Threat landscape for smart grid systems
暂无分享,去创建一个
Costas Vassilakis | Nicholas Kolokotronis | Konstantinos-Panagiotis Grammatikakis | Vasiliki-Georgia Bilali | Christos-Minas Mathas | Dimitris Kavallieros | C. Vassilakis | N. Kolokotronis | Christos-Minas Mathas | D. Kavallieros | Konstantinos-Panagiotis Grammatikakis | Vasiliki-Georgia Bilali
[1] Mihui Kim,et al. Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid , 2012 .
[2] Lingfeng Wang,et al. A game-theoretic study of load redistribution attack and defense in power systems , 2017 .
[3] David M. Laverty,et al. Telecommunications for Smart Grid: Backhaul solutions for the distribution network , 2010, IEEE PES General Meeting.
[4] Guang Gong,et al. Security Challenges in Smart-Grid Metering and Control Systems , 2013 .
[5] David M. Nicol,et al. An event buffer flooding attack in DNP3 controlled SCADA systems , 2011, Proceedings of the 2011 Winter Simulation Conference (WSC).
[6] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[7] Zuyi Li,et al. Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.
[8] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[9] Benahmed Khelifa,et al. Security concerns in smart grids: Threats, vulnerabilities and countermeasures , 2015, 2015 3rd International Renewable and Sustainable Energy Conference (IRSEC).
[10] Zhu Han,et al. Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.
[11] Sanjay Goel,et al. Security Challenges in Smart Grid Implementation , 2015 .
[12] Miguel Correia,et al. The CRUTIAL Architecture for Critical Information Infrastructures , 2008, WADS.
[13] Barbara Filkins,et al. Secure Architecture for Industrial Control Systems , 2020 .
[14] Martine Chlela,et al. Fallback Control for Isochronous Energy Storage Systems in Autonomous Microgrids Under Denial-of-Service Cyber-Attacks , 2018, IEEE Transactions on Smart Grid.
[15] Husheng Li,et al. Time Stamp Attack in Smart Grid: Physical Mechanism and Damage Analysis , 2012, ArXiv.
[16] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[17] Xiaohui Liang,et al. Securing smart grid: cyber attacks, countermeasures, and challenges , 2012, IEEE Communications Magazine.
[18] Tanya L. Brewer,et al. Guidelines for Smart Grid Cybersecurity , 2014 .
[19] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[20] Stephen B. Wicker,et al. Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.
[21] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[22] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[23] Guilin Zheng,et al. Residential Appliances Identification and Monitoring by a Nonintrusive Method , 2012, IEEE Transactions on Smart Grid.
[24] Oliver Kosut,et al. Load Redistribution Attack Detection using Machine Learning: A Data-Driven Approach , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).
[25] Resul Das,et al. Cyber-security on smart grid: Threats and potential solutions , 2020, Comput. Networks.
[26] Miguel Correia,et al. CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture , 2006, CRITIS.
[27] Yang Liu,et al. A survey on bad data injection attack in smart grid , 2013, 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).
[28] Oliver Kosut,et al. Detecting Load Redistribution Attacks via Support Vector Models , 2020, ArXiv.
[29] Titiek Suryani,et al. Lightweight and DoS Resistant Multiuser Authentication in Wireless Sensor Networks for Smart Grid Environments , 2019, IEEE Access.
[30] B. K. Panigrahi,et al. Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.
[31] Jagath Samarabandu,et al. An Intrusion Detection System for IEC61850 Automated Substations , 2010, IEEE Transactions on Power Delivery.
[32] Husheng Li,et al. Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.
[33] Naima Kaabouch,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[34] Peng Liu,et al. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[35] Ahmad-Reza Sadeghi,et al. SEDA: Scalable Embedded Device Attestation , 2015, CCS.
[36] Nada Golmie,et al. NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0 , 2014 .
[37] Steven M. Bellovin,et al. Defending against Sequence Number Attacks , 2012, RFC.
[38] Ross Anderson,et al. Smart meter security : a survey , 2011 .
[39] H. Vincent Poor,et al. Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching , 2015, IEEE Transactions on Dependable and Secure Computing.
[40] Tirza Routtenberg,et al. Detection of False Data Injection Attacks in Power Systems with Graph Fourier Transform , 2018, 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[41] Saurabh Ganeriwal,et al. On selfish behavior in CSMA/CA networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[42] Tobby Simon,et al. Critical Infrastructure and the Internet of Things , 2017 .
[43] Y. Ahmet Sekercioglu,et al. Security and Smart Metering , 2012, EW.
[44] Zuyi Li,et al. Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.
[45] Mauro Conti,et al. SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN , 2018, IEEE Transactions on Network and Service Management.
[46] Walid Saad,et al. Smart Grid Security: Threats, Challenges, and Solutions , 2016, ArXiv.