- Gunther, E. W., Snyder, A., Gilchrist, G., Highfill, D. R.. Smart Grid Standards Assessment and Recommendations for Adoption and Development (Draft v0. 82).
- U.S. Department of Commerce, null. NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1. 0 (Draft).
- Yeo, S.-S., Kang, D.-J., Park, J. H.. Intelligent decision-making system with green pervasive computing for renewable energy business in electricity markets on smart grid.
Eurasip Journal on Wireless Communications and Networking. 2009; 2009
- Geun-Young, K., Young-Myoung, K.. Implemen-tation of Telco Home Network-based AMI.
Journal of the Korean Institute of Information Scientists and Engineers. 2009; 27 (11): 93-97
- Wang, D.-S., Li, J.-P.. A novel mutual authentication scheme based on fingerprint biometric and nonce using smart cards.
International Journal of Security and Its Applications. 2011; 5 (4): 1-12
- Jin-Bum, H., Jong-Wook, H.. A security model for home networks with authority delegation. : 360-369
- Sun, S., Yan, Z., Zambreno, J.. Demonstrable differential power analysis attacks on real-world FPGA-based embedded systems.
Integrated Computer-Aided Engineering. 2009; 16 (2): 119-130
- Cho, D.-E., Koh, B.-S., Yeo, S.-S.. Secure D-CAS system for digital contents downloading services.
Journal of Supercomputing. 2011; 64 (26): 477-491
- Pham, T. A. L., Le-Thanh, N., Sander, P.. Decomposition-based reasoning for large knowledge bases in description logics.
Integrated Computer-Aided Engineering. 2008; 15 (1): 53-70
- Tao, X., Li, Y., Nayak, R.. A knowledge retrieval model using ontology mining and user profiling.
Integrated Computer-Aided Engineering. 2008; 15 (4): 313-329
- Chen, Q., Zhang, S., Chen, Y.-P. P.. Rule-based dependency models for security protocol analysis.
Integrated Computer-Aided Engineering. 2008; 15 (4): 369-380
- Ko, H., Marreiros, G., Morais, H., Vale, Z., Ramos, C.. Intelligent supervisory control system for home devices using a cyber physical approach.
Integrated Computer-Aided Engineering. 2012; 19 (1): 67-79
- Kim, S.-C., Yeo, S.-S., Kim, S. K.. A hybrid user authentication protocol for mobile IPTV service.
Multimedia Tools and Applications. 2011: 1-14
- Sánchez, A., Nunes, E. O., Conci, A.. Using adaptive background subtraction into a multi-level model for traffic surveillance.
Integrated Computer-Aided Engineering. 2012; 19 (3): 239-256
- Tan, L., Xu, S.. A model-checking-based approach to risk analysis in supply chain consolidations.
Integrated Computer-Aided Engineering. 2009; 16 (3): 243-257
- Kim, J., Jeon, H., Lee, J.. Network management framework and lifetime evaluation method for wireless sensor networks.
Integrated Computer-Aided Engineering. 2012; 19 (2): 165-178
- Cho, D.-E., Kim, S.-J.. Study on safe remote control method of home device under environment of smart grid.
Lecture Notes in Electrical Engineering. 2012; 179 (2): 281-286
- Banković, Z., Moya, J. M., Araujo, Á., Fraga, D., Vallejo, J. C., de Goyeneche, J.-M.. Distributed intrusion detection system for wireless sensor networks based on a reputation system coupled with kernel self-organizing maps.
Integrated Computer-Aided Engineering. 2010; 17 (2): 87-102
- Cho, D.-E., Shin, H.-J., Kim, S.-J.. The personal information protection technique in smart grid environment.
Information B. 2013; 16 (3): 2179-2184
- NIST, null. Smart Grid Cyber Security Strategy and Requirements.
- McDaniel, P., McLaughlin, S.. Security and privacy challenges in the smart grid.
IEEE Security and Privacy. 2009; 7 (3): 75-77