ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares
Proceedings 2014 Network and Distributed System Security Symposium
◽
10.14722/ndss.2014.23229
◽
2014
◽
Cited By ~ 88
Author(s):
Jonas Zaddach
◽
Luca Bruno
◽
Aurélien Francillon
◽
Davide Balzarotti
Keyword(s):
Embedded Systems
◽
Security Analysis
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Related Documents
Cited By
References
Dynamic security analysis of an electric power system using a combined Monte Carlo-hybrid transient stability approach
2001 IEEE Porto Power Tech Proceedings (Cat. No.01EX502)
◽
10.1109/ptc.2001.964742
◽
2002
◽
Cited By ~ 4
Author(s):
C.M.M. Ferreira
◽
J.A. Dias Pinto
◽
F.P.M. Barbosa
Keyword(s):
Monte Carlo
◽
Power System
◽
Electric Power
◽
Transient Stability
◽
Security Analysis
◽
Electric Power System
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Machine learning approach to power system dynamic security analysis
IEEE PES Power Systems Conference and Exposition, 2004.
◽
10.1109/psce.2004.1397549
◽
2005
◽
Cited By ~ 5
Author(s):
T. Niimura
◽
H.S. Ko
◽
H. Xu
◽
A. Moshref
◽
K. Morison
Keyword(s):
Machine Learning
◽
Power System
◽
Security Analysis
◽
System Dynamic
◽
Learning Approach
◽
Dynamic Security
◽
Machine Learning Approach
◽
Dynamic Security Analysis
Download Full-text
Dynamic Security Analysis in Longitudinal Power Systems
IFAC Proceedings Volumes
◽
10.1016/s1474-6670(17)60466-x
◽
1985
◽
Vol 18
(7)
◽
pp. 427-434
Author(s):
F. Aboytes
◽
G. Arroyo
Keyword(s):
Power Systems
◽
Security Analysis
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
2019 IEEE Symposium on Security and Privacy (SP)
◽
10.1109/sp.2019.00038
◽
2019
◽
Cited By ~ 13
Author(s):
Hongil Kim
◽
Jiho Lee
◽
Eunkyu Lee
◽
Yongdae Kim
Keyword(s):
Security Analysis
◽
Control Plane
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams
Silicon Valley Cybersecurity Conference - Communications in Computer and Information Science
◽
10.1007/978-3-030-72725-3_1
◽
2021
◽
pp. 3-24
Author(s):
Nicholas Hunter Gauthier
◽
Mohammad Iftekhar Husain
Keyword(s):
Security Analysis
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
A Quantitative Model for Dynamic Security Analysis of Wireless Sensor Networks
GLOBECOM 2017 - 2017 IEEE Global Communications Conference
◽
10.1109/glocom.2017.8254520
◽
2017
◽
Cited By ~ 1
Author(s):
Alex Ramos
◽
Breno Aquino
◽
Marcella Lazar
◽
Raimir Holanda Filho
◽
Joel J. P. C. Rodrigues
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Security Analysis
◽
Quantitative Model
◽
Wireless Sensor
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
A generalized shell for dynamic security analysis in operations planning
IEEE Transactions on Power Systems
◽
10.1109/59.260888
◽
1993
◽
Vol 8
(3)
◽
pp. 1098-1106
◽
Cited By ~ 27
Author(s):
R.J. Marceau
◽
R. Mailhot
◽
F.D. Galiana
Keyword(s):
Security Analysis
◽
Operations Planning
◽
Dynamic Security
◽
Dynamic Security Analysis
Download Full-text
Dynamic security analysis of group key agreement protocol
IEE Proceedings - Communications
◽
10.1049/ip-com:20045193
◽
2005
◽
Vol 152
(2)
◽
pp. 134
◽
Cited By ~ 3
Author(s):
H. Sun
◽
D.D. Lin
Keyword(s):
Key Agreement
◽
Security Analysis
◽
Group Key
◽
Group Key Agreement
◽
Key Agreement Protocol
◽
Dynamic Security
◽
Dynamic Security Analysis
◽
Group Key Agreement Protocol
Download Full-text
Contingency Ranking for Dynamic Security Analysis Using a Trigonometric Based Index
2018 IEEE PES Transmission & Distribution Conference and Exhibition - Latin America (T&D-LA)
◽
10.1109/tdc-la.2018.8511662
◽
2018
◽
Author(s):
Felix Rafael Segundo Sevilla
◽
Petr Korba
◽
Emilio Barocio
Keyword(s):
Security Analysis
◽
Dynamic Security
◽
Contingency Ranking
◽
Dynamic Security Analysis
Download Full-text
Sensitivity theory in power systems: application in dynamic security analysis
Proceeding of the 1996 IEEE International Conference on Control Applications IEEE International Conference on Control Applications held together with IEEE International Symposium on Intelligent Control IEEE International Symposium on Computer-Aided Contro CCA-96
◽
10.1109/cca.1996.558957
◽
2002
◽
Cited By ~ 14
Author(s):
M.J. Laufenberg
◽
M.A. Pai
Keyword(s):
Power Systems
◽
Security Analysis
◽
Dynamic Security
◽
Sensitivity Theory
◽
Dynamic Security Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close