Supplemental Material
Available for Download
- R. Ayoub. Analysis of business driven metrics: Measuring for security value. White Paper, 2008.Google Scholar
- D. Bilar. Quantitative Risk Analysis Of Computer Networks. PhD thesis, Thayer School of Engineering (Dartmouth College), June 2003. Google ScholarDigital Library
- J. Doak and A. Lovato. Framework for responding to network security events (FRNSE). Technical report, Los Alamos National Laboratory, 2008.Google Scholar
- B. Fuller, J. Sikora, and J. Lyons. Review of residential electrical energy use data. Technical report, NAHB Research Center, July 2001.Google Scholar
- O. Kosut, L. Jia, R. Thomas, and L. Tong. Limiting false data attacks on power system state estimation. In Information Sciences and Systems (CISS), pages 1-6. IEEE, 2010.Google ScholarCross Ref
- Q. Liao, D. Cieslak, A. Striegel, and N. Chawla. Using selective, short-term memory to improve resilience against ddos exhaustion attacks. Security and Communication Networks, 1(4):287-299, 2008.Google ScholarCross Ref
- J. F. Maurras, K. Truemper, and M. Akgül. Polynomial algorithms for a class of linear programs. Mathematical Programming, 21:121-136, 1981.Google ScholarDigital Library
- M. Newborough and P. Augood. Demand-side management opportunities for the UK domestic sector. In Generation, Transmission and Distribution, IEE Proceedings, volume 146, pages 283-293. IET, 1999.Google Scholar
- P. Partha, K. Rohloff, M. Atighetchi, and R. Schantz. Managed mission assurance - concept, methodology and runtime support. In Proceedings of SOCIALCOM, pages 1159-1164. IEEE, 2010. Google ScholarDigital Library
- S. Taherian, M. Pias, G. Coulouris, and J. Crowcroft. Profiling energy use in households and office spaces. In Proceedings EECN, pages 21-30. ACM, 2010. Google ScholarDigital Library
- V. Verendel. Quantified security is a weak hypothesis: a critical survey of results and assumptions. In Proceedings of NSPW, pages 37-50. ACM, 2009. Google ScholarDigital Library
- J. Widen, M. Lundh, I. Vassileva, E. Dahlquist, K. Ellegård, and E. Wackelgard. Constructing load profiles for household electricity and hot water from time-use data-modelling approach and validation. Energy and Buildings, 41(7):753-768, 2009.Google ScholarCross Ref
- J. Widen and E. Wackelgard. A high-resolution stochastic model of domestic activity patterns and electricity demand. Applied Energy, 87(6):1880-1892, 2010.Google ScholarCross Ref
Recommendations
Monitoring of Grid scientific workflows
Large-Scale Programming Tools and EnvironmentsScientific workflows are a means of conducting in silico experiments in modern computing infrastructures for e-Science, often built on top of Grids. Monitoring of Grid scientific workflows is essential not only for performance analysis but also to ...
Defending jamming attack in wide-area monitoring system for smart grid
Smart Grid is a promising technology to efficiently manage the power use, transmission and production. An efficient and dependable smart power grid relies on the secure and reliable real-time data collection and transmission service provided by an ...
Software models for smart grid
SE4SG '12: Proceedings of the First International Workshop on Software Engineering Challenges for the Smart GridSmart grid technology is progressing worldwide. Various Countries are investing to transform their traditional power grid to Smart grid. They have started realigning their organization to support a Smart grid vision. At this initial stage some software ...
Comments