[1]
Sahin, Cem, Nadar, Abdullah, Smart distribution automation system, 2010 National Conference on Electrical, Electronics and Computer Engineering, ELECO 2010, pp.123-127, (2010)
Google Scholar
[2]
Lim, Hyung, Sug Won, Choi, Myeon-Song, Lee, Seung-Jae, Applying security algorithms against cyber attacks in the distribution automation system, Transmission and Distribution Exposition Conference: 2008 IEEE PES Powering Toward the Future, PIMS 2008, (2008)
DOI: 10.1109/tdc.2008.4517289
Google Scholar
[3]
Lim, I.H, Choi, M.S, Lee, S.J, Kim, T.W, Security protocols against cyber attacks in the distribution automation system, IEEE Transactions on Power Delivery, v 25, n 1, pp.448-455, January (2010)
DOI: 10.1109/tpwrd.2009.2021083
Google Scholar
[4]
Wang, BaoYi, Yang, HaiPeng, Zhang, ShaoMin, Research on application of interaction firewall with IDS in distribution automation system, Lecture Notes in Electrical Engineering, v 139 LNEE, pp.527-532, (2012)
Google Scholar
[5]
Kim, Myongsoo,Metzner, John J, A key exchange method for intelligent electronic devices in distribution automation, IEEE Transactions on Power Delivery, v 25, n 3, pp.1458-1464, July (2010)
DOI: 10.1109/tpwrd.2010.2040490
Google Scholar
[6]
Sun Zhongwei, Ma, Jing, Efficient key management for advanced distribution automation system, Proceedings-2010 2nd IEEE International Conference on Network Infrastructure and Digital Content, IC-NIDC 2010, pp.794-798, (2010)
DOI: 10.1109/icnidc.2010.5657979
Google Scholar