dc.contributor.author |
Ruan, HM |
|
dc.contributor.author |
Yang, YS |
|
dc.contributor.author |
Fan, IA |
|
dc.contributor.author |
Chai, CP |
|
dc.contributor.author |
Huang, CY |
|
dc.contributor.author |
Lei, CL |
|
dc.coverage.spatial |
Taipei, Taiwan |
|
dc.date.accessioned |
2017-05-06T00:38:07Z |
|
dc.date.available |
2017-05-06T00:38:07Z |
|
dc.date.issued |
2011 |
|
dc.identifier |
https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnxjaHJpc3RpbmVwZWlqaW5uY2hhaXxneDo2YmFjZTM2MDNjN2Y0OTNk |
|
dc.identifier.uri |
https://hdl.handle.net/10161/14286 |
|
dc.description.abstract |
Advanced metering infrastructure (AMI) is drawing more and more attention due to various
benefits which it brings. Compared to traditional power grid systems or advanced meter
reading (AMR) systems, AMI systems possess capabilities to provide improved management
and predictability of power utilization, to monitor and detect fault occurrences,
and to conserve energy. However, behind the various benefits brought by AMI, there
still exist plenty of security threats. The open network used by AMIs is an extremely
convenient interface for malicious attackers or network hackers to damage the AMI
systems; on the other hand, the immature hardware design for AMI devices might cause
physical breach points.
|
|
dc.source |
Joint Workshop on Information Security |
|
dc.title |
Security Threats in Advanced Metering Infrastructure |
|
dc.type |
Conference |
|
duke.contributor.id |
Chai, CP|0621377 |
|
pubs.author-url |
https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnxjaHJpc3RpbmVwZWlqaW5uY2hhaXxneDo2YmFjZTM2MDNjN2Y0OTNk |
|
pubs.finish-date |
2011-10-06 |
|
pubs.organisational-group |
Duke |
|
pubs.organisational-group |
Statistical Science |
|
pubs.organisational-group |
Student |
|
pubs.organisational-group |
Trinity College of Arts & Sciences |
|
pubs.publisher-url |
https://sites.google.com/site/jwis2011/ |
|
pubs.start-date |
2011-10-05 |
|