Show simple item record

Security Threats in Advanced Metering Infrastructure

dc.contributor.author Ruan, HM
dc.contributor.author Yang, YS
dc.contributor.author Fan, IA
dc.contributor.author Chai, CP
dc.contributor.author Huang, CY
dc.contributor.author Lei, CL
dc.coverage.spatial Taipei, Taiwan
dc.date.accessioned 2017-05-06T00:38:07Z
dc.date.available 2017-05-06T00:38:07Z
dc.date.issued 2011
dc.identifier https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnxjaHJpc3RpbmVwZWlqaW5uY2hhaXxneDo2YmFjZTM2MDNjN2Y0OTNk
dc.identifier.uri https://hdl.handle.net/10161/14286
dc.description.abstract Advanced metering infrastructure (AMI) is drawing more and more attention due to various benefits which it brings. Compared to traditional power grid systems or advanced meter reading (AMR) systems, AMI systems possess capabilities to provide improved management and predictability of power utilization, to monitor and detect fault occurrences, and to conserve energy. However, behind the various benefits brought by AMI, there still exist plenty of security threats. The open network used by AMIs is an extremely convenient interface for malicious attackers or network hackers to damage the AMI systems; on the other hand, the immature hardware design for AMI devices might cause physical breach points.
dc.source Joint Workshop on Information Security
dc.title Security Threats in Advanced Metering Infrastructure
dc.type Conference
duke.contributor.id Chai, CP|0621377
pubs.author-url https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnxjaHJpc3RpbmVwZWlqaW5uY2hhaXxneDo2YmFjZTM2MDNjN2Y0OTNk
pubs.finish-date 2011-10-06
pubs.organisational-group Duke
pubs.organisational-group Statistical Science
pubs.organisational-group Student
pubs.organisational-group Trinity College of Arts & Sciences
pubs.publisher-url https://sites.google.com/site/jwis2011/
pubs.start-date 2011-10-05


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record