Entry Ali:2015:RBI from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Ali:2015:RBI,
author = "Muhammad Qasim Ali and Ehab Al-Shaer",
title = "Randomization-Based Intrusion Detection System for
Advanced Metering Infrastructure*",
journal = j-TISSEC,
volume = "18",
number = "2",
pages = "7:1--7:??",
month = dec,
year = "2015",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/2814936",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Mon Dec 21 18:18:49 MST 2015",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "Smart grid deployment initiatives have been witnessed
in recent years. Smart grids provide bidirectional
communication between meters and head-end systems
through Advanced Metering Infrastructure (AMI). Recent
studies highlight the threats targeting AMI. Despite
the need for tailored Intrusion Detection Systems
(IDSs) for smart grids, very limited progress has been
made in this area. Unlike traditional networks, smart
grids have their own unique challenges, such as limited
computational power devices and potentially high
deployment cost, that restrict the deployment options
of intrusion detectors. We show that smart grids
exhibit deterministic and predictable behavior that can
be accurately modeled to detect intrusion. However, it
can also be leveraged by the attackers to launch
evasion attacks. To this end, in this article, we
present a robust mutation-based intrusion detection
system that makes the behavior unpredictable for the
attacker while keeping it deterministic for the system.
We model the AMI behavior using event logs collected at
smart collectors, which in turn can be verified using
the invariant specifications generated from the AMI
behavior and mutable configuration. Event logs are
modeled using fourth-order Markov chain and
specifications are written in Linear Temporal Logic
(LTL). To counter evasion and mimicry attacks, we
propose a configuration randomization module. The
approach provides robustness against evasion and
mimicry attacks; however, we discuss that it still can
be evaded to a certain extent. We validate our approach
on a real-world dataset of thousands of meters
collected at the AMI of a leading utility provider.",
acknowledgement = ack-nhfb,
articleno = "7",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- accurately,
2(3)295,
10(4)1,
11(3)12,
12(2)13,
12(3)17,
18(4)12
- advanced,
14(1)5,
16(1)2,
18(2)5
- against,
2(3)230,
2(4)354,
2(4)416,
9(4)461,
10(3)11,
11(2)3,
11(3)13,
11(4)22,
12(3)18,
13(3)22,
13(3)28,
14(1)7,
14(1)13,
14(3)24,
15(1)3,
15(2)6,
15(2)8,
15(3)14,
16(1)1,
16(1)2,
16(2)8,
16(4)13,
17(1)4,
17(2)7,
17(2)8,
18(1)2
- Al-Shaer, Ehab,
