context Switching in Blind Signal Separation , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[35] Wolfgang Schulte,et al. WAN - Wide Area Network , 2014 .
[36] Andrzej Cichocki,et al. A New Learning Algorithm for Blind Signal Separation , 1995, NIPS.
[37] B. Porat,et al. Digital Spectral Analysis with Applications. , 1988 .
[38] Emmanuel J. Candès,et al. The Power of Convex Relaxation: Near-Optimal Matrix Completion , 2009, IEEE Transactions on Information Theory.
[39] Kilian Q. Weinberger,et al. Nonlinear Dimensionality Reduction by Semidefinite Programming and Kernel Matrix Factorization , 2005, AISTATS.
[40] Berk Sunar,et al. Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.
[41] Nello Cristianini,et al. Learning the Kernel Matrix with Semidefinite Programming , 2002, J. Mach. Learn. Res..
[42] Syed Ali Jafar,et al. Degrees of Freedom of the MIMO Interference Channel With Cooperation and Cognition , 2009, IEEE Transactions on Information Theory.
[43] Emmanuel J. Candès,et al. Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information , 2004, IEEE Transactions on Information Theory.
[44] Mahadev Satyanarayanan,et al. Internet suspend/resume , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[45] M. Overton,et al. Primal - dual interior - point methods for semidefinite programming : Stability, convergence, and nu , 1998 .
[46] Frederick Donald Hart,et al. American Gas Association , 1974 .
[47] Pierre Comon,et al. Independent component analysis, A new concept? , 1994, Signal Process..
[48] Dagmar Niebur,et al. Load profile estimation in electric transmission networks using independent component analysis , 2003 .
[49] Kilian Q. Weinberger,et al. Unsupervised Learning of Image Manifolds by Semidefinite Programming , 2004, CVPR.
[50] Anil K. Jain,et al. Dimensionality reduction using genetic algorithms , 2000, IEEE Trans. Evol. Comput..
[51] John Wright,et al. Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Matrices via Convex Optimization , 2009, NIPS.
[52] Robert Schober,et al. Optimal and autonomous incentive-based energy consumption scheduling algorithm for smart grid , 2010, 2010 Innovative Smart Grid Technologies (ISGT).
[53] Robert C. Qiu,et al. Prediction of channel state for cognitive radio using higher-order hidden Markov model , 2010, Proceedings of the IEEE SoutheastCon 2010 (SoutheastCon).
[54] Pablo A. Parrilo,et al. Guaranteed Minimum-Rank Solutions of Linear Matrix Equations via Nuclear Norm Minimization , 2007, SIAM Rev..
[55] Rajarshi Das,et al. Coordinating Multiple Autonomic Managers to Achieve Specified Power-Performance Tradeoffs , 2007, Fourth International Conference on Autonomic Computing (ICAC'07).
[56] Yi Ma,et al. The Augmented Lagrange Multiplier Method for Exact Recovery of Corrupted Low-Rank Matrices , 2010, Journal of structural biology.
[57] S T Roweis,et al. Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.
[58] Jason Nieh,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation , 2022 .
[59] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[60] E. Oja,et al. Independent Component Analysis , 2001 .
[61] Eric Jul,et al. Self-migration of operating systems , 2004, EW 11.
[62] Samy Bengio,et al. A kernel trick for sequences applied to text-independent speaker verification systems , 2007, Pattern Recognit..
[63] Zhao Li,et al. A Unified Solution for Advanced Metering Infrastructure Integration with a Distribution Management System , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[64] Mor Harchol-Balter,et al. Optimal power allocation in server farms , 2009, SIGMETRICS '09.
[65] Nagarajan Kandasamy,et al. Power and performance management of virtualized computing environments via lookahead control , 2008, 2008 International Conference on Autonomic Computing.
[66] Dinh-Tuan Pham,et al. Blind separation of instantaneous mixture of sources via an independent component analysis , 1996, IEEE Trans. Signal Process..
[67] Joe Weiss,et al. Bellingham, Washington, Control System Cyber Security Case Study , 1969 .
[68] Bernhard Schölkopf,et al. Nonlinear Component Analysis as a Kernel Eigenvalue Problem , 1998, Neural Computation.
[69] Marbin Pazos-Revilla. FPGA based fuzzy intrusion detection system for network security , 2010 .
[70] Michael A. Saunders,et al. Atomic Decomposition by Basis Pursuit , 1998, SIAM J. Sci. Comput..
[71] R.W. Brodersen,et al. Implementation issues in spectrum sensing for cognitive radios , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[72] G. Baudat,et al. Kernel-based methods and function approximation , 2001, IJCNN'01. International Joint Conference on Neural Networks. Proceedings (Cat. No.01CH37222).
[73] Weiyu Xu,et al. Necessary and sufficient conditions for success of the nuclear norm heuristic for rank minimization , 2008, 2008 47th IEEE Conference on Decision and Control.
[74] Biing-Hwang Juang,et al. Signal Processing in Cognitive Radio , 2009, Proceedings of the IEEE.
[75] Syed Ali Jafar,et al. Interference Alignment and Spatial Degrees of Freedom for the K User Interference Channel , 2007, 2008 IEEE International Conference on Communications.
[76] Erkki Oja,et al. Independent component analysis: algorithms and applications , 2000, Neural Networks.
[77] Erkki Oja,et al. One-unit Learning Rules for Independent Component Analysis , 1996, NIPS.
[78] D. Curtis Schleher,et al. Electronic Warfare in the Information Age , 1999 .
[79] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..