Open Access
Issue |
E3S Web of Conf.
Volume 540, 2024
1st International Conference on Power and Energy Systems (ICPES 2023)
|
|
---|---|---|
Article Number | 10014 | |
Number of page(s) | 11 | |
Section | Grid Connected Systems | |
DOI | https://doi.org/10.1051/e3sconf/202454010014 | |
Published online | 21 June 2024 |
- E. W. Gunther, A. Snyder, G. Gilchrist, and D. R. Highfill, “Smart Grid Standards Assessment and Recommendations for Adoption and Development (Draft v0. 82), “ Enernex for California Energy Commission, 2009. [Google Scholar]
- U.S. Department of Commerce, “NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1. 0 (Draft), “ 2009. [Google Scholar]
- S.-S. Yeo, D.-J. Kang, and J. H. Park, “Intelligent decisionmaking system with green pervasive computing for renewable energy business in electricity markets on smart grid,” Eurasip Journal on Wireless Communications and Networking, vol. 2009, Article ID 247483, 2009. [Google Scholar]
- K. Geun-Young and K. Young-Myoung, “Implemen-tation of Telco Home Networkbased AMI,” Journal of the Korean Institute of Information Scientists and Engineers, vol. 27, no. 11, pp. 93–97, 2009. [Google Scholar]
- D.-S. Wang and J.-P. Li, “A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards,” International Journal of Security and Its Applications, vol. 5, no. 4, pp. 1–12, 2011. [Google Scholar]
- H. Jin-Bum and H. Jong-Wook, “A security model for home networks with authority delegation,” in Proceedings of the International Conference on Computational Science and Its Applications (ICCSA ‘4), pp. 360–369, 2006. [Google Scholar]
- S. Sun, Z. Yan, and J. Zambreno, “Demonstrable differential power analysis attacks on real-world FPGA-based embedded systems,” Integrated Computer-Aided Engineering, vol. 16, no. 2, pp. 119–130, 2009. [CrossRef] [Google Scholar]
- D.-E. Cho, B.-S. Koh, and S.-S. Yeo, “Secure D-CAS system for digital contents downloading services,” Journal of Supercomputing, vol. 64, no. 26, pp. 477–491, 2011. [Google Scholar]
- T. A. L. Pham, N. Le-Thanh, and P. Sander, “Decompositionbased reasoning for large knowledge bases in description logics,” Integrated Computer-Aided Engineering, vol. 15, no. 1, pp. 53–70, 2008. [CrossRef] [Google Scholar]
- X. Tao, Y. Li, and R. Nayak, “A knowledge retrieval model using ontology mining and user profiling,” Integrated Computer-Aided Engineering, vol. 15, no. 4, pp. 313–329, 2008. [CrossRef] [Google Scholar]
- Q. Chen, S. Zhang, and Y.-P. P. Chen, “Rule-based dependency models for security protocol analysis,” Integrated ComputerAided Engineering, vol. 15, no. 4, pp. 369–380, 2008. [CrossRef] [Google Scholar]
- H. Ko, G. Marreiros, H. Morais, Z. Vale, and C. Ramos, “Intelligent supervisory control system for home devices using a cyber physical approach,” Integrated Computer-Aided Engineering, vol. 19, no. 1, pp. 67–79, 2012. [CrossRef] [Google Scholar]
- S.-C. Kim, S.-S. Yeo, and S. K. Kim, “A hybrid user authentication protocol for mobile IPTV service,” Multimedia Tools and Applications, pp. 1–14, 2011. [Google Scholar]
- A. Sanchez, E. O. Nunes, and A. Conci, “Using adaptive ´ background subtraction into a multi-level model for traffic surveillance,” Integrated Computer-Aided Engineering, vol. 19, no. 3, pp. 239–256, 2012. [CrossRef] [Google Scholar]
- L. Tan and S. Xu, “A model-checking-based approach to risk analysis in supply chain consolidations,” Integrated ComputerAided Engineering, vol. 16, no. 3, pp. 243–257, 2009. [CrossRef] [Google Scholar]
- https://sites.google.com/a/itrconline.net/itrc/projectinfo/2012 semina. [Google Scholar]
- J. Kim, H. Jeon, and J. Lee, “Network management framework and lifetime evaluation method for wireless sensor networks,” Integrated Computer-Aided Engineering, vol. 19, no. 2, pp. 165– 178, 2012. [Google Scholar]
- D.-E. Cho and S.-J. Kim, “Study on safe remote control method of home device under environment of smart grid,” Lecture Notes in Electrical Engineering, vol. 179, no. 2, pp. 281–286, 2012. [CrossRef] [Google Scholar]
- Z. Bankovic, J. M. Moya, ´ A. Araujo, D. Fraga, J. C. Vallejo, and ´ J.-M. de Goyeneche, “Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps,” Integrated Computer-Aided Engineering, vol. 17, no. 2, pp. 87–102, 2010. [CrossRef] [Google Scholar]
- D.-E. Cho, H.-J. Shin, and S.-J. Kim, “The personal information protection technique in smart grid environment,” Information B, vol. 16, no. 3, pp. 2179–2184, 2013. [Google Scholar]
- NIST, “Smart Grid Cyber Security Strategy and Requirements,” DRAFT NISTIR, 7628, 2010. [Google Scholar]
- P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security and Privacy, vol. 7, no. 3, pp. 75–77, 2009 [CrossRef] [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.