Building an Effective Security Program for Distributed Energy Resources and Systems
暂无分享,去创建一个
[1] Subrata K. Sarker,et al. A survey on control issues in renewable energy integration and microgrid , 2019, Protection and Control of Modern Power Systems.
[2] Edyta Ropuszyńska-Surma,et al. The Virtual Power Plant – A Review Of Business Models , 2019, E3S Web of Conferences.
[3] Mason Rice,et al. Incentivizing Cyber Security Investment in the Power Sector Using An Extended Cyber Insurance Framework , 2019 .
[4] Jason F. Clemente,et al. Cyber Security for Critical Energy Infrastructure , 2018 .
[5] Karla Straker,et al. The typologies of power: Energy utility business models in an increasingly renewable sector , 2018, Journal of Cleaner Production.
[6] Ying Liu,et al. Applications of Graph Connectivity to Network Security , 2018 .
[7] Jin Wei,et al. Hybrid Communication Architectures for Distributed Smart Grid Applications , 2018 .
[8] Sneha A. Dalvi,et al. Internet of Things for Smart Cities , 2017 .
[9] Thierry Van Cutsem,et al. Contribution to Bulk System Control and Stability by Distributed Energy Resources connected at Distribution Network , 2017 .
[10] Dmitry Baimel,et al. Smart Grid Communication Technologies , 2016 .
[11] Andrzej Bialas,et al. Risk Management in Critical Infrastructure—Foundation for Its Sustainable Work , 2016 .
[12] Daryl Haegley. Governance and Assessment Strategies for Industrial Control Systems , 2016 .
[13] Lambros Sarakis,et al. Communication challenges in Smart Grid , 2016 .
[14] Monica T. Whitty. Mass-Marketing Fraud: A Growing Concern , 2015, IEEE Security & Privacy.
[15] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[16] Lamine Mili,et al. On the Definition of Cyber-Physical Resilience in Power Systems , 2015, ArXiv.
[17] Alagan Anpalagan,et al. Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring , 2015, Sensors.
[18] Edward A. Lee. The Past, Present and Future of Cyber-Physical Systems: A Focus on Models , 2015, Sensors.
[19] Lyman Chapin,et al. THE INTERNET OF THINGS : AN OVERVIEW Understanding the Issues and Challenges of a More Connected World , 2015 .
[20] Advisor,et al. Breaches on the Rise in Control Systems : A SANS Survey , 2015 .
[21] Craig G. Rieger,et al. Resilient control systems Practical metrics basis for defining mission impact , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).
[22] Andrea Prati,et al. Integrating Consumer Smart Cameras into Camera Networks: Opportunities and Obstacles , 2014, Computer.
[23] Andrea Cavallaro,et al. Self-Reconfigurable Smart Camera Networks , 2014, Computer.
[24] Rama Chellappa,et al. Camera Networks for Healthcare, Teleimmersion, and Surveillance , 2014, Computer.
[25] Adam Sedgewick,et al. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0 , 2014 .
[26] Dan Craigen,et al. Defining Cybersecurity , 2014 .
[27] Quang-Dung Ho,et al. Wireless Communications Technologies for the SGCN , 2014 .
[28] Marimuthu Palaniswami,et al. Control and communication techniques for the smart grid: an energy efficiency perspective , 2014 .
[29] Xiaodong Wang,et al. Privacy-Preserving Energy Scheduling in Microgrid Systems , 2013, IEEE Transactions on Smart Grid.
[30] Renke Huang,et al. Advanced Distribution Management System , 2013, IEEE Transactions on Smart Grid.
[31] Fangxing Li,et al. $S^{3}A$ : A Secure Data Sharing Mechanism for Situational Awareness in The Power Grid , 2013, IEEE Transactions on Smart Grid.
[32] Rossouw von Solms,et al. From information security to cyber security , 2013, Comput. Secur..
[33] M. Salim Beg,et al. Vulnerability Analysis of Wide Area Measurement System in the Smart Grid , 2013 .
[34] Yuan Zhang,et al. Distributed energy management under smart grid plug-and-play operations , 2013, 2013 IEEE Power & Energy Society General Meeting.
[35] Faisal Tariq,et al. Smart Grid Communication and Networking Technologies: Recent Developments and Future Challenges , 2013 .
[36] Wilfried Elmenreich,et al. Smart Microgrids: Overview and Outlook , 2013, ArXiv.
[37] Sandro Bologna,et al. Critical Information Infrastructure Protection and Resilience in the ICT Sector , 2013 .
[38] Mohammad Shahidehpour,et al. Background of Power System Stability , 2013 .
[39] Barack Obama,et al. Executive Order 13636: Improving Critical Infrastructure Cybersecurity , 2013 .
