The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for SCADA with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1993-2004 (23) 2005-2006 (24) 2007 (18) 2008 (32) 2009 (31) 2010 (41) 2011 (36) 2012 (46) 2013 (61) 2014 (85) 2015 (70) 2016 (90) 2017 (61) 2018 (51) 2019 (74) 2020 (64) 2021 (73) 2022 (61) 2023 (41) 2024 (15)
Publication types (Num. hits)
article(342) incollection(9) inproceedings(632) phdthesis(10) proceedings(4)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 125 occurrences of 90 keywords

Results
Found 997 publication records. Showing 997 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
129Nary Subramanian Improving Security of Oil Pipeline SCADA Systems Using Service-Oriented Architectures. Search on Bibsonomy OTM Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF petroleum, security, architecture, pipeline, services, SCADA
114Rodrigo Chandia, Jesús González 0004, Tim Kilpatrick, Mauricio Papa, Sujeet Shenoi Security Strategies for SCADA Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA networks, forensics, security services
108Dong-Joo Kang, Hak-Man Kim A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
108Andrew K. Wright, John A. Kinast, Joe McCarty Low-Latency Cryptographic Protection for SCADA Communications. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
98Henrik Christiansson, Eric A. M. Luiijf Creating a European SCADA Security Testbed. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security testbed, risk assessment, SCADA systems
98Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto SKMA: a key management architecture for SCADA systems. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF SCADA security, key distribution center (KDC), key establishment protocols, key management, secure protocol
83Jill Slay, Michael Miller Lessons Learned from the Maroochy Water Breach. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA security, Maroochy Water Services breach
83Jill Slay, Elena Sitnikova The Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, forensics, process control systems, SCADA
83Paul W. Oman, Matthew Phillips Intrusion Detection and Event Monitoring in SCADA Networks. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SCADA networks, Intrusion detection, real-time monitoring
68François Bry, Bernhard Lorenz, Hans Jürgen Ohlbach, Martin Roeder, Marc Weinberger The Facility Control Markup Language FCML. Search on Bibsonomy ICDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FCML, XML, Management, Interface, Control, Web Applications, SCADA
67Jörn Guy Süß, Adrian Pop, Peter Fritzson, Luke Wildman Towards Integrated Model-Driven Testing of SCADA Systems Using the Eclipse Modeling Framework and Modelica. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MDT, Testing, MDA, SCADA, EMF, Modelica
67Francisco Javier Molina, Julio Barbancho, Joaquín Luque Automated Meter Reading and SCADA Application for Wireless Sensor Network. Search on Bibsonomy ADHOC-NOW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Automated Meter Reading Application, Spanning Tree Algorithm, Multihop Routing Protocol, Ad Hoc Networks, SCADA
62Kun Xiao, Shangping Ren, Kevin A. Kwiat Retrofitting Cyber Physical Systems for Survivability through External Coordination. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Dong-Joo Kang, Hak-Man Kim A Method for Determination of Key Distribution Period Using QoS Function. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Thomas Dreyer, David Leal, Andrea Schröder, Michael Schwan ScadaOnWeb - Web Based Supervisory Control and Data Acquisition. Search on Bibsonomy ISWC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
62Eric A. M. Luiijf, Manou Ali, Annemarie Zielstra Assessing and Improving SCADA Security in the Dutch Drinking Water Sector. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Paulo S. Motta Pires, Luiz Affonso H. G. Oliveira Security Aspects of SCADA and Corporate Network Interconnection: An Overview. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Ray Klump, Robert E. Wilson, Kenneth E. Martin Visualizing Real-Time Security Threats Using Hybrid SCADA / PMU Measurement Displays. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Samuel A. Moyle Parallel processes and situation awareness display design. Search on Bibsonomy OZCHI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SS/SI display, energy dispatch controller, situation awareness, SCADA
51Youqiang Guo, Zijun Zhang, Xuezhu Pei A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sub-output control, small flow, PID control, SCADA system
