Publications

Please view the copyright notices at the bottom of this page prior to downloading any papers.


Showing publications tagged 2010.
Back to all publications
  1. On the Impact of SmartGrid Metering Infrastructure on Load Forecasting

    Alizadeh, M.; Scaglione, A.; Wang, Z.

    48th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp.1628-1636, Sept. 29 2010-Oct. 1 2010.1 [IEEE Xplore entry]

    Tags: 2010
  2. Distributed and Decentralized Control of the Power Grid

    Aquino-Lugo, A. A.

    Ph.D. Dissertation, University of Illinois at Urbana-Champaign, 2010. [IDEALS entry]

    Tags: 2010, Ph.D. Dissertation
  3. Trusted Virtual Containers on Demand

    Bailey, K.; Smith, S. W.

     In Proceedings of the fifth ACM workshop on Scalable trusted computing (STC '10). ACM, New York, NY, USA, 63-72.2 [ACM Digital Library entry]

    Tags: 2010
  4. Smart Generation and Transmission with Coherent, Real-Time Data

    Bakken, D.; Bose, A.; Hauser, C.; Schweitzer, E.; Whitehead, D.; Zweigle, G.

    Technical Report TR-GS-015, School of Electrical Engineering and Computer Science, Washington State University, August 2010.

    Tags: 2010
  5. Delivery Requirements and Implementation Guidelines for the NASPInet Data Bus

    Bakken, D.; Hauser, C.; Gjermundrød, H.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 37-42.1 [IEEE Xplore entry]

    Tags: 2010
  6. Power Grid Simulation, Evaluation, and Test Framework

    Bergman, D. C.

    Master's Thesis, University of Illinois at Urbana-Champaign, 2010. [IDEALS entry]

    Tags: 2010, Master's Thesis
  7. Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions

    Berthier, R.; Sanders, W. H.; Khurana, H.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 350-355.1 [IEEE Xplore entry]

    Tags: 2010
  8. Detecting False Data Injection Attacks on DC State Estimation

    Bobba, R. B.; Rogers, K. M.; Wang, Q.; Khurana, H.; Nahrstedt, K.; Overbye, T. J.

    1st Workshop on Secure Control Systems (SCS), April 12, 2010, Stockholm, Sweden.

    Tags: 2010
  9. Exploring a Tiered Architecture for NASPInet

    Bobba, R., Heine, E.; Khurana, H.; Yardley, T.

    Proceedings of the IEEE PES Conference on Innovative Smart Grid Technologies (ISGT), Gaithersburg, Maryland, Jan. 19-21, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  10. Smart Transmission Grid Applications and Their Supporting Infrastructure

    Bose, A.

    IEEE Transactions on Smart Grid, vol. 1, no. 1, June 2010, pp. 11-19.1 [IEEE Xplore entry]

    Tags: 2010
  11. VM-based Security Overkill: A Lament for Applied Systems Security Research

    Bratus, S.; Locasto, M.; Ramaswamy, A.; Smith, S. W.

    In Proceedings of the 2010 workshop on New security paradigms (NSPW '10). ACM, New York, NY, USA, 51-60.2 [ACM DL entry]

    Tags: 2010
  12. Long-lived Authentication Protocols for Process Control Systems

    Chakravarthy, R.; Hauser, C.; Bakken, D. E.

    International Journal of Critical Infrastructure Protection, vol. 3, nos. 3-4, Dec. 2010, pp. 174-181. [SciVerse entry]

    Tags: 2010
  13. Performing Live Forensics on Insider Attacks

    Chan, E.; Chaugule, A.; Larson, K.; Campbell, R.

    CAE Workshop on Insider Threats, Nov. 2010. [CAE entry]

    Tags: 2010
  14. Forenscope: A Framework for Live Forensics

    Chan, E.; Venkataraman, S.; David, F.; Chaugule, A.; Campbell, R.

    2010 Annual Computer Security Applications Conference (ACSAC 26), Austin, Texas, Dec. 6-10, 2010.2 [ACM Digital Library entry]

    Tags: 2010
  15. A Conceptual Framework for Adaptive and Configurable Activity-Aware Trust in Collaborative Environments

    Dionysiou, I.; Bakken, D. E.