[40] B. Obama. Presidential Policy Directive 21: Critical Infrastructure Security and Resilience , 2013 .
[41] Chris W. Johnson. The Telecoms Inclusion Principle: The Missing Link between Critical Infrastructure Protection and Critical Information Infrastructure Protection , 2013 .
[42] Mathias Uslar. Introduction and Smart Grid Basics , 2013 .
[43] Eric Luiijf. Next Generation Information-Based Infrastructures: New Dependencies and Threats , 2013 .
[44] Eric Ouellet,et al. Magic Quadrant for Endpoint Protection Platforms , 2013 .
[45] Giovanna Dondossola,et al. Cyber Risks in Energy Grid ICT Infrastructures , 2013 .
[46] Hamid Sharif,et al. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.
[47] William H. Sanders,et al. SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.
[48] Nada Golmie,et al. Wireless Networks for Smart Grid Applications | NIST , 2012 .
[49] Elias Kyriakides,et al. On the complexities of interdependent infrastructures for wide area monitoring systems , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.
[50] Min Ouyang,et al. A three-stage resilience analysis framework for urban infrastructure systems , 2012 .
[51] M. Wolsink. The research agenda on social acceptance of distributed generation in smart grids: Renewable as common pool resources , 2012 .
[52] Elias Kyriakides,et al. Electrical Power Systems Protection and Interdependencies with ICT , 2012, Telecommunication Economics.
[53] J. Hull,et al. Staying in control: Cybersecurity and the modern electric grid , 2012, IEEE Power and Energy Magazine.
[54] D. E. Nordell. Terms of Protection: The Many Faces of Smart Grid Security , 2012, IEEE Power and Energy Magazine.
[55] Erkki Antila,et al. Reliability and Availability Investigation for Next-Generation Substation Function Based on IEC 61850 , 2012 .
[56] Bruno Sinopoli,et al. A Cyber–Physical Systems Approach to Data Center Modeling and Control for Energy Efficiency , 2012, Proceedings of the IEEE.
[57] Aiko Pras,et al. Topics in network and service management , 2012, IEEE Commun. Mag..
[58] M. Rihan,et al. Developing smart grid in India: Background and progress , 2011, 2011 IEEE PES Conference on Innovative Smart Grid Technologies - Middle East.
[59] Nasser Modiri,et al. Information Security Management , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.
[60] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[61] Stamatis Karnouskos,et al. Cyber-Physical Systems in the SmartGrid , 2011, 2011 9th IEEE International Conference on Industrial Informatics.
[62] Dongho Won,et al. Advanced Information Security Management Evaluation System , 2011, KSII Trans. Internet Inf. Syst..
[63] Jennifer L. Bayuk. Systems Security Engineering , 2011, IEEE Security & Privacy.
[64] C. Rieger,et al. Critical National Need Idea Critical National Need Title : Smart is Not Enough : Resilience and Securing the Power Grid , 2011 .
[65] Mariana Hentea,et al. Smart power grid security: A unified risk management approach , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[66] Reza Dashti,et al. Energy efficiency based asset management infrastructures in electrical distribution system , 2010, 2010 IEEE International Conference on Power and Energy.
[67] Sebastiaan H. von Solms,et al. The 5 Waves of Information Security - From Kristian Beckman to the Present , 2010, SEC.
[68] Khosrow Moslehi,et al. A Reliability Perspective of the Smart Grid , 2010, IEEE Transactions on Smart Grid.
[69] Shi-Chung Chang,et al. Communication infrastructure of smart grid , 2010, 2010 4th International Symposium on Communications, Control and Signal Processing (ISCCSP).
[70] Jonathan Dipl.-Ing. Brix,et al. Electrical energy storage , 2010 .
[71] William W. Agresti. The Four Forces Shaping Cybersecurity , 2010, Computer.
[72] J. K. Kok,et al. Intelligence in Electricity Networks for Embedding Renewables and Distributed Generation , 2010 .
[73] John D Moteff. Critical Infrastructures: Background, Policy, and Implementation , 2009 .
[74] Daniele Catteddu,et al. Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .
[75] Simon S. Y. Shim,et al. The Web as the Ubiquitous Computer , 2009, Computer.
[76] David Schneider. Is this the moment for broadband over power lines? , 2009, IEEE Spectrum.
[77] Arindam Maitra,et al. Intelligent Universal Transformer design and applications , 2009 .
[78] Fred B. Schneider,et al. IT Monoculture Security Risks and Defenses , 2009, IEEE Secur. Priv..
[79] Carl A. Gunter,et al. Addressing Safety and Security Contradictions in Cyber-Physical Systems , 2009 .
[80] R.Y.K. Fung,et al. Knowledge-Centric Information Security , 2008, 2008 International Conference on Security Technology.
