Security risks evaluation toolbox for smart grid devices
Abstract
References
Index Terms
- Security risks evaluation toolbox for smart grid devices
Recommendations
Security risks evaluation toolbox for smart grid devices
SIGCOMM '13: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMMNumerous smart devices are deployed in smart grid for state measurement, decision-making and remote control. The security issues of smart devices attract more and more attention. In our work, the communication protocol, storage mechanism and ...
An agent-based self-adaptation architecture for implementing smart devices in Smart Space
Smart Space is a major currently challenging domain that includes ubiquitous, grid, and pervasive computing to provide intelligence, insight, and vision for emerging world of intelligent environment, products, services and human interaction. Smart Space ...
Security of Smart Grid Networks in the Cyber Ranges
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecuritySmart meters are increasingly a part of everyday households. These smart meters allow remote reading of the energy but also remote disconnection of the point of consumption from the energy supply. As these devices are part of the critical infrastructure ...
Comments
Information & Contributors
Information
Published In

- August 2013580 pagesISBN:9781450320566DOI:10.1145/2486001
- General Chairs:
- Dah Ming Chiu,
- Jia Wang,
- Program Chairs:
- Paul Barford,
- Srinivasan Seshan
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Demonstration
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- View Citations4Total Citations
- 544Total Downloads
- Downloads (Last 12 months)71
- Downloads (Last 6 weeks)14
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in