Measuring Stakeholders' Perceptions of Cybersecurity for Renewable Energy Systems
暂无分享,去创建一个
Stuart E. Madnick | Richard Wang | Diane M. Strong | Yang W. Lee | Mohammad S. Jalali | Michael D. Siegel | Dinsha Mistree | Wee Horng Ang | Vicki Deng | S. Madnick | Richard Y. Wang | Yang W. Lee | M. Jalali | D. Strong | M. Siegel | Dinsha Mistree | Vicki Deng
[1] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[2] John McCumber,et al. Assessing and Managing Security Risk in IT Systems , 2004 .
[3] Steve R. White,et al. Fighting Computer Viruses , 1997 .
[4] Rolf Oppliger,et al. Internet security: firewalls and beyond , 1997, CACM.
[5] Elizabeth D. Zwicky,et al. Building internet firewalls , 1995 .
[6] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[7] Hamid Gharavi. Smart Grid: The Electric Energy System of the Future , 2011 .
[8] I. Pearson. Smart grid cyber security for Europe , 2011 .
[9] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[10] L. Cronbach. Coefficient alpha and the internal structure of tests , 1951 .
[11] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[12] Bill Cheswick,et al. Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.