15(4)17
- Ali, Muhammad Qasim,
15(4)17
- approach,
1(1)3,
1(1)26,
2(1)34,
2(2)138,
2(3)269,
2(3)295,
5(2)119,
5(3)203,
6(1)128,
7(3)392,
9(4)391,
9(4)421,
10(1)2,
10(1)4,
10(3)11,
10(3)12,
10(4)4,
11(1)3,
11(3)15,
11(3)16,
11(4)17,
11(4)19,
12(1)1,
12(1)4,
12(2)11,
12(3)14,
13(3)20,
13(3)24,
13(4)31,
13(4)35,
13(4)36,
14(1)8,
14(3)23,
14(4)29,
15(1)4,
15(3)12,
15(3)13,
15(4)15,
15(4)17,
15(4)18,
16(2)5,
16(2)7,
16(2)8,
16(4)15,
16(4)16,
17(3)12,
17(4)14,
18(2)5,
18(3)11
- area,
12(2)8,
12(4)22,
14(1)13,
14(1)14,
15(3)12,
17(4)16
- article,
10(1)3,
11(1)3,
11(1)4,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
11(3)16,
11(4)20,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)4,
12(1)6,
12(2)8,
12(2)10,
12(2)13,
12(3)14,
12(3)16,
12(3)17,
12(3)19,
12(4)21,
12(4)22,
13(3)22,
13(3)24,
13(3)25,
13(3)27,
13(3)28,
13(4)29,
13(4)31,
13(4)32,
13(4)34,
13(4)36,
13(4)41,
14(1)2,
14(1)3,
14(1)4,
14(1)10,
14(1)13,
14(1)14,
14(3)23,
14(3)25,
14(4)30,
15(2)9,
15(2)10,
15(3)11,
15(3)12,
15(3)13,
15(4)15,
15(4)16,
15(4)17,
16(1)1,
16(1)4,
16(2)6,
16(2)7,
16(2)8,
16(3)10,
16(4)14,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
17(3)12,
17(4)13,
17(4)16,
18(1)3,
18(2)5,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- attacker,
2(2)159,
8(1)78,
10(1)4,
10(4)3,
10(4)6,
11(3)12,
11(3)15,
12(1)4,
12(2)12,
12(3)17,
12(4)22,
13(4)37,
14(1)7,
14(1)13,
14(4)31,
15(1)2,
15(4)16,
17(2)8,
17(3)11,
17(4)13,
17(4)16,
18(1)1,
18(4)13
- been,
1(1)93,
2(3)269,
2(3)332,
10(1)2,
10(3)12,
10(4)4,
11(1)2,
11(4)17,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(3)17,
13(3)20,
13(3)27,
13(4)36,
13(4)39,
14(1)3,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
15(2)10,
16(3)10,
16(4)14,
17(1)3,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(4)14
- behavior,
2(3)295,
2(4)354,
10(4)6,
11(4)19,
12(1)5,
12(3)14,
12(3)19,
14(1)10,
14(4)32,
15(1)2,
15(2)10,
15(3)14,
16(3)12,
17(2)8,
18(2)5,
18(3)9
- bidirectional,
12(2)13
- certain,
10(2)5,
11(2)1,
11(4)22,
12(1)1,
12(1)6,
12(2)8,
12(4)20,
13(3)26,
13(4)40,
15(2)9,
17(1)2,
17(3)10
- chain,
2(2)159,
10(4)3,
12(3)15,
14(1)5,
15(1)2,
15(4)17
- challenge,
11(4)18,
13(4)31,
14(1)3,
14(3)25,
15(3)12,
17(1)3,
18(1)3
- collected,
11(2)3,
12(2)8,
15(4)17,
16(2)8,
17(3)10,
17(4)14,
18(3)11,
18(4)13
- communication,
4(3)289,
4(4)371,
7(4)523,
10(3)9,
10(4)6,
11(1)2,
11(2)2,
11(2)3,
11(3)14,
11(4)18,
12(1)2,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(1)8,
13(4)29,
14(1)4,
14(1)12,
15(1)5,
15(2)6,
15(2)7,
15(2)9,
15(3)14,
16(3)10,
16(4)15,
17(1)4,
17(3)9,
18(2)5
- computational,
10(2)5,
11(2)6,
12(1)3,
12(4)21,
13(3)28,
13(4)40,
15(1)3,
15(2)9,
16(3)12,