    International Journal of Dependable and Trustworthy Information Systems (IJDTIS), vol. 1. no. 1, pp. 25–44, IGI-Global, 2010. [IGI entry]

    Tags: 2010
  16. GUTS: A Framework for Adaptive and Configurable Grid User Trust Service

    Dionysiou, I.; Gjermundrød, H.; H.; Bakken, D.

    Proceedings of the 6th International Workshop on Security and Trust Management (STM), LNCS, vol. 6710/2011, pp. 84-99, Sept. 23–24, 2010, Athens, Greece. [SpringerLink entry]

    Tags: 2010
  17. Coordination and Control of Distributed Energy Resources for Provision of Ancillary Services

    Domínguez-Garcia, A.D.; Hadjicostis, C.N.

    2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.537-542, 4-6 Oct. 2010.1 [IEEE Xplore entry]

    Tags: 2010
  18. Low Cost and Secure Smart Meter Communications Using the TV White Spaces

    Fatemieh, O.; Chandra, R.; Gunter, C. A.

    3rd International Symposium on Resilient Control Systems (ISRCS), pp.37-42, 10-12 Aug. 2010.1 [IEEE Xplore entry

    Tags: 2010
  19. Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks

    Fatemieh, O.; Chandra, R.; Gunter, C. A.

    IEEE Symposium on New Frontiers in Dynamic Spectrum, pp.1-12, 6-9 April 2010I1 [IEEE Xplore entry]

    Tags: 2010
  20. Power Line Communications and the Smart Grid

    Galli, S.; Scaglione, A.; Wang, Z.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 303-308.1 [IEEE Xplore entry]

    Tags: 2010
  21. Leveraging the Next-Generation Power Grid: Data Sharing and Associated Partnerships

    Germanus, D.; Dionysiou, I.; Gjermundrød, H.; Khelil, A.; Suri, N.; Bakken, D. E.; Hauser, C.

    IEEE PES Conference on Innovative Smart Grid Technologies Europe, Gothenburg, Sweden, October 11-13, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  22. Small, stupid, and scalable: secure computing with faerieplay

    Iliev, A.; Smith, S.W.

    In Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing (STC '10). ACM, New York, NY, USA, 41-52.2 [ACM DL entry]

    Tags: 2010
  23. Efficient Ethernet Switch Models for Large-Scale Network Simulation

    Jin, D.

    Master's Thesis, University of Illinois at Urbana-Champaign, 2010. [IDEALS entry]

    Tags: 2010, Master's Thesis
  24. Fast Simulation of Background Traffic through Fair Queueing Networks

    Jin, D.; Nicol, D. M.

    Proceedings of the 2010 Winter Simulation Conference (WSC), Baltimore, MD, December, 2010.1 [WSC entry]

    Tags: 2010
  25. Efficient Gigabit Ethernet Switch Models for Large-scale Simulation

    Jin, K.; Nicol, D.; Caesar, M.

    Proceedings of the 24th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation, Atlanta, GA, May 17-19, 2010, online.1 2 [IEEE Xplore entry]

    Tags: 2010
  26. Tiered Incentives for Integrity Based Queuing

    Khan, F.; Gunter, C. A.

     In Proceedings of the 2010 Workshop on Economics of Networks, Systems, and Computation (NetEcon '10), Vancouver, BC, Canada, October 2010.2 [ACM DL entry]

    Tags: 2010
  27. Diagnostic Powertracing for Sensor Node Failure Analysis

    Khan, M. M. H.; Le, H. K.; LeMay, M.; Moinzadeh, P.; Wang, L.; Yang, Y.; Noh, D. K.; Abdelzaher, T.; Gunter, C. A.; Han, J.; Jin, X.

    ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN '10), Stockholm, Sweden, April 2010.1, 2 [ACM DL entry]

    Tags: 2010
  28. Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols

    Khurana, H.; Bobba, R.; Yardley, T.; Agarwal, P.; Heine, E.

    In Proceedings of the Forty-Third Annual Hawaii International Conference on System Sciences, Honolulu, Hawaii, January 5-8, 2010.1 [Tags: 2010

  29. Lossless Compression of Synchronized Phasor Measurements

    Klump, R.; Agarwal, P. Tate, J. E.; Khurana, H.

