A Simulation Model for the Analysis of Security Attacks in Advanced Metering Infrastructure
暂无分享,去创建一个
[1] Saurabh Amin,et al. In quest of benchmarking security risks to cyber-physical systems , 2013, IEEE Network.
[2] Christian Dufour,et al. On the use of real-time simulation technology in smart grid research and development , 2013, 2013 IEEE Energy Conversion Congress and Exposition.
[3] Ehab Al-Shaer,et al. A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Transactions on Smart Grid.
[4] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[5] Devendra Shelar,et al. Security Assessment of Electricity Distribution Networks Under DER Node Compromises , 2016, IEEE Transactions on Control of Network Systems.
[6] Kan Chen,et al. A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure , 2015, IEEE Transactions on Smart Grid.
[7] Xiaohui Liang,et al. Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.
[8] Prashant J. Shenoy,et al. Private memoirs of a smart meter , 2010, BuildSys '10.
[9] J. Chris Foreman,et al. Identifying the Cyber Attack Surface of the Advanced Metering Infrastructure , 2015 .
[10] Aditya Ashok,et al. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[11] Ryan K. L. Ko,et al. Taxonomy of Man-in-the-Middle Attacks on HTTPS , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[12] Vijay Varadharajan,et al. Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures , 2014, 2014 19th International Conference on Engineering of Complex Computer Systems.
[13] Xiaojun Cao,et al. Attacks/faults detection and isolation in the Smart Grid using Kalman Filter , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).
[14] Sujeet Shenoi,et al. Security analysis of an advanced metering infrastructure , 2017, Int. J. Crit. Infrastructure Prot..
[15] Eul Gyu Im,et al. Man-in-the-Middle Attack Test-bed Investigating Cyber-security Vulnerabilities in Smart Grid SCADA Systems , 2012 .
[16] T. Huld,et al. Energy solutions in rural Africa: mapping electrification costs of distributed solar and diesel generation versus grid extension , 2011 .
[17] Arif Sarwat,et al. A survey on security assessment of metering infrastructure in Smart Grid systems , 2015, SoutheastCon 2015.
[18] Lindah Kotut,et al. Survey of Cyber Security Challenges and Solutions in Smart Grids , 2016, 2016 Cybersecurity Symposium (CYBERSEC).
[19] Chao Yang,et al. Agent-based Network Security Simulator Nessi2 , 2015 .
[20] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.