SIA OpenIR

Browse/Search Results:  1-10 of 35 Help

Selected(0)Clear Items/Page:    Sort:
A Deviation-based Detection Method against False Data Injection Attacks in Smart Grid 期刊论文
IEEE Access, 2021, 卷号: 9, 页码: 15499-15509
Authors:  Pei C(裴超);  Xiao Y(肖杨);  Liang W(梁炜);  Han XJ(韩晓佳)
Adobe PDF(1278Kb)  |  Favorite  |  View/Download:37/0  |  Submit date:2021/01/30
State estimation  false data injection attacks  smart grid  cyber security  Kalman filter  cyber physical system  
Research on Security Mechanism of Service Interoperability Based on Power Grid Computer System 会议论文
2nd International Conference on Computing and Data Science, CONF-CDS 2021, Stanford, United States, January 28-30, 2021
Authors:  Zhang, Yuling;  Wang, Jijun;  Liu WC(刘文成);  Wang T(王挺)
Adobe PDF(304Kb)  |  Favorite  |  View/Download:11/0  |  Submit date:2021/05/24
OPC UA  Power Grid  Security  Service Interoperability  
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms 期刊论文
CHINA COMMUNICATIONS, 2021, 卷号: 18, 期号: 1, 页码: 130-150
Authors:  Wan M(万明);  Li JW(李嘉玮);  Liu Y(刘颖);  Zhao JM(赵剑明);  Wang, Jiushuang
Adobe PDF(2763Kb)  |  Favorite  |  View/Download:48/3  |  Submit date:2021/03/14
industrial cyber threats  industrial characteristics  vulnerabilities  security mechanisms and viewpoints  
Federated Tensor Mining for Secure Industrial Internet of Things 期刊论文
IEEE Transactions on Industrial Informatics, 2020, 卷号: 16, 期号: 3, 页码: 2144-2153
Authors:  Kong LH(孔令和);  Liu, Xiao-Yang;  Sheng H(盛浩);  Zeng P(曾鹏);  Chen, Guihai
Adobe PDF(1507Kb)  |  Favorite  |  View/Download:129/24  |  Submit date:2020/02/17
Industrial internet of things  security  tensor-based data mining  
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 361-374
Authors:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜)
Adobe PDF(3069Kb)  |  Favorite  |  View/Download:212/34  |  Submit date:2019/10/10
Smart grid  electricity theft  suspicion assessment  malicious meter inspection  security  
GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids 期刊论文
IEEE Transactions on Network Science and Engineering, 2020, 卷号: 7, 期号: 2, 页码: 805-816
Authors:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜);  Zheng M(郑萌)
Adobe PDF(1545Kb)  |  Favorite  |  View/Download:187/15  |  Submit date:2018/07/31
Electricity theft  smart grid  smart meters  cyber attacks  security  
Blockchain-Based Mobile Crowd Sensing in Industrial Systems 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 卷号: 16, 期号: 10, 页码: 6553-6563
Authors:  Huang, Junqin;  Kong LH(孔令和);  Dai, Hong-Ning;  Ding, Weiping;  Cheng, Long;  Chen GH(陈贵海);  Jin X(金曦);  Zeng P(曾鹏)
Adobe PDF(2216Kb)  |  Favorite  |  View/Download:53/25  |  Submit date:2020/07/18
Sensors  Blockchain  Reliability  Data integrity  Mobile handsets  Industries  Blockchain  mobile crowd sensing (MCS)  mobility  scalability  security  smart factory  
PMU Placement Protection against Coordinated False Data Injection Attacks in Smart Grid 期刊论文
IEEE Transactions on Industry Applications, 2020, 卷号: 56, 期号: 4, 页码: 4381-4393
Authors:  Pei C(裴超);  Xiao Y(肖杨);  Liang W(梁炜);  Han XJ(韩晓佳)
Adobe PDF(1502Kb)  |  Favorite  |  View/Download:118/8  |  Submit date:2020/08/22
Cyber security  cyber-physical system  false data injection  phase measurement units (PMUs)  state estimation  smart grid  
Security monitoring method for ICS based on information gain ratio and maximum entropy model 会议论文
Proceedings - 2020 Chinese Automation Congress, CAC 2020, Shanghai, China, November 6-8, 2020
Authors:  Li SG(李声刚);  Shang WL(尚文利);  Chen CY(陈春雨);  Lu, Yan;  Dong, Zhiwei;  Xu, Ye
Adobe PDF(1078Kb)  |  Favorite  |  View/Download:7/0  |  Submit date:2021/03/14
Industrial control system  Information gain ratio  Maximum entropy model  Security monitoring  
Offloading Optimization for Low-Latency Secure Mobile Edge Computing Systems 期刊论文
IEEE Wireless Communications Letters, 2020, 卷号: 9, 期号: 4, 页码: 480-484
Authors:  Zhou, Yi;  Yeoh, Phee Lep;  Pan, Cunhua;  Wang, Kezhi;  Elkashlan, Maged;  Wang ZF(王忠锋);  Vucetic, Branka;  Li, Yonghui
Adobe PDF(620Kb)  |  Favorite  |  View/Download:61/14  |  Submit date:2020/05/03
Mobile edge computing  latency minimization  physical layer security  joint optimization