Information Technology Reference
In-Depth Information
7. Forrest, S., Hofmeyr, S., Somayaji, A. and Longstaff, T.: A sense of self for unix processes.
Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy . IEEE Press,
(1996)
8. González-Pérez, Carlos and Wollenberg, Bruce F.: Analysis of Massive Measurement Loss
in Large-Scale Power System State Estimation. IEEE Transactions on Power Systems , Vol.
16, No. 4, November 2001
9. Higgins, Mark (ed.): Symantec Internet Security Threat Report , Volume 3, February 2003
10. Langley, P., Simon, H. and Bradshaw, G.: Heuristics for empirical discovery. In Bolc, L.
(editor) Computational Models of Learning , Berlin: Springer (1987)
11. Lemos, Robert, Borland, John, Bowman, Lisa and Junnarkar, Sandeep, 'E-terrorism',
News.com Special Report, August 27, 2002
12. National Security Telecommunications Advisory Committee Information Assurance Task
Force, 'Electric Power Risk Assessment', March 1997: http://www.ncs.gov/n5_hp/Re-
ports/EPRA/electric.html
13. Oman, Paul, Schweitzer, E. and Roberts, Jeff 'Safeguarding IEDs, Substations, and
SCADA Systems Against Electronic Intrusions', available at:
http://tesla.selinc.com/techpprs.htm
14. Pereira, Jorge Correia, Saraiva, João Tomé, Miranda, Vladimiro, Costa, Antonio Simões,
Lourenço and Clements, K. A., 'Comparison of Approaches to Identify Topology Errors in
the Scope of State Estimation Studies', Proceedings of the 2001 IEEE Porto Power Tech
Conference , 10th - 13th September, Porto, Portugal
15. Rao, R.B.; Lu, S.C.-Y.: KEDS: a knowledge-based equation discovery system for engineer-
ing problems. Proceedings of the Eighth Conference on Artificial Intelligence for Applica-
tions , 2-6 Mar 1992, pp. 211-217
16. Reliability Test System Task Force of the Application of Probability Methods Subcommit-
tee, 'IEEE Reliability Test System', IEEE Transactions on Power Apparatus and Systems ,
Vol. PAS-98, No. 6 Nov./ Dec. 1979
17. Safeguard website: www.ist-safeguard.org
18. Sterling, Bruce, The Hacker Crackdown , available at:
http://www.mit.edu/hacker/ hacker.html
19. Tan, Kymie M. C. and Maxion, Roy A.: Why 6? Defining the Operational Limits of stide,
an Anomaly-Based Intrusion Detector. IEEE Symposium on Security and Privacy, pages
188-201, Berkeley, California, 12-15 May 2002
20. Wood, Allen J. and Wollenberg, Bruce F.: Power Generation, Operation and Control (Sec-
ond Edition), New York: John Wiley & Sons, Inc. (1996)
Search WWH ::




Custom Search