[81] Miguel Correia,et al. The Crutial Way of Critical Infrastructure Protection , 2008, IEEE Security & Privacy Magazine.
[82] Charles C. Palmer,et al. Process Control System Security: Bootstrapping a Legacy , 2008, IEEE Security & Privacy Magazine.
[83] Martin Naedele,et al. Security for Process Control Systems: An Overview , 2008, IEEE Security & Privacy Magazine.
[84] Susan Landau. Security and Privacy Landscape in Emerging Technologies , 2008, IEEE Security & Privacy.
[85] M. Amin,et al. The Electric Power Grid: Today and Tomorrow , 2008 .
[86] Dawn M. Cappelli,et al. Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector , 2008 .
[87] Brendan Jennings,et al. Towards autonomic management of communications networks , 2007, IEEE Communications Magazine.
[88] Mark Burgess,et al. Key research challenges in network management , 2007, IEEE Communications Magazine.
[89] Jangbok Kim,et al. Spam Filtering With Dynamically Updated URL Statistics , 2007, IEEE Security & Privacy.
[90] M. Eric Johnson,et al. Embedding Information Security into the Organization , 2007, IEEE Security & Privacy.
[91] M. David Allen,et al. Measuring Data Management Practice Maturity: A Community's Self-Assessment , 2007, Computer.
[92] Ken Masica,et al. Recommended Practices Guide for Securing ZigBee Wireless Networks in Process Control System Environments: Draft , 2007 .
[93] Antonio Lioy,et al. Dependability in Wireless Networks: Can We Rely on WiFi? , 2007, IEEE Security & Privacy.
[94] Terry V. Benzel,et al. Systemic Security Management , 2006, IEEE Security & Privacy.
[95] F. Sioshansi,et al. How to Get More Response from Demand Response , 2006 .
[96] C. Perrow. Shrink the Targets , 2006, IEEE Spectrum.
[97] K. Schwalm. National Strategy to Secure Cyberspace , 2006 .
[98] Gurpreet Dhillon,et al. Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..
[99] Sebastiaan H. von Solms,et al. Information Security - The Fourth Wave , 2006, Comput. Secur..
[100] John Steven. Adopting an enterprise software security framework , 2006, IEEE Security & Privacy.
[101] Staðlaráð Íslands,et al. Gæðastjórnunarkerfi : grunnatriði og íðorðasafn = Quality Management Systems : fundamentals and vocabulary. , 2006 .
[102] Jeffrey O. Kephart,et al. Research challenges of autonomic computing , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[103] Rana Tassabehji. Principles for Managing Information Security , 2005 .
[104] Rana Tassabehji. Information Security Threats , 2005 .
[105] John Strassner,et al. Autonomic networking theory and practice , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..
[106] Peter P. Swire. A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security? , 2004, J. Telecommun. High Technol. Law.
[107] P. Kundur,et al. Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions , 2004, IEEE Transactions on Power Systems.
[108] Philip Koopman. Embedded System Security , 2004, Computer.
[109] Linda Volonino,et al. Principles and practice of information security : protecting computers from hackers and lawyers , 2004 .
[110] C. Goose,et al. Glossary of Terms , 2004, Machine Learning.
[111] William R. Dunn. Designing Safety-Critical Computer Systems , 2003, Computer.
[112] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[113] Jan H. P. Eloff,et al. A taxonomy for information security technologies , 2003, Comput. Secur..
[114] James M. Anderson,et al. Why we need a new definition of information security , 2003, Comput. Secur..
[115] George W Bush,et al. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , 2003 .
[116] L. Najjar. The missing link. , 2003, Dental assistant.
[117] David Watts. Security & Vulnerability in Electric Power Systems , 2003 .
[118] James P. Peerenboom,et al. Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .
[119] Daniel E. Geer,et al. Information security is information risk management , 2001, NSPW '01.
[120] M. Amin,et al. Toward self-healing energy infrastructure systems , 2001 .
[121] G. Dhillon. Challenges in Managing Information Security in the New Millennium , 2001 .
[122] Sebastiaan H. von Solms,et al. Information Security - The Third Wave? , 2000, Comput. Secur..
[123] G. Dhillon,et al. Technical opinion: Information system security management in the new millennium , 2000, CACM.
[124] Janie Fouke. Threshold of the New Millennium , 2000 .
[125] John Casazza,et al. The Evolution of Electric Power Transmission Under Deregulation: Selected Readings , 2000 .
[126] Neil Barrett. THE CRITICAL INFRASTRUCTURE , 1998 .
[127] H. P Gassmann,et al. OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .
[128] Marie Faerber,et al. “McGraw-Hill Encyclopedia of Science and Technology” , 1960, Nature.