    Proc. 2010 IEEE Power & Energy Society (PES) General Meeting, Minneapolis, Minnesota, July 25-29, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  30. Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures

    Kosut, O.; Jia, L.; Thomas, R. J.; Tong, L.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 220-225.1 [IEEE Xplore entry]

    Tags: 2010
  31. On Malicious Data Attacks on Power System State Estimation

    Kosut, O.; Jia, L.; Thomas, R. J.; Tong, L.

    Proceedings of the 45th International Universities' Power Engineering Conference (UPEC 2010), Cardiff, Wales, UK, Aug. 31-Sept. 3, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  32. Quantifying the Variable Effects of Systems with Demand Response Resources

    Kowli, A.; Gross, G.

    Proceedings of the IREP Symposium: Bulk Power System Dynamics and Control Symposium VIII, pp. 1-10, Búzios, Rio de Janeiro, Brazil, Aug. 1-6, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  33. The Value of Volatile Resources in Electricity Markets

    Meyn, S.; Negrete-Pincetic, M.; Wang, G.; Kowli, A.; Shafieepoorfard, E.

    Proceedings of the 49th IEEE Conference on Decision and Control, Atlanta, Georgia, Dec. 15-17, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  34. Reliability Considerations from the Integration of Smart Grid

    NERC (North American Electric Reliability Corporation) (A. D. Domínguez-Garcia, contributor)

    December 2010.

    Tags: 2010
  35. Alibi Framework for Identifying Insider Jamming Attacks in Half-Duplex Wireless Local Area Networks

    Nguyen, H.

    Ph.D. thesis, University of Illinois at Urbana-Champaign, 2010. [IDEALS entry]

    Tags: 2010
  36. Identifying Insider-based Jammers in Multi-channel Wireless Networks

    Nguyen, H.; Pongthawornkamol, T.; Nahrstedt, K.

    Proceedings of IEEE GLOBECOM 2010, Miami, Florida, Dec. 6-10, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  37. Experiences Validating the Access Policy Tool in Industrial Settings

    Nicol, D. M.; Sanders, W. H.; Seri, M.; Singh, S.

    In Proceedings of the Forty-Third Annual Hawaii International Conference on System Sciences, Honolulu, Hawaii, January 5-8, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  38. Toward Technological Defenses Against Load Monitoring Techniques

    Nicol, T.; Overbye, T. J.

    Proc. North American Power Symposium, Arlington, Texas, Sept. 26-28, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  39. The Smart Grid and PMUs: Operational Challenges and Opportunities

    Overbye, T. J.; Weber, J. D.

    Proc. 2010 IEEE Power and Energy Society General Meeting, Minneapolis, Minnesota, July 25-29, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  40. Katana: A Hot Patching Framework for ELF Executables

    Ramaswamy, A.; Bratus, S.; Smith, S. W.; Locasto, M.

    Proceedings of the 4th International Workshop on Secure Software Engineering (SecSE 2010). Co-published in the International Conference on Availability, Reliability and Security. February 2010, pp. 507–512.1 [IEEE Xplore entry]

    Tags: 2010
  41. Algorithm Development for Non-Intrusive Load Monitoring for Verification and Diagnostics

    Reeg, C.; Overbye, T. J.

    Proc. North American Power Symposium, Arlington, Texas, Sept. 26-28, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  42. An Authenticated Control Framework for Distributed Voltage Support on the Smart Grid

    Rogers, K. M.; Klump, R.; Khurana, H.; Aquino-Lugo, A. A.; Overbye, T. J.

    IEEE Transactions on Smart Grid, vol. 1, no. 1, June 2010, pp. 40-47.1 [IEEE Xplore entry]

    Tags: 2010
  43. Smart-Grid-Enabled Load and Distributed Generation as a Reactive Resource

    Rogers, K. M.; Klump, R.; Khurana, H.; Overbye, T. J.

    Proceedings of the IEEE Innovative Smart Grid Technologies Conference, Gaithersburg, Maryland, Jan. 19-21, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  44. Toward a Resilient Smart Grid

    Sanders, W.

    ieRoadmap News, quarter 1, 2010, p. 2. [link to online journal issue]

    Tags: 2010
  45. Progress Towards a Resilient Power Grid Infrastructure

    Sanders, W. H.

    Proceedings of the IEEE Power and Energy Society General Meeting (PES GM), Minneapolis, Minnesota, July 25-29, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  46. Analysis of Security Data from a Large Computing Organization

    Sharma, A.; Kalbarczyk, Z.; Barlow, J.; Iyer, R.

