Publications

Please view the copyright notices at the bottom of this page prior to downloading any papers.


Showing publications tagged 2011.
Back to all publications
  1. Direct Load Management of Electric Vehicles

    Alizadeh, M.; Scaglione, A.; Thomas, R.J.

    2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.5964-5967, 22-27 May 2011.1 [IEEE Xplore entry]

    Tags: 2011
  2. Information Infrastructure for Cellular Load Management in Green Power Delivery Systems

    Alizadeh, M.; Scaglione, A.; Thomas, R.J.; Callaway, D.

    2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.13-18, 17-20 Oct. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  3. Demand Side Management Trends in the Power Grid

    Alizadeh, M.; Wang, Z.; Scaglione, A.

    In Proceedings of the 4th IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), pp.141-144, 13-16 Dec. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  4. A Control Framework for the Smart Grid for Voltage Support Using Agent Based Technologies

    Aquino-Lugo, A. A.; Klump, R.; Overbye, T. J.

    IEEE Transactions on Smart Grid, vol.2, no.1, pp.173-180, March 2011.1 [IEEE Xplore entry]

    Tags: 2011
  5. Smart Generation and Transmission with Coherent, Real-Time Data

    Bakken, D.E.; Bose, A.; Hauser, C.H.; Whitehead, D. E.; Zweigle, G. C.

    Proceedings of the IEEE , vol.99, no.6, pp.928-951, June 2011.1 [IEEE Xplore entry]

    Tags: 2011
  6. NetODESSA: Dynamic Policy Enforcement in Cloud Networks

    Bellessa, J.; Kroske, E.; Farivar, R.; Montanari, M.; Larson, K.; Campbell, R.H.

    2011 30th IEEE Symposium on Reliable Distributed Systems Workshops (SRDSW), pp.57-61, 4-7 Oct. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  7. Nonintrusive Load-Shed Verification

    Bergman, D. C.; Jin, D.; Juen, J. P.; Tanaka, N.; Gunter, C. A.; Wright, A. K.

    IEEE Pervasive Computing Special Issue on Smart Energy Systems, vol. 10, no. 1, Jan.-Mar. 2011, pp. 49-57.1 [IEEE Xplore entry]

    Tags: 2011
  8. Distributed Non-Intrusive Load Monitoring

    Bergman, D.C. ; Dong Jin ; Juen, J.P. ; Tanaka, N. ; Gunter, C.A. ; Wright, A.K.

    2011 IEEE PES Innovative Smart Grid Technologies (ISGT), pp.1-8, 17-19 Jan. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  9. Specification-Based Intrusion Detection for Advanced Metering Infrastructures

    Berthier, R.; Sanders, W.H.

    In Proceedings of the 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC), pp.184-193, 12-14 Dec. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  10. Robust Implementation of Distributed Algorithms for Control of Distributed Energy Resources

    Cady, S.T.; Domínguez-Garcia, A. D.; Hadjicostis, C.N.

    2011 North American Power Symposium (NAPS), pp.1-5, 4-6 Aug. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  11. A Framework for Live Forensics

    Chan, E.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, May 2011. [IDEALS entry]

    Tags: 2011, Ph.D. Dissertation
  12. Cooperative Congestion Control in Power Grid Communication Networks

    Cherukuri, N.

    Master's Thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, May 2011. [IDEALS entry]

    Tags: 2011, Master's Thesis
  13. Cooperative Congestion Control in Power Grid Communication Networks

    Cherukuri, N.; Nahrstedt, K.

    2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.587-592, 17-20 Oct. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  14. Small Inverter-Interfaced Distributed Energy Resources for Reactive Power Support

    Domínguez-Garcia, A.D.; Hadjicostis, C.N.; Krein, P.T.; Cady, S.T.

    2011 Twenty-Sixth Annual IEEE Applied Power Electronics Conference and Exposition (APEC), pp.1616-1621, 6-11 March 2011.1 [IEEE Xplore entry]

    Tags: 2011
  15. Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks

    Fatemieh, O.; Farhadi, A.; Chandra, R.; Gunter, C. A.

    18th Annual Network & Distributed System Security Symposium (NDSS '11), San Diego, CA, Feb. 2011. [NDSS entry]

    Tags: 2011
  16. For the Grid and Through the Grid: The Role of Power Line Communications in the Smart Grid

    Galli, S.; Scaglione, A.; Wang, Z.

    Proceedings of the IEEE , vol.99, no.6, pp.998-1027, June 2011.1 [IEEE Xplore entry]

    Tags: 2011
  17. Packets in Packets: OrsonWelles’ In-Band Signaling Attacks for Modern Radios

    Goodspeed, T.; Bratus, S.; Melgares, R.; Speers, R.; Shapiro, R.

    Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT'11), San Francisco, CA, August 8, 2011. [USENIX entry]

    Tags: 2011
  18. Exploring Convergence for SCADA Networks

    Heine, E.; Khurana, H.; Yardley, T.