51Cristina Alcaraz, Isaac Agudo, M. Carmen Fernández Gago, Rodrigo Roman, Gerardo Fernandez, Javier López 0001 Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems. Search on Bibsonomy TrustBus The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Critical Control Systems, Reputation, SCADA systems
51Andrea Carcano, Igor Nai Fovino, Marcelo Masera, Alberto Trombetta Scada Malware, a Proof of Concept. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Malware, Critical infrastructures, SCADA Systems
47Mladen Kezunovi, Tanja Djoki, Tatjana Kosti Automated Monitoring and Control Using New Data Integration Paradigm. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Ivano Miranda dos Anjos, Agostinho M. Brito Jr., Paulo S. Motta Pires A model for security management of SCADA systems. Search on Bibsonomy ETFA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46John Bigham, David Gamez, Ning Lu Safeguarding SCADA Systems with Anomaly Detection. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Giovanna Dondossola, Geert Deconinck, Fabrizio Garrone, Hakem Beitollahi Testbeds for Assessing Critical Scenarios in Power Control Systems. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF power control systems, grid teleoperation, voltage and frequency control, inter-utility communications, power emergency conditions, resilient architectures, cyber security, SCADA systems
37Salvatore D'Antonio, Francesco Oliviero, Roberto Setola High-Speed Intrusion Detection in Support of Critical Infrastructure Protection. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF critical infrastructure protection (CIP), critical information infrastructure protection (CIIP), flow monitoring, intrusion detection, security management, SCADA
36Sugwon Hong, Myungho Lee Challenges and Direction toward Secure Communication in the SCADA System. Search on Bibsonomy CNSR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SCADA cyber security, security protocol, smart grid, smart device
36Carlos Queiroz, Abdun Naser Mahmood, Zahir Tari An Analytical Framework for Evaluating Survivability of SCADA Systems. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Bayesian networks, Survivability, performance metrics, SCADA systems
36Carlos Queiroz, Abdun Naser Mahmood, Jiankun Hu, Zahir Tari, Xinghuo Yu 0001 Building a SCADA Security Testbed. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Testbed, DDoS, SCADA
31 Implementation of On/Off Controller for Automation of Greenhouse Using LabVIEW. Search on Bibsonomy AICI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Lab View, on/off, Control, Automation, Greenhouse
31David John Leversage, Eric James James Estimating a System's Mean Time-to-Compromise. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Zhaoyang Qu, Ji Meng, Wenjie Yuan Preprocessing of Online Analysis in Power Grid Based on State Estimation Optimized by PCA. Search on Bibsonomy CSSE (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Julio Barbancho, Carlos León 0001, Francisco Javier Molina, Antonio Barbancho Giving neurons to sensors. QoS management in wireless sensors networks. Search on Bibsonomy ETFA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Ping Yang, Sui Sheng Liu Fault diagnosis for boilers in thermal power plant by data mining. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Stephen D. J. McArthur, Euan M. Davidson, John A. Hossack, James R. McDonald Automating Power System Fault Diagnosis through Multi-Agent System Technology. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Wilson Pardi Junior, Carlos Eduardo Pereira A Supervisory Tool for Real-Time Industrial Automation Systems. Search on Bibsonomy ISORC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Saurabh Amin, Xavier Litrico, Shankar Sastry 0001, Alexandre M. Bayen Stealthy deception attacks on water SCADA systems. Search on Bibsonomy HSCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secure control systems, switching pdes, water mangement
30Patrick P. Tsang, Sean W. Smith YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Matteo Cristani, Elisa Burato, Nicoletta Gabrielli Ontology-Driven Compression of Temporal Series: A Case Study in SCADA Technologies. Search on Bibsonomy DEXA Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Term Taxonomies, Data Mining, Temporal Abstractions
30Janica Edmonds, Mauricio Papa, Sujeet Shenoi Security Analysis of Multilayer SCADA Protocols. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multilayer protocols, Modbus TCP, formal methods, security analysis
