INET Framework,
http://inet.omnetpp.org
PostgreSQL,
http://www.postgresql.org/
Androutsellis-Theotokis, S., Spinellis, D.: A Survey of Peer-to-Peer Content Distribution Technologies. ACM Comput. Surv. 36(4), 335–371 (2004)
CrossRef
Google Scholar
Banavar, G., Chandra, T., Mukherjee, B., Nagarajarao, J., Strom, R.E., Sturman, D.C.: An efficient multicast protocol for content-based publish-subscribe systems. In: ICDCS 1999: Proceedings of the 19th IEEE International Conference on Distributed Computing Systems, p. 262. IEEE Computer Society Press, Washington (1999)
Google Scholar
Baumgart, I., Heep, B., Krause, S.: OverSim: A Flexible Overlay Network Simulation Framework. In: Proceedings of 10th IEEE Global Internet Symposium (GI 2007) in conjunction with IEEE INFOCOM 2007, pp. 79–84 (2007)
Google Scholar
Beitollahi, H., Deconinck, G.: Analyzing the Chord Peer-to-Peer Network for Power Grid Applications. In: Fourth IEEE Young Researchers Symposium in Electrical Power Engineering, p. 5 (2008)
Google Scholar
Bowen III, C.L., Buennemeyer, T., Thomas, R.: Next generation SCADA Security: Best Practices and Client Puzzles. In: Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop, 2005. IAW 2005, June, pp. 426–427 (2005)
Google Scholar
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36(SI), 299–314 (2002)
CrossRef
Google Scholar
Codd, E.F.: The relational model for database management: version 2. Addison-Wesley Longman Publishing Co., Inc., Boston (1990)
MATH
Google Scholar
Bakken, D.: Smart Grid Data Delivery Service,
http://ec.europa.eu/research/conferences/2009/ict-energy/pdf/dave_bakken_en.pdf
Deconinck, G., Rigole, T., Beitollahi, H., Duan, R., Nauwelaers, B., Van Lil, E., Driesen, J., Belmans, R., Dondossola, G.: Robust overlay networks for microgrid control systems. In: DSN 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Edinburgh, U.K., June 25-28, p. 6 (2007)
Google Scholar
Dinger, J., Hartenstein, H.: Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration. In: The First International Conference on Availability, Reliability and Security, ARES 2006, April 2006, p. 8 (2006)
Google Scholar
Eugster, P.T., Felber, P.A., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114–131 (2003)
CrossRef
Google Scholar
Gjermundrod, H., et al.: GridStat: A Flexible QoS-Managed Data Dissemination Framework for the Power Grid. IEEE Transactions on Power Delivery 24(1), 136–143 (2009)
CrossRef
Google Scholar
Ketel, M.: A mobile agent based framework for web services. In: ACM-SE 47: Proceedings of the 47th Annual Southeast Regional Conference, pp. 1–6. ACM, New York (2009)
CrossRef
Google Scholar
Khelil, A., Jeckel, S., Germanus, D., Suri, N.: Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective. In: MOBILIGHT 2010: Inproceedings of the 2nd International Conference on Mobile Lightweight Wireless Systems (to appear 2010)
Google Scholar
Krutz, R.L.: Securing SCADA Systems. Hungry Minds Inc. (2005)
Google Scholar
Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: IPTPS 2001: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp. 53–65. Springer, London (2002)
Google Scholar
Papazoglou, M.P., Heuvel, W.J.: Service oriented architectures: approaches, technologies and research issues. The VLDB Journal 16(3), 389–415 (2007)
CrossRef
Google Scholar
Pongor, G.: OMNeT: Objective Modular Network Testbed. In: MASCOTS 1993: Proceedings of the International Workshop on Modeling, Analysis, and Simulation On Computer and Telecommunication Systems, pp. 323–326. The Society for Computer Simulation, International, San Diego (1993)
Google Scholar
Pridgen, A., Julien, C.: A secure modular mobile agent system. In: SELMAS 2006: Proceedings of the 2006 international workshop on Software engineering for large-scale multi-agent systems, pp. 67–74. ACM, New York (2006)
CrossRef
Google Scholar
RFC Standards Track: RFC 2328, OSPF Version 2
Google Scholar
Rinaldi, S., Peerenboom, J., Kelly, T.: Identifying, understanding, and analyzing Critical Infrastructure Interdependencies. IEEE Control Systems Magazine 21(6), 11–25 (2001)
CrossRef
Google Scholar
D’Antonio, S., Romano, L., Khelil, A., Suri, N.: INcreasing Security and Protection through Infrastructure REsilience: the INSPIRE Project. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 109–118. Springer, Heidelberg (2009)
CrossRef
Google Scholar
Sandhu, R., Zhang, X.: Peer-to-peer access control architecture using trusted computing technology. In: SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies, pp. 147–158. ACM, New York (2005)
CrossRef
Google Scholar
Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: A scalable peer-to-peer lookup service for internet applications. In: SIGCOMM 2001: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 149–160. ACM, New York (2001)
CrossRef
Google Scholar
Suri, N., Bradshaw, J.M., Breedy, M.R., Groth, P.T., Hill, G.A., Jeffers, R., Mitrovich, T.S., Pouliot, B.R., Smith, D.S.: Nomads: toward a strong and safe mobile agent system. In: AGENTS 2000: Proceedings of the fourth international conference on Autonomous agents, pp. 163–164. ACM, New York (2000)
CrossRef
Google Scholar
Urdaneta, G., Pierre, G., van Steen, M.: A survey of DHT security techniques. ACM Computing Surveys,
http://www.globule.org/publi/SDST_acmcs2009.html
(to appear)
Xie, Z., et al.: An information architecture for future power systems and its reliability analysis. IEEE Power Engineering Review 22(6), 60–60 (2002)
CrossRef
Google Scholar
ZigBee Alliance:
http://www.zigbee.org
,
http://www.zigbee.org