The importance of testing Smart Grid IEDs against security vulnerabilities
|
conference
|
April 2016 |
Improving Network Infrastructure Security by Partitioning Networks Running Spanning Tree Protocol
|
conference
|
January 2006 |
A Survey of Ethernet LAN Security
|
journal
|
October 2013 |
Internet of Things (IoT) communication protocols: Review
|
conference
|
May 2017 |
A review on security and privacy issues in wireless sensor networks
|
conference
|
May 2017 |
OSI upper layer protocol requirements for TMN operations
|
conference
|
January 1988 |
Malicious JavaScript Insertion through ARP Poisoning Attacks
|
journal
|
May 2009 |
Research based on OSI model
|
conference
|
May 2011 |
Development of unidirectional security gateway appliance using intel 82580EB NIC interface
|
conference
|
October 2016 |
Rapid migration of VMs on a datacenter under cyber attack over optical infrastructure
|
conference
|
October 2016 |
Short Paper: IP spoofing detection for preventing DDoS attack in Cloud Computing
|
conference
|
January 2015 |
Integrated TCP/IP protocol software testing for vulnerability detection
-
2003 International Conference on Computer Networks and Mobile Computing. ICCNMC 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003.
https://doi.org/10.1109/ICCNMC.2003.1243061
|
conference
|
January 2003 |
Integrity based relationships and trustworthy communication between network participants
- Oberle, Alexander; Larbig, Pedro; Kuntze, Nicolai
-
ICC 2014 - 2014 IEEE International Conference on Communications, 2014 IEEE International Conference on Communications (ICC)
https://doi.org/10.1109/ICC.2014.6883386
|
conference
|
June 2014 |
Cyber intrusion of wind farm SCADA system and its impact analysis
|
conference
|
March 2011 |
Light weight approach for IP-ARP spoofing detection and prevention
|
conference
|
November 2011 |
FTTH network survivability security based on massive fiber optic mechanical switch in consolidated central office
|
conference
|
July 2010 |
Security features in ethernet switches for access networks
|
conference
|
January 2003 |
Comparative Evaluation of Spoofing Defenses
|
journal
|
March 2011 |
An improved secret key update for multiple intersymbol obfuscation in physical layer security
|
conference
|
September 2017 |
The Security and Promotion Method of Transport Layer of TCP/IP Agreement
- Hao-yu, Wang; Hui-zhi, Cao; Xu, Zhu
-
2010 2nd International Conference on Information Technology and Computer Science (ITCS 2010), 2010 Second International Conference on Information Technology and Computer Science
https://doi.org/10.1109/ITCS.2010.132
|
conference
|
July 2010 |
Transport Level Address for application level communication
|
conference
|
August 2009 |
Quantum Cryptography For Secure Optical Networks
|
conference
|
June 2007 |
Building blocks of a simulation environment of the OSI network layer of packet-switching networks
- Gerisch, A.; Lawniczak, A. T.; Di Stefano, B.
-
CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436)
https://doi.org/10.1109/CCECE.2003.1226080
|
conference
|
January 2003 |
Telecommunication traffic through submarine cables: Security and vulnerabilities
|
conference
|
December 2016 |
A Survey of Man In The Middle Attacks
|
journal
|
October 2016 |
Data security on Ethernet LANs
- Hadjina, N.; Thompson, P.
-
10th Mediterranean Electrotechnical Conference - MELECON 2000, 2000 10th Mediterranean Electrotechnical Conference. Information Technology and Electrotechnology for the Mediterranean Countries. Proceedings. MeleCon 2000 (Cat. No.00CH37099)
https://doi.org/10.1109/MELCON.2000.880359
|
conference
|
January 1998 |
A comprehensive study on security attacks on SSL/TLS protocol
|
conference
|
October 2016 |
A survey on security assessment of metering infrastructure in Smart Grid systems
|
conference
|
April 2015 |
End-to-end encryption at the network layer
|
conference
|
January 1990 |
Primary frequency control and dynamic grid support for vehicle-to-grid in transmission systems
|
journal
|
September 2018 |
Wireless transmission of RS232 interface signal based on ZigBee
|
conference
|
July 2010 |
A Thin Security Layer Protocol over IP Protocol on TCP/IP Suite for Security Enhancement
|
conference
|
November 2006 |
Analysis and application of Wireshark in TCP/IP protocol teaching
-
2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies (EDT), 2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT)
https://doi.org/10.1109/EDT.2010.5496372
|
conference
|
April 2010 |
Transport layer proxy for stateful UDP packet filtering
|
conference
|
January 2002 |
Controlling IP Spoofing through Interdomain Packet Filters
|
journal
|
January 2008 |
Research on the network security based on radiated virus
|
conference
|
October 2010 |
Enhanced utility-scale photovoltaic units with frequency support functions and dynamic grid support for transmission systems
|
journal
|
February 2017 |
Smart grids security challenges: Classification by sources of threats
|
journal
|
December 2018 |
A link-layer-based self-replicating vulnerability discovery agent