    2011 IEEE PES Innovative Smart Grid Technologies (ISGT), pp.1-8, 17-19 Jan. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  19. An Event Buffer Flooding Attack in DNP3 Controlled SCADA Systems

    Jin, D.; Nicol, D.M.; Yan, G.

    In Proceedings of the 2011 Winter Simulation Conference (WSC2011), Phoenix, AZ, Dec. 11-14, 2011. [WSC entry]

    Tags: 2011
  20. Hybrid power flow analysis: Combination of AC and DC models

    Kim, S.; Overbye, T.J.

    2011 IEEE Power and Energy Conference at Illinois (PECI), pp.1-4, 25-26 Feb. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  21. Supporting Wind Generation Deployment with Demand Response

    Kowli, A.; Meyn, S.

    In Proceedings of the 2011 IEEE Power and Energy Society General Meeting, pp.1-8, 24-29 July 2011.1 [IEEE Xplore entry]

    Tags: 2011
  22. Evaluation and Comparison of Multicast Message Authentication Protocols for Use in Power Grid Applications

    Manivannan, T.

    Master's Thesis. Washington State University, December 2011.

    Tags: 2011, Master's Thesis
  23. 802.15.4/ZigBee Analysis and Security: tools for practical exploration of the attack surface

    Melgares, R.A.

    Senior Honors Thesis, Dartmouth College, March 2007. Dartmouth College Department of Computer Science Technical Report TR2011-689, January 2011. [Dartmouth entry]

    Tags: 2011, Senior Honors Thesis
  24. Using Smart Devices to Provide Distributed Reactive Power Support

    Mohapatra, S.; Recio, C.; Overbye, T.J.

    2011 North American Power Symposium (NAPS), pp.1-5, 4-6 Aug. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  25. Attack-resilient Compliance Monitoring for Large Distributed Infrastructure Systems

    Montanari, M.; Campbell, R.H.

    2011 5th International Conference on Network and System Security (NSS), pp.192-199, 6-8 Sept. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  26. Distributed Security Policy Conformance

    Montanari, M.; Chan, E.; Larson, K.; Yoo, W.; Campbell, R.

    In Proceedings of the IFIP International Information Security Conference (IFIP SEC 2011), Lucerne, Switzerland, June 7-9, 2011, Vol. 354, pp. 210-222. [SpringerLink entry]

    Tags: 2011
  27. Alibi Framework for Identifying Reactive Jamming Nodes in Wireless LAN

    Nguyen, H.; Pongthawornkamol, T.; Nahrstedt, K.

    In Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2011), pp.1-6, 5-9 Dec. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  28. S3F: The Scalable Simulation Framework Revisited

    Nicol, D.M.; Jin, D.; Zheng, Y.

    In Proceedings of the 2011 Winter Simulation Conference (WSC2011), Phoenix, AZ, Dec. 11-14, 2011. [WSC entry]

    Tags: 2011
  29. Privacy Protection Through Limited Load Signal Distortion

    Nicol, T.

    Master's Thesis, Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, May 2011. [IDEALS entry]

    Tags: 2011, Master's Thesis
  30. Exploiting the hard-working DWARF: Trojan and Exploit Techniques With No Native Executable Code

    Oakley, J.; Bratus, S.

    Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT'11), San Francisco, CA, August 8, 2011. [USENIX entry]

    Tags: 2011
  31. Nonintrusive Load Monitoring for Verification and Diagnostics

    Reeg, C.

    Master's Thesis, Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, May 2011. [IDEALS entry]

    Tags: 2011, Master's Thesis
  32. Autoscopy Jr.: Intrusion Detection for Embedded Control Systems

    Reeves, J.

    Master's Thesis. Dartmouth College Computer Science Technical Report TR2011-704, August 2011. [Dartmouth entry]

    Tags: 2011, Master's Thesis
  33. Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems

    Reeves, J.; Ramaswamy, A.; Locasto, M.; Bratus, S.; Smith, S.W.

    In Proceedings of IFIP Working Group 11.10 Conference on Critical Infrastructure Protection V, March 23-25, 2011, Hanover, NH, Volume 367/2011, pp. 31-46. [SpringerLink entry]

    Tags: 2011
  34. Control of Distributed Energy Resources for Reactive Power Support

    Robbins, B.A.; Domínguez-Garcia, A. D.; Hadjicostis, C.N.

    2011 North American Power Symposium (NAPS), pp.1-5, 4-6 Aug. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  35. Data-enhanced applications for power systems analysis

    Rogers, K.M.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, December 2011. [IDEALS entry]

    Tags: 2011, Ph.D. Dissertation
  36. Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing

    Shapiro, R.; Bratus, S.; Rogers, E.; Smith, S.W.

