Smart-grid security issues H Khurana, M Hadley, N Lu, DA Frincke IEEE Security & Privacy 8 (1), 81-85, 2010 | 804 | 2010 |
Detecting false data injection attacks on dc state estimation RB Bobba, KM Rogers, Q Wang, H Khurana, K Nahrstedt, TJ Overbye Preprints of the first workshop on secure control systems, CPSWEEK 2010, 2010 | 541 | 2010 |
System and method for insider threat detection H Khurana, V Guralnik, R Shanley US Patent 8,793,790, 2014 | 319 | 2014 |
Intrusion detection for advanced metering infrastructures: Requirements and architectural directions R Berthier, WH Sanders, H Khurana 2010 First IEEE international conference on smart grid communications, 350-355, 2010 | 309 | 2010 |
RRE: A game-theoretic intrusion response and recovery engine SA Zonouz, H Khurana, WH Sanders, TM Yardley IEEE Transactions on Parallel and Distributed Systems 25 (2), 395-406, 2013 | 285 | 2013 |
An authenticated control framework for distributed voltage support on the smart grid KM Rogers, R Klump, H Khurana, AA Aquino-Lugo, TJ Overbye IEEE Transactions on Smart Grid 1 (1), 40-47, 2010 | 245 | 2010 |
Attribute-sets: A practically motivated enhancement to attribute-based encryption R Bobba, H Khurana, M Prabhakaran Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009 | 226 | 2009 |
Time valid one-time signature for time-critical multicast data authentication Q Wang, H Khurana, Y Huang, K Nahrstedt IEEE INFOCOM 2009, 1233-1241, 2009 | 115 | 2009 |
Design principles for power grid cyber-infrastructure authentication protocols H Khurana, R Bobba, T Yardley, P Agarwal, E Heine 2010 43rd Hawaii International Conference on System Sciences, 1-10, 2010 | 99 | 2010 |
Towards a taxonomy of attacks against energy control systems T Fleury, H Khurana, V Welch Critical Infrastructure Protection II 2, 71-85, 2008 | 87 | 2008 |
Scalable security and accounting services for content-based publish/subscribe systems H Khurana Proceedings of the 2005 ACM symposium on Applied computing, 801-807, 2005 | 80 | 2005 |
Enhancing grid measurements: Wide area measurement systems, NASPInet, and security RB Bobba, J Dagle, E Heine, H Khurana, WH Sanders, P Sauer, ... IEEE Power and Energy Magazine 10 (1), 67-73, 2011 | 73 | 2011 |
MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming Q Wang, L Vu, K Nahrstedt, H Khurana 2010 Proceedings IEEE INFOCOM, 1-5, 2010 | 69 | 2010 |
Using attribute-based access control to enable attribute-based messaging R Bobba, O Fatemieh, F Khan, CA Gunter, H Khurana 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 403-413, 2006 | 68 | 2006 |
Lossless compression of synchronized phasor measurements R Klump, P Agarwal, JE Tate, H Khurana IEEE PES general meeting, 1-7, 2010 | 64 | 2010 |
PBES: a policy based encryption system with application to data sharing in the power grid R Bobba, H Khurana, M AlTurki, F Ashraf Proceedings of the 4th international symposium on information, computer, and …, 2009 | 64 | 2009 |
Attribute-based messaging: Access control and confidentiality R Bobba, O Fatemieh, F Khan, A Khan, CA Gunter, H Khurana, ... ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010 | 52 | 2010 |
Staying in control: Cybersecurity and the modern electric grid J Hull, H Khurana, T Markham, K Staggs IEEE Power and Energy Magazine 10 (1), 41-48, 2011 | 50 | 2011 |
Smart-grid-enabled load and distributed generation as a reactive resource KM Rogers, R Klump, H Khurana, TJ Overbye 2010 Innovative Smart Grid Technologies (ISGT), 1-8, 2010 | 50 | 2010 |
Palantir: a framework for collaborative incident response and investigation H Khurana, J Basney, M Bakht, M Freemon, V Welch, R Butler Proceedings of the 8th Symposium on Identity and Trust on the Internet, 38-51, 2009 | 50 | 2009 |