30Lenka Landryová, Iveta Zolotová OEE Monitoring for Production Processes Based on SCADA/HMI Platform. Search on Bibsonomy APMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF equipment effectiveness, performance, Monitoring
30Miles A. McQueen, Wayne F. Boyer, Mark A. Flynn, George A. Beitel Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30A. David Selvakumar, Chester Rebeiro, R. Pitchiah SCADA with Fault Tolerant CORBA on Fault Tolerant LANE ATM. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Beenish Urooj, Ubaid Ullah, Munam Ali Shah, Hira Shahzadi Sikandar, Abdul Qarib Stanikzai Risk Assessment of SCADA Cyber Attack Methods: A Technical Review on Securing Automated Real-time SCADA Systems. Search on Bibsonomy ICAC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Jinjing Zhao, Ling Pang, Bai Lin SDNVD-SCADA: A Formalized Vulnerability Detection Platform in SDN-Enabled SCADA System. Search on Bibsonomy ACA The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30Raogo Kabore Hybrid deep neural network anomaly detection system for SCADA networks. (Réseaux neuronaux profonds hybrides de détection d'anomalies pour les systèmes SCADA). Search on Bibsonomy 2020   RDF
30Kevser Ovaz Akpinar Ethercat tabanlı bir SCADA sisteminde kural ve makine öğrenmesine dayalı saldırı ve anomali tespiti (Rule and machine learning based intrusion and anomaly detection in an ethercat based SCADA system) Search on Bibsonomy 2019   RDF
30Lyes Bayou Assessment and enforcement of wireless sensor network-based SCADA systems security. (Évaluation et mise en oeuvre de la sécurité dans les systèmes SCADA à base de réseaux de capteurs sans fil). Search on Bibsonomy 2018   RDF
30Santiago Cortijo Probabilistic graphical model-based security for SCADA critical infrastructures. (Sécurité pour des infrastructures critiques SCADA fondée sur des modèles graphiques probabilistes). Search on Bibsonomy 2018   RDF
30Asem Ghaleb, Sami Zhioua, Ahmad Almulhem SCADA-SST: a SCADA security testbed. Search on Bibsonomy WCICSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Andrew Wain, Stephan Reiff-Marganiec, Kevin I. Jones, Helge Janicke Towards a Distributed Runtime Monitor for ICS/SCADA Systems. Search on Bibsonomy ICS-CSR The full citation details ... 2016 DBLP  BibTeX  RDF
30Antoine Lemay, Jonathan Rochon, José M. Fernandez 0001 A Practical flow white list approach for SCADA systems. Search on Bibsonomy ICS-CSR The full citation details ... 2016 DBLP  BibTeX  RDF
30Justyna J. Chromik, Anne Remke, Boudewijn R. Haverkort Improving SCADA security of a local process with a power grid model. Search on Bibsonomy ICS-CSR The full citation details ... 2016 DBLP  BibTeX  RDF
30Peter Eden, Andrew Blyth, Pete Burnap, Yulia Cherdantseva, Kevin Jones, Hugh Soulsby, Kristan Stoddart Forensic Readiness for SCADA/ICS Incident Response. Search on Bibsonomy ICS-CSR The full citation details ... 2016 DBLP  BibTeX  RDF
30Van Long Do Sequential Detection and Isolation of Cyber-physical Attacks on SCADA Systems. (Détection et localisation séquentielle d'attaques cyber-physiques aux systèmes SCADA). Search on Bibsonomy 2015   RDF
30Cordell C. Davidson, Joel A. Dawson, Paul Carsten, Mark Yampolskiy, Todd R. Andel Investigating the Applicability of a Moving Target Defense for SCADA systems. Search on Bibsonomy ICS-CSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Grigoris Tzokatziou, Leandros A. Maglaras, Helge Janicke Insecure by Design: Using Human Interface Devices to exploit SCADA systems. Search on Bibsonomy ICS-CSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Johannes Schneider 0002, Sebastian Obermeier 0001, Roman Schlegel Cyber Security Maintenance for SCADA Systems. Search on Bibsonomy ICS-CSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Peter Eden, Andrew Blyth, Pete Burnap, Kevin Jones, Kristan Stoddart A Forensic Taxonomy of SCADA Systems and Approach to Incident Response. Search on Bibsonomy ICS-CSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Hosny A. Abbas Future SCADA challenges and the promising solution: the agent-based SCADA. Search on Bibsonomy Int. J. Crit. Infrastructures The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Antonio Sánchez Aragó, Enrique Redondo Martínez, Sandra Salán Clares SCADA Laboratory and Test-bed as a Service for Critical Infrastructure Protection. Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