    In Proceedings of IFIP Working Group 11.10 Conference on Critical Infrastructure Protection V, March 23-25, 2011, Hanover, NH, Volume 367/2011, pp. 57-72. [SpringerLink entry]

    Tags: 2011
  37. Room at the Bottom: Authenticated Encryption on Slow Legacy Networks

    Smith, S.W.

    IEEE Security & Privacy, vol.9, no.4, pp.60-63, July-Aug. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  38. IEEE 802.15.4 Wireless Security: Self-Assessment Frameworks

    Speers, R.M.

    Senior Honors Thesis, Dartmouth College, March 2007. Dartmouth College Department of Computer Science Technical Report TR2011-687, January 2011. [Dartmouth entry]

    Tags: 2011, Senior Honors Thesis
  39. Interactive Lessons Addressing Wind Integration and Time-of-Use Pricing

    Tate, J.E.; Sebestik, J.

    2011 IEEE Power and Energy Society General Meeting, pp.1-4, 24-29 July 2011.1 [IEEE Xplore entry]

    Tags: 2011
  40. A Control Theorist's Perspective on Dynamic Competitive Equilibria in Electricity Markets

    Wang, G.; Kowli, A,; Negrete-Pincetic, M.; Shafieepoorfard, E.; Meyn, S.

    Proceedings of the 18th World Congress of the International Federation of Automatic Control (IFAC 2011), Milano, Italy, Vol. 18, no. 1, August 2011.3 [IFAC-PapersOnLine entry]

    Tags: 2011
  41. An Evidence-Based Bayesian Trust Assessment Framework for Critical Infrastructure Decision Making

    Wang, Y.; Hauser, C.

    In Proceedings of IFIP Working Group 11.10 Conference on Critical Infrastructure Protection V, March 23-25, 2011, Hanover, NH, Volume 367/2011, pp. 125-135. [SpringerLink entry]

    Tags: 2011
  42. Context-Free Grep and Hierarchical Diff

    Weaver, G.; Smith, S.W.

    poster and abstract presented at the 25th Large Installation System Administration Conference (LISA '11), Boston, MA, December 4-9, 2011. [USENIX Conference Site

    Tags: 2011
  43. Design of a two-level power system linear state estimator

    Yang, T.

    Ph.D. Dissertation, Washington State University, May 2011. [WSU entry]

    Tags: 2011
  44. Transition to a Two-Level Linear State Estimator, part I: Architecture

    Yang, T.; Sun, H.; Bose, A.

    IEEE Transactions on Power Systems, vol.26, no.1, pp.46-53, Feb. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  45. Transition to a Two-Level Linear State Estimator, part II: Algorithm

    Yang, T.; Sun, H.; Bose, A.

    IEEE Transactions on Power Systems, vol.26, no.1, pp.54-62, Feb. 2011.1 [IEEE Xplore entry]

    Tags: 2011
  46. HTAF: Hybrid Testing Automation Framework to Leverage Local and Global Computing Resources

    Yim, K.S.; Hreczany, D.; Iyer, R.K.

    Proceedings of the International Conference on Computation Science and Its Applications (ICCSA 2011), LNCS vol. 6784, June 2011, pp. 479-494. [SpringerLink entry]

    Tags: 2011
  47. Hauberk: Lightweight Silent Data Corruption Error Detector for GPGPU

    Yim, K.S.; Phan, C.; Saleheen, M.; Kalbarczyk, Z.; Iyer, R.

    2011 IEEE International Parallel & Distributed Processing Symposium (IPDPS), pp.287-300, 16-20 May 2011.1 [IEEE Xplore entry]

    Tags: 2011
  48. A Virtual Time System for OpenVZ-Based Network Emulations

    Zheng, Y.; Nicol, D.

    2011 IEEE Workshop on Principles of Advanced and Distributed Simulation (PADS), pp.1-10, 14-17 June 2011.1 [IEEE Xplore entry]

    Tags: 2011
  49. FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment

    Zonouz, S.; Joshi, K.; Sanders, W.H.

    Proceedings of the 30th International Conference on Computer Safety, Reliability, and Security (SafeComp 2011), Lecture Notes in Computer Science (LNCS), 2011, Vol. 6894/2011, pp. 338-354. [SpringerLink entry]

    Tags: 2011
  50. Game-Theoretic Intrusion Response and Recovery

    Zonouz, S.A.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, June 2011. [IDEALS entry]

    Tags: 2011, Ph.D. Dissertation

COPYRIGHT NOTICE

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

1. The following copyright notice applies to all of the above items that appear in IEEE publications: "Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE."

2. The following copyright notice applies to all of the above items that appear in ACM publications: "© ACM, effective the year of publication shown in the bibliographic information. This file is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in the journal or proceedings indicated in the bibliographic data for each item."

3. The following copyright notice applies to all of the above items that appear in IFAC publications: "Document is being reproduced under permission of the Copyright Holder. Use or reproduction of the Document is for informational or personal use only."

Tags