Team for Research in
Ubiquitous Secure Technology

Inferring Personal Information from Demand-Response Systems
Mikhail Lisovich, Deirdre Mulligan, Stephen Wicker

Citation
Mikhail Lisovich, Deirdre Mulligan, Stephen Wicker. "Inferring Personal Information from Demand-Response Systems". IEEE Security and Privacy Magazine, 2010.

Abstract
Demand-response systems provide detailed powerconsumption data to utilities and those angling to assist consumers in understanding and managing energy use. Such data reveals information about in-home activities that can be mined and combined with other readily available information to discover more about occupants’ activities.

Electronic downloads

Citation formats  
  • HTML
    Mikhail Lisovich, Deirdre Mulligan, Stephen Wicker. <a
    href="http://www.truststc.org/pubs/695.html"
    >Inferring Personal Information from Demand-Response
    Systems</a>, <i>IEEE Security and Privacy
    Magazine</i>,  2010.
  • Plain text
    Mikhail Lisovich, Deirdre Mulligan, Stephen Wicker.
    "Inferring Personal Information from Demand-Response
    Systems". <i>IEEE Security and Privacy
    Magazine</i>,  2010.
  • BibTeX
    @article{LisovichMulliganWicker10_InferringPersonalInformationFromDemandResponseSystems,
        author = {Mikhail Lisovich and Deirdre Mulligan and Stephen
                  Wicker},
        title = {Inferring Personal Information from
                  Demand-Response Systems},
        journal = {IEEE Security and Privacy Magazine},
        year = {2010},
        abstract = {Demand-response systems provide detailed
                  powerconsumption data to utilities and those
                  angling to assist consumers in understanding and
                  managing energy use. Such data reveals information
                  about in-home activities that can be mined and
                  combined with other readily available information
                  to discover more about occupants’ activities.},
        URL = {http://www.truststc.org/pubs/695.html}
    }
    

Posted by Jessica Gamble on 2 Apr 2010.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.