30Peter Maynard 0001, Kieran McLaughlin, Berthold Haberler Towards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks. Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
30Antoine Lemay, Marina Krotofil, José M. Fernandez 0001, Scott Knight Not all SCADA is Equal: Impact of Control Models on ICS Threat Landscape. Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
30Andrew Nicholson, Helge Janicke, Antonio Cau Position Paper: Safety and Security Monitoring in ICS/SCADA Systems. Search on Bibsonomy ICS-CSR The full citation details ... 2014 DBLP  BibTeX  RDF
30Tina Wu, Jules Ferdinand Pagna Disso, Kevin Jones, Adrian Campos Towards a SCADA Forensics Architecture. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
30Antoine Lemay, José M. Fernandez 0001, Scott Knight An isolated virtual cluster for SCADA network security research. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
30S. L. P. Yasakethu, J. Jiang Intrusion Detection via Machine Learning for SCADA System Protection. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
30Michael Robinson The SCADA Threat Landscape. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
30Andrew Nicholson, Helge Janicke, Tim Watson An Initial Investigation into Attribution in SCADA Systems. Search on Bibsonomy ICS-CSR The full citation details ... 2013 DBLP  BibTeX  RDF
21Glenn A. Fink, Christopher S. Oehmen, Jereme N. Haack, A. David McKinnon, Errin W. Fulp, Michael B. Crouse Bio-Inspired Enterprise Security. Search on Bibsonomy SASO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF bio-inspired approaches, complex adaptive, mobile agents, Computer security, SCADA
21Mikhail A. Lisovich, Deirdre K. Mulligan, Stephen B. Wicker Inferring Personal Information from Demand-Response Systems. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF NG-SCADA, privacy, protection
21Himanshu Khurana, Mark Hadley, Ning Lu 0002, Deborah A. Frincke Smart-Grid Security Issues. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF electrical grid, authentication, encryption, computer security, security and privacy, smart grid, SCADA
21Igor Nai Fovino, Andrea Carcano, Thibault De Lacheze Murel, Alberto Trombetta, Marcelo Masera Modbus/DNP3 State-Based Intrusion Detection System. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Modbus, DNP3, Security, Intrusion Detection, Critical Infrastructure, SCADA
21Mieczyslaw Metzger, Grzegorz Polaków A Study on Appropriate Plant Diagram Synthesis for User-Suited HMI in Operating Control. Search on Bibsonomy TAMODIA/HCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Usability of HMI for operating control, software engineering for user-suited HMI, plant diagram for GUI, visualisation, SCADA
21Danish Hussain Memon The Future of Satellite Communications in Pakistan. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VSAT, DTH, Air Navigation, Telemedicine, Teleconferencing, SCADA
21Patrik Forsgren, Arnis Daugulis Requirements Engineering In Control Center Procurement Projects Practical Experiences from the Power Industry. Search on Bibsonomy ICRE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Requirements Engineering (RE), Requirements Specification (RS), Industrial Control and Information Systems, Control Center, SCADA/EMS, Request For Proposal (RFP), Commercial Off-The-Shelf (COTS), Procurement, BMS, Industrial Control Systems
21Patrik Forsgren, Tomas Rahkonen Specification of customer and user requirements in industrial control system procurement projects. Search on Bibsonomy RE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF power system control, user requirements specification, customer requirements specification, industrial control system procurement projects, power industries, manufacturing industries, process industries, customer expectations, major users, major vendors, performance, formal specification, costing, functionality, process control, distributed control, software systems, computer systems, user needs, consultants, industrial control, SCADA systems, load management
16Adnan Salihbegovic, Samir Ribic Development Of Online Internet Laboratory (Online I-Lab). Search on Bibsonomy Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education The full citation details ... 2008 DBLP  DOI  BibTeX  RDF remote control laboratories, web services, e- learning, distance learning, thin clients, internet technologies
