A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid
暂无分享,去创建一个
[1] Matthew Harvey,et al. Visualizing NISTIR 7628, Guidelines for Smart Grid Cyber Security , 2014, 2014 Power and Energy Conference at Illinois (PECI).
[2] Yong Wang,et al. Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security , 2010, ICSI.
[3] Ehab Al-Shaer,et al. Discovery of policy anomalies in distributed firewalls , 2004, IEEE INFOCOM 2004.
[4] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[5] Sushil Jajodia,et al. Attack Graphs for Sensor Placement , Alert Prioritization , and Attack Response , 2008 .
[6] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[7] Indrajit Ray,et al. Optimal security hardening using multi-objective optimization on attack tree models of networks , 2007, CCS '07.
[8] Pallab Dasgupta,et al. Policy Based Security Analysis in Enterprise Networks: A Formal Approach , 2010, IEEE Transactions on Network and Service Management.
[9] Ye Wang,et al. Shadow configuration as a network management primitive , 2008, SIGCOMM '08.
[10] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[11] Dmitry Podkuiko,et al. Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.
[12] Coniferous softwood. GENERAL TERMS , 2003 .
[13] Zahid Anwar,et al. Automatic security assessment of critical cyber-infrastructures , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[14] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[15] L. D. Moura,et al. The YICES SMT Solver , 2006 .
[16] Dmitry Podkuiko,et al. Multi-vendor penetration testing in the advanced metering infrastructure , 2010, ACSAC '10.
[17] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[18] Albert Oliveras,et al. On SAT Modulo Theories and Optimization Problems , 2006, SAT.
[19] Ehab Al-Shaer,et al. Network configuration in a box: towards end-to-end verification of network reachability and security , 2009, 2009 17th IEEE International Conference on Network Protocols.
[20] Igor V. Kotenko,et al. Attack Graph Based Evaluation of Network Security , 2006, Communications and Multimedia Security.
[21] Ehab Al-Shaer,et al. SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid , 2012, 2012 Proceedings IEEE INFOCOM.