    NCSA-CSL Technical Report-2010-02-15, University of Illinois at Urbana-Champaign, 2010.

    Tags: 2010
  47. Analysis of Credential Stealing Attacks in an Open Networked Environment

    Sharma, A.; Kalbarczyk, Z.; Iyer, R.; Barlow, J.

    Proceedings of the 4th International Conference on Network and System Security, NSS 2010, Melbourne, Australia, September 1-3, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  48. The Diversity of TPMs and its Effects on Development: A Case Study of Integrating the TPM into OpenSolaris

    Shubina, A.; Bratus, S.; Ingersol, W.; Smith, S.W.

     In Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing (STC '10). ACM, New York, NY, USA, 85-90.2 [ACM DL entry]

    Tags: 2010
  49. High Security with Low Latency in Legacy SCADA

    Solomakhin, R.; Tsang, P.; Smith, S. W.

    In Proceedings of 4th Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection IV, March 2010, vol. 342/2010, pp. 63-79. [SpringerLink entry]

    Tags: 2010
  50. MIS: Malicious Nodes Identification Scheme in Network-coding-based Peer-to-Peer Streaming

    Wang, Q.; Vu, L.; Nahrstedt, K.; Khurana, H.

    Proc. IEEE Conference on Computer Communications Workshops, INFOCOM, San Diego, CA, USA, March 15-19, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  51. Compressing Electrical Power Grids

    Wang, Z.; Scaglione, A.; Thomas, R. J.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 13-18.1 [IEEE Xplore entry]

    Tags: 2010
  52. Electrical Centrality Measures for Electric Power Grid Vulnerability Analysis

    Wang, Z.; Scaglione, A.; Thomas, R. J.

    Proceedings of the 49th IEEE Conference on Decision and Control, Atlanta, Georgia, December 15-17, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  53. Generating Statistically Correct Random Topologies for Testing Smart Grid Communication and Control Networks

    Wang, Z.; Scaglione, A.; Thomas, R. J.

    IEEE Transactions on Smart Grid, vol. 1, no. 1, June 2010, pp. 28-39.1 [IEEE Xplore entry]

    Tags: 2010
  54. The Node Degree Distribution in Power Grid and Its Topology Robustness under Random and Selective Node Removals

    Wang, Z.; Scaglione, A.; Thomas, R. J.

    1st IEEE International Workshop on Smart Grid Communications, Cape Town, South Africa, May 2010.1 [IEEE Xplore entry]

    Tags: 2010
  55. Formal Framework and Tools to Derive Efficient Application-level Detectors against Memory Corruption Attacks

    Yuan, F. Q.-Y.

    Master's Thesis, University of Illinois at Urbana-Champaign, May 2010. [IDEALS entry]

    Tags: 2010, Master's Thesis
  56. Application-Aware Secure Multicast for Power Grid Communications

    Zhang, J.; Gunter, C. A.

    Proceedings of the 1st IEEE International Conference on Smart Grid Communications (SmartGridComm), Gaithersburg, Maryland, Oct. 4-6, 2010, pp. 339-344.1 [IEEE Xplore entry]

    Tags: 2010
  57. Online Assessment of Fault Current Considering Substation Topologies

    Zhang, Y.; Bose, A.

    Proceedings of the 2010 IEEE Power & Energy Society General Meeting, Minneapolis, Minnesota, July 25-29, 2010.1 [IEEE Xplore entry]

    Tags: 2010
  58. Cost-aware Systemwide Intrusion Defense via Online Forensics and On-demand Detector Deployment

    Zonouz, S. A.; Joshi, K. R.; Sanders, W. H.

    Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), Chicago, Illinois, Oct. 4, 2010, pp. 71-74.2 [ACM Digital Library entry]

    Tags: 2010

COPYRIGHT NOTICE

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

1. The following copyright notice applies to all of the above items that appear in IEEE publications: "Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE."

2. The following copyright notice applies to all of the above items that appear in ACM publications: "© ACM, effective the year of publication shown in the bibliographic information. This file is the author’s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in the journal or proceedings indicated in the bibliographic data for each item."

3. The following copyright notice applies to all of the above items that appear in IFAC publications: "Document is being reproduced under permission of the Copyright Holder. Use or reproduction of the Document is for informational or personal use only."

Tags