[1]
|
Sule, A.H. (2010) Major Factors Affecting Electricity Generation, Transmission and Distribution in Nigeria. International Journal of Engineering and Mathematical Intelligence, 1.
|
[2]
|
Azinge, E. (2012) Communique at the Round Table on Power Infrastructure, Investment and Transformation Agenda. http://www.nials-nigeria.org/round_tables/communique_on_power.pdf
|
[3]
|
Punch (2012) Minister Orders Closure of Kainji Hydro-Power Station. http://www.punchng.com/ news/minister-orders-closure-of-kainji-hydro-power-station/
|
[4]
|
Gungor, V.C., Lu, B. and Hancke, G.P. (2010) Opportunities and Challenges of Wireless Sensor Networks in Smart Grid. IEEE Transactions on Industrial Electronics, 57, 3557-3564. http://dx.doi.org/10.1109/TIE.2009.2039455
|
[5]
|
George, E.O. and Oseni, J.E. (2012) The Relationship between Electricity Power and Unemployment Rates in Nigeria. Australian Journal of Business and Management Research, 2, 10-19.
|
[6]
|
Bello, O. (2012) Vandals Threaten Power Supply. Business Day. http://www.business dayonline.com/NG/index.php/power/42880-vandals-threaten-powernsupply
|
[7]
|
Abawajy, J. and Robles, R.J. (2010) Secured Communication Scheme for SCADA in Smart Grid Environment. Journal of Security Engineering, 7, 575-584.
|
[8]
|
Sydelle, S. (2009) A Smart Grid for Nigeria’s Energy Woes. http://www.nigeriancuriosity.com/2009/10/smart-grid-for-nigerias-energy-woes.html
|
[9]
|
Kim, T.-H. (2011) Securing Communication of SCADA Components in Smart Grid Environment. International Journal of Systems Applications, Engineering & Development, 5, 135-142.
|
[10]
|
US Department of Energy (2009) Study of Security Attributes of Smart Grid Systems—Current Cyber Security Issues. US Department of Energy, Washington DC.
|
[11]
|
ASAP (2008) AMI System Security Requirements. http://energy.gov/sites/prod/files/oeprod/DocumentsandMedia/14-AMI_System_Security_Requirements_updated.pdf
|
[12]
|
CEA (2010) The Smart Grid: A Pragmatic Approach. A “State-of-Play” Discussion Paper Presented by the Canadian Electricity Association. http://www.electricity.ca/media/SmartGrid/SmartGridpaperEN.pdf
|
[13]
|
Meserve, J. (2009) “Smart Grid” May Be Vulnerable to Hackers. http://edition.cnn.com/2009/TECH/03/20/smartgrid.vulnerability/?iref=mpstoryview
|
[14]
|
Fehrenbacher, K. (2009) Securing the Smart Power Grid from Hackers. http://www.businessweek.com/technology/content/mar2009/tc20090320_788163.htm
|
[15]
|
Cavoukian, A. (2009) Smart Privacy for the Smart Grid: Embedding Privacy into the Design of Electricity Conservation. http://www.privacybydesign.ca/content/uploads/2009/11/pbd-smartpriv-smartgrid.pdf
|
[16]
|
Polulyakh, E. (2012) Smart Grid & Common Criteria. BKP Security, Inc. http://yourcreativesolutions.nl
|
[17]
|
Fan, Z., Kalogrisis, G., Efthymion, C., Sooriyabandara, M., Serizawa, M. and McGeehan, J. (2009) The New Frontier of Communications Research: Smart Grids and Smart Metering. Proceedings of the 1st International Conference on Energy-Efficient Computing and Networking, 115-118.
|
[18]
|
Flick, T. and Morehouse, J. (2011) Attacking Smart Meters. In: Flick, T. and Morehouse, J., Eds., Securing the Smart Grid, Syngress, Boston, 211-232.
|
[19]
|
Akella, R., Tang, H. and McMillin, B.M. (2010) Analysis of Information flow Security in Cyber-Physical Systems. International Journal of Critical Infrastructure Protection, 3, 157-173. http://dx.doi.org/10.1016/j.ijcip.2010.09.001
|
[20]
|
Lee, A. and Brewer, T. (2009) Smart Grid Cyber Security Strategies and Requirements. NISTIR 7628, NIST.
|
[21]
|
Open, S.G. (2008) AMI Security Requirements. Technical Report, AMI-SEC TF, OpenSG.
|
[22]
|
Saranya, P. and Kundur, D. (2012) Bloom Filter Based Intrusion Detection for Smart Grid. http://www.comm.utoronto.ca/~dkundur/pub_pdfs/ParKunCCECE12.pdf
|
[23]
|
Alese, B.K. (2004) Design of Public Cryptosystem Using Eliptic Curve. Ph.D. Thesis, Federal University of Technology, Akure.
|
[24]
|
Adetunmbi, A.O., Falaki, S.O., Adewale, O.S. and Alese, B.K. (2008) Intrusion Detection Based on Rough Set and K-Nearest Neighbour. International Journal of Computing and ICT Research, 2, 60-66.
|
[25]
|
Gams, M. and Tusar, T. (2007) Intelligent High-Security Access Control. Informatica, 31, 469-477.