|
conference
|
June 2010 |
Fairness issues for mixed TCP/OSI internets
|
conference
|
January 1991 |
Communications Link Layer Security
|
conference
|
November 2006 |
Performance Comparison of TCP, UDP, and TFRC in Wired Networks
- Pakanati, Chennareddy; Padmavathamma, M.; Reddy, N. Ramanjaneya
-
2015 IEEE International Conference on Computational Intelligence & Communication Technology (CICT)
https://doi.org/10.1109/CICT.2015.37
|
conference
|
February 2015 |
Cyber security vulnerability assessment for Smart substations
|
conference
|
October 2016 |
Traffic flow confidentiality security service in OSI computer network architecture
|
conference
|
January 1990 |
Security in the OSI model
|
journal
|
January 1988 |
An interactive visualization tool for teaching ARP spoofing attack
|
conference
|
October 2017 |
Adaptive cross-layer-based TCP congestion control for 4G wireless mobile cloud access
|
conference
|
May 2016 |
A security standard for LANs
|
conference
|
January 1990 |
OSI Reference Model--The ISO Model of Architecture for Open Systems Interconnection
|
journal
|
April 1980 |
Cross layer approach for detection and prevention of Sinkhole Attack using a mobile agent
|
conference
|
October 2017 |
Packet scheduling attacks on shipboard networked control systems
|
conference
|
August 2015 |
Cyber-power system security in a smart grid environment
|
conference
|
January 2012 |
Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication
|
journal
|
January 2015 |
Authenticated anonymous secure on demand routing protocol in VANET (Vehicular adhoc network)
|
conference
|
February 2017 |
Smart Home Communication Technologies and Applications: Wireless Protocol Assessment for Home Area Network Resources
|
journal
|
July 2015 |
Cyber attack models for smart grid environments
|
journal
|
December 2017 |
Detecting SIP flooding attacks on IP Multimedia Subsystem (IMS)
|
conference
|
January 2012 |
Electric Utility Enterprise Architecture to Support the Smart Grid - Enterprise Architecture for the Smart Grid [Electric Utility Enterprise Architecture to Support the Smart Grid - Enterprise Architecture for the Smart Grid]
|
conference
|
September 2014 |
Cyber security attacks on network with transition mechanisms
|
conference
|
December 2015 |
Defending mechanisms for protecting power systems against intelligent attacks
|
conference
|
May 2015 |
An open network management architecture: OSI/NM Forum architecture and concepts
|
journal
|
July 1990 |
What protection engineers need to know about networking
|
conference
|
March 2015 |
A survey on ARP cache poisoning and techniques for detection and mitigation
- Meghana, Jitta Sai; Subashri, T.; Vimal, K. R.
-
2017 Fourth International Conference on Signal Processing,Communication and Networking (ICSCN), 2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN)
https://doi.org/10.1109/ICSCN.2017.8085417
|
conference
|
March 2017 |
UDP based chat application
|
conference
|
April 2010 |
Analysis of low-rate TCP DoS attack against FAST TCP
- Dong, Kuo; Yang, Shoubao; Wang, Shaolin
-
2006 6th International Conference on Intelligent Systems Design and Applications, Sixth International Conference on Intelligent Systems Design and Applications
https://doi.org/10.1109/ISDA.2006.12
|
conference
|
October 2006 |
Research on the effects of transport protocols on the application performance based on OPNET
|
conference
|
June 2016 |
Real time test bed development for power system operation, control and cyber security
|
conference
|
September 2010 |
Design of framework and analysis of Internet of things at data link layer
|
conference
|
August 2017 |
Context Information based Cyber Security Defense of Protection System
|
conference
|
June 2007 |
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13
- Kolahi, Samad S.; Treseangrat, Kiattikul; Sarrafpour, Bahman
-
2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), 2015 International Conference on Communications, Signal Processing, and their Applications (ICCSPA'15)
https://doi.org/10.1109/ICCSPA.2015.7081286
|
conference
|
February 2015 |
Powerful IEDs, ethernet networks and their effects on IEC 61850-based electric power utilities security
|
conference
|
November 2017 |
Orchestration of reliable three-layer networks
|
conference
|
July 2017 |
Security problems in the TCP/IP protocol suite
|
journal
|
April 1989 |
Maximizing Ethernet Security by Switch-Based Single Secure Domain
|
conference
|
April 2010 |
Secure group communication schemes for dynamic heterogeneous distributed computing
|
journal
|
September 2017 |
An Architecture for Multi-Security Level Network Traffic
|
conference
|
October 2006 |
IP network-based trust management system
- Wang, Yan-hong
-
2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2011), 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
https://doi.org/10.1109/FSKD.2011.6019936
|
conference
|
July 2011 |
Demystifying and Rate Limiting ICMP hosted DoS/DDoS Flooding Attacks with Attack Productivity Analysis
|
conference
|
March 2009 |