Threat Landscape of Next Generation IoT-Enabled Smart Grids
暂无分享,去创建一个
[1] My T. Thai,et al. Threat From Being Social: Vulnerability Analysis of Social Network Coupled Smart Grid , 2017, IEEE Access.
[2] Amarsinh Vidhate,et al. Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[3] Frank Piessens,et al. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 , 2017, CCS.
[4] Arif Sarwat,et al. A review on cyber security issues and mitigation methods in smart grid systems , 2017, SoutheastCon 2017.
[5] Wen-Long Chin,et al. Energy Big Data Security Threats in IoT-Based Smart Grid Communications , 2017, IEEE Communications Magazine.
[6] Farid Abdi,et al. Review on cyber-physical security of the smart grid: Attacks and defense mechanisms , 2015, 2015 3rd International Renewable and Sustainable Energy Conference (IRSEC).
[7] Prakash Ranganathan,et al. A survey on smart grid metering infrastructures: Threats and solutions , 2015, 2015 IEEE International Conference on Electro/Information Technology (EIT).
[8] Naima Kaabouch,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[9] Dilip Patel,et al. Assessing and augmenting SCADA cyber security: A survey of techniques , 2017, Comput. Secur..
[10] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[11] Christoph Ruland,et al. Smart grid security – an overview of standards and guidelines , 2017, Elektrotech. Informationstechnik.
[12] Walid Saad,et al. Smart Grid Security: Threats, Challenges, and Solutions , 2016, ArXiv.
[13] D. Manivannan,et al. A Classification and Characterization of Security Threats in Cloud Computing , 2016, Int. J. Next Gener. Comput..
[14] Jingbo Lin,et al. A Survey on Intrusion Detection System for Advanced Metering Infrastructure , 2016, 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC).
[15] Roger Piqueras Jover,et al. 5G NR Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation , 2018, 2018 IEEE International Conference on Communications Workshops (ICC Workshops).
[16] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[17] Annabelle Lee,et al. Guidelines for Smart Grid Cyber Security , 2010 .
[18] B. S. Bindhumadhava,et al. SCADA communication protocols: vulnerabilities, attacks and possible mitigations , 2013, CSI Transactions on ICT.
[19] Zahid Ullah,et al. Internet of Things Security, Device Authentication and Access Control: A Review , 2019, ArXiv.
[20] Adil Al-Yasiri,et al. Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework , 2016, Int. J. Inf. Technol. Web Eng..
[21] Fengjun Li,et al. Cyber-Physical Systems Security—A Survey , 2017, IEEE Internet of Things Journal.