|
[26]
|
Ambler, S.W. (2012) Implementing Security Access Control. http://www.agiledata.org/essays/accessControl.html
|
[27]
|
Ogundele, O.S. (2011) Design of a Multi Access Control System for Delegation Based on Attributes, Separation of Duty and Trust. Ph.D. Thesis, Department of Computer Science, Federal University of Technology, Akure.
|
[28]
|
McDaniel, P. and Mclaughlin, S. (2009) Security and Privacy Challenges in the Smart Grid. IEEE Security and Privacy, 7, 72-74. http://dx.doi.org/10.1109/msp.2009.76
|
[29]
|
ABC News (2008) ABC News Channel. US. http://abcnews.go-com/technology/pcworld/story?id
|
[30]
|
Intel (2008) Computing Technologies for the Smart Grid. http://www.intel.com/content/www/us/en/energy/energy-intel-technologies-smart-grid-brief.html
|
[31]
|
Ling, A.P.A. and Masao, M. (2011) Grid Information Security Functional Requirement: Fulfilling Information Security of a Smart Grid System. International Journal of Grid Computing & Applications (IJGCA), 2, Published Online. http://dx.doi.org/10.5121/ijgca.2011.2201
|
[32]
|
Ling, A.P.A. and Masao, M. (2011) Selection of Model in Developing Information Security Criteria on Smart Grid Security System, Smart Grid Security and Communications. 2011 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW), Busan, 26-28 May 2011, 91-98. http://dx.doi.org/10.1109/ispaw.2011.12
|
[33]
|
Vieir, M., Vieir, J. and Madeir, H. (2008) Towards Data Security in Affordable Data Warehouses. 7th European Dependable Computing Conference (EDCC-7), Kaunas, 7-9 May 2008.
|
[34]
|
Anderson, C. (2007) Information Security and Availability: The Impact of Training on IT Organizational Performance, White Paper, No. 20692, 2. http://eval.symantec.com/downloads/edu/Impact_of_Training_on_Organizational_Performance.pdf
|
[35]
|
AICPA (2006) Trust Services, Principles, Criteria and Illustrations. http://www.webtrust.org/principles-and-criteria/item27818.pdf
|
[36]
|
Wright, A.K., Kalv, P. and Sibery, R. (2010) Interoperability and Security for Converged Smart Grid Networks. http://www.smartgridnews.com/artman/uploads/1/wrigth_gi10.pdf
|
[37]
|
CSWG (2010) Smart Grid Interoperability Panel—Cyber Security Working Group Standards Review. http://members.sgip.org/apps/group_public/download.php/ 2873/NAESB%20REQ%2021%20SGCC%20Review.pdf
|
[38]
|
White Paper (2009) Cyber Security for Smart Grid System, 9. http://www.aesieap0910.org/upload/File/PDF/4-Technical%20Sessions/TS18/TS1806/TS1806_FP.pdf
|
[39]
|
Wiki (2012) Cybersecurity. http://en.wikipedia.org/wiki/cyberwarfare
|
[40]
|
Treek, D. (2003) An Integral Framework for Information Systems Security Management. Computers & Security, 22, 337-360. http://dx.doi.org/10.1016/S0167-4048(03)00413-9
|
[41]
|
Sarka, K.R. (2010) Assessing Insider Threats to Information Security Using Technical, Behavioural and Organisational Measures. Information Security Technical Report, 15, 112-133.
|
[42]
|
Colwill, C. (2009) Human Factors in Information Security: The Insider Threat—Who Can You Trust These Days? Information Security Technical Report, 14, 186-196. http://dx.doi.org/10.1016/j.istr.2010.04.004
|
[43]
|
Raymond, D.R. and Midkiff, S.F. (2008) Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Computing, 7, 74-81. http://ieeexplore.ieee.org
|
[44]
|
Newsome, J., Shi, E., Song, D. and Perrig, A. (2004) The Sybil Attack in Sensor Networks: Analysis & Defenses. IPSN’04, Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, 26-27 April 2004, 259-268. http://dx.doi.org/10.1145/984622.984660
|
[45]
|
Sheela, D., Srividhya, V.R., Asma, B.A. and Chidanand, G.M. (2012) Detecting Black Hole Attacks in Wireless Sensor Networks Using Mobile Agent. International Conference on Artificial Intelligence and Embedded Systems (ICAIES’ 2012), Singapore, July 15-16, 45-48.
|
[46]
|
Singh, V.P., Sweta, J. and Jyoti, S. (2010) Hello Flood Attack and Its Countermeasures in Wireless Sensor Networks. IJCSI International Journal of Computer Science Issues, 7, 23-27.
|
[47]
|
Xu, Y., Chen, G., Ford, J. and Makedon, F. (2007) Detecting Wormhole Attacks in Wireless Sensor Networks. Critical Infrastructure Protection, International Federation for Information Processing, 253, 267-279. http://dx.doi.org/10.1007/978-0-387-75462-8_19
|
[48]
|
Ahmad, S., Rizwan, B.M., and Abbas, Q. (2010) Energy Saving Secure Framework for Sensor Network Using Elliptic Curve Cryptography. IJCA Special Issue on “Mobile Ad-Hoc Networks”, 167-172.
|