ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
33
views
0
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,972
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
AMI threats, intrusion detection requirements and deployment recommendations
proceedings-article
Author(s):
David Grochocki
,
Jun Ho Huh
,
Robin Berthier
,
Rakesh Bobba
,
William H. Sanders
,
Alvaro A. Cardenas
,
Jorjeta G. Jetcheva
Publication date
(Print):
November 2012
Conference name:
2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)
Conference date:
December 5, 2012 - December 8, 2012
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH doi match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and article information
Conference
Publication date:
November 2012
Publication date (Print):
November 2012
Pages
: 395-400
Article
DOI:
10.1109/SmartGridComm.2012.6486016
SO-VID:
4896cfca-fdd4-45ef-ab50-86c13229b5a3
Copyright ©
© 2012
Conference name:
2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm)
Conference location:
Tainan, Taiwan
Conference date:
December 5, 2012 - December 8, 2012
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,972
Electricity Theft Detection in AMI With Low False Positive Rate Based on Deep Learning and Evolutionary Algorithm
Authors:
Dexi Gu
,
Yunpeng Gao
,
Kang Chen
…
A First Look with JWST Aperture Masking Interferometry (AMI): Resolving Circumstellar Dust around the Wolf-Rayet Binary WR 137 beyond the Rayleigh Limit
Authors:
Ryan M. Lau
,
Matthew J. Hankins
,
Joel Sanchez-Bermudez
…
Trend of increase in the incidence of acute myocardial infarction in a Japanese population: Takashima AMI Registry, 1990-2001.
Authors:
Nobuyoshi Tomioka
,
Akira Okayama
,
Tanvir Turin
…
See all similar
Cited by
9
Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures
Authors:
Andreas Pitsillides
,
Eleni Philippou
,
Nikos Komninos
Cloud Computing Applications for Smart Grid: A Survey
Authors:
Samaresh Bera
,
Sudip Misra
,
Joel J.P.C. Rodrigues
A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures
Authors:
Jun Ho Huh
,
Robin Berthier
,
Alvaro Cardenas
…
See all cited by