16João Lourenço, Luís Gomes 0001 Animated Graphical User Interface Generator Framework for Input-Output Place-Transition Petri Net Models. Search on Bibsonomy Petri Nets The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Rüdiger Klein, Erich Rome, Césaire Beyel, Ralf Linnemann, Wolf Reinhardt, Andrij Usov Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CI dependability, CI dependencies, federated simulation, information modelling, simulation environment
16Nuno Polónio, Carlos Regalo, Daniel Gaspar Real Time Notifications for Critical Parameters in Operations and Maintenance. Search on Bibsonomy SERA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF critical alarms, alarm management, Pharmaceutical maintenance, CMMS, SMS
16Bruno Dutertre Formal Modeling and Analysis of the Modbus Protocol. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Modbus, modeling, formal methods, test-case generation
16Martin Naedele Addressing IT Security for Critical Control Systems. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Damir Novosel, Khoi Vu, Virgilio Centeno, Srdjan Skok, Miroslav Begovic Benefits of Synchronized-Measurement Technology for Power-Grid Applications. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16George J. Cokkinides, A. P. Sakis Meliopoulos, George K. Stefopoulos, Ramiz Alaileh, Apurva Mohan Visualization and Characterization of Stability Swings via GPS-Synchronized Data. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yen-Ming Tzeng, Shu-Yao Ho To Approach Minimum Losses of the Distribution Systems by Artificial Neural Networks. Search on Bibsonomy ICICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Feeder Configuration, Neural Networks, Distribution Systems
16Eyad H. Abed, Navaratnam Sri Namachchivaya, Thomas J. Overbye, M. A. Pai, Peter W. Sauer, Alan Sussman Data-Driven Power System Operations. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16A. P. Sakis Meliopoulos, George J. Cokkinides, Floyd Galvan, Bruce Fardanesh GPS-Synchronized Data Acquisition: Technology Assessment and Research Issues. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF GPS-synchronized equipment, State Estimation, Data Accuracy
16Dennis K. Holstein, Jose Diaz Cyber Security Management for Utility Operations. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Abraham Jacobus Johannes Mouton, C. Smith, George E. Smith Wireless Control and Communication to Motor Protection Relays by using an Embedded Microprocessor. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Juliana M. T. Alves, Carmen L. T. Borges, Ayru L. Oliveira Filho Distributed Security Constrained Optimal Power Flow Integrated to a DSM Based Energy Management System for Real Time Power Systems Security Control. Search on Bibsonomy VECPAR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Ana Paula M. Braga, Ricardo Carnevalli, Petr Ekel, Marcelo Gontijo, Marcio Junges, Bernadete Maria de Mendonça Neta, Reinaldo M. Palhares Fuzzy Logic Based Control of Voltage and Reactive Power in Subtransmission System. Search on Bibsonomy PReMI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Xiaoxing Zhang 0001, Haijun Ren, Yuming Liu, Qiyun Cheng, Caixin Sun The Dynamic Character Curve Adjusting Model of Electric Load Based on Data Mining Theory. Search on Bibsonomy ADMA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Francesco Moscato 0001, Nicola Mazzocca, Valeria Vittorini Workflow Principles Applied to Multi-Solution Analysis of Dependable Distributed Systems. Search on Bibsonomy PDP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Alexei Lisounkin, Gerhard Schreck, Hans-Werner Schmidt Knowledge Acquisition from Historical Data for Case Oriented Supervisory Control. Search on Bibsonomy BASYS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16A. P. Sakis Meliopoulos, George J. Cokkinides, Thomas J. Overbye Component Monitoring and Dynamic Loading Visualization from Real Time Power Flow Model Data. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF real-time model, visualization, animation, state estimation, power flow
16Linda K. Nozick, Mark A. Turnquist, Dean A. Jones, Jennifer R. Davis, Craig R. Lawton Assessing the Performance of Interdependent Infrastructures and Optimizing Investments. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Ray Klump, Warren Wu, Greg Dooley Displaying Aggregate Data, Interrelated Quantities, and Data Trends in Electric Power Systems. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Hagen Völzer, Brenton Atchison, Paul A. Strooper, Peter A. Lindsay, Anthony MacDonald A Tool for Subsystem Configuration Management. Search on Bibsonomy ICSM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 997 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license