16(4)17,
17(3)10,
17(3)12,
17(4)15,
18(4)12
- configuration,
2(2)177,
12(3)14,
15(3)13,
15(4)15,
15(4)17,
17(2)5,
18(1)4
- cost,
4(1)72,
9(4)461,
11(4)20,
12(2)13,
13(3)22,
14(1)2,
14(1)12,
14(2)17,
16(4)16,
17(3)11,
18(1)2,
18(2)5
- counter,
10(4)1,
11(4)23,
14(3)26,
15(4)16
- dataset,
10(1)4,
10(4)4,
12(1)4,
13(4)32,
15(4)15,
15(4)17,
16(2)8,
16(4)14,
17(3)12,
18(4)12,
18(4)14
- deployment,
11(4)19,
12(1)1,
12(1)2,
12(4)21,
13(3)28,
15(2)7,
17(4)16
- despite,
11(4)22,
12(1)1,
12(1)2,
17(3)9,
18(4)14
- detect,
2(3)295,
10(4)6,
11(3)14,
11(3)15,
12(2)10,
12(2)11,
12(2)13,
12(3)19,
14(1)13,
15(2)6,
16(2)5,
16(4)14,
17(4)16,
18(3)9
- detection,
2(2)159,
2(3)295,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
5(3)203,
6(2)173,
6(4)443,
7(4)591,
9(1)61,
10(1)4,
11(2)2,
11(3)12,
11(3)15,
11(4)19,
11(4)20,
12(2)11,
12(2)12,
12(2)13,
12(4)22,
13(2)12,
13(4)30,
14(1)13,
14(3)27,
15(2)6,
15(3)11,
15(4)17,
17(4)13,
17(4)15,
18(1)2,
18(3)9
- deterministic,
12(2)10,
15(3)11
- device,
2(3)230,
10(4)3,
10(4)4,
11(2)2,
11(3)14,
12(3)15,
13(4)30,
14(1)7,
15(1)4,
15(2)7,
16(2)6,
16(3)10,
17(3)10,
17(4)14,
17(4)16
- discuss,
2(1)105,
10(2)5,
10(2)8,
11(1)2,
11(2)1,
12(4)20,
12(4)22,
13(3)22,
13(3)25,
13(4)35,
14(3)24,
17(1)3
- end,
9(4)461,
10(2)8,
14(2)19,
15(1)2,
15(4)17,
17(3)10,
18(1)1
- evasion,
15(4)17
- event,
2(2)159,
10(1)4,
11(4)20,
12(1)1,
12(3)17,
17(2)8
- exhibit,
10(4)5,
12(1)1,
18(1)4
- extent,
11(2)3,
11(2)6
- generated,
1(1)3,
2(2)159
- grid,
11(1)3,
14(1)13,
16(3)11,
18(2)5
- has,
1(1)93,
2(1)105,
2(2)138,
2(3)230,
2(3)269,
2(3)332,
9(4)391,
10(1)3,
10(1)4,
10(3)10,
11(1)2,
11(2)2,
11(3)14,
11(4)17,
11(4)19,
11(4)22,
11(4)23,
12(1)2,
12(2)9,
12(2)10,
12(3)15,
12(4)22,
13(3)20,
13(3)25,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
14(1)3,
14(1)12,
14(1)14,
14(3)26,
14(4)28,
15(1)2,
15(2)6,
15(2)10,
15(3)12,
16(2)8,
16(4)14,
17(1)2,
17(1)3,
17(3)9,
17(3)11,
17(4)14,
17(4)15,
17(4)16,
18(3)11,
18(4)14
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(4)13
- high,
1(1)3,
11(3)13,
11(3)15,
11(4)18,
11(4)20,
12(2)11,
14(4)31,
15(2)7,
15(3)12,
16(2)6,
16(2)8,
16(3)11,
17(1)1,
17(3)11,
17(4)16,
18(4)12
- highlight,
11(1)4,
16(3)10
- however,
2(3)269,
10(2)5,
10(2)8,
11(2)6,
11(3)15,
11(4)18,
11(4)20,
11(4)22,
13(3)20,
13(3)22,
13(4)35,
13(4)38,
13(4)39,
14(1)14,
14(3)24,
14(4)28,
14(4)29,
15(2)10,
16(2)7,
16(3)11,
17(1)2,
17(1)4,
17(3)12,
17(4)15,
18(1)1,
18(4)13
- infrastructure,
2(2)138,
7(1)21,
9(4)421,
10(3)11,
11(3)16,
12(2)12,
13(4)29,
17(4)16
- intrusion,
2(2)159,
3(1)1,
3(3)186,
3(4)227,
3(4)262,
4(4)407,
6(2)173,
6(4)443,
7(2)274,
7(4)591,
10(1)4,
11(3)12,
11(4)19,
11(4)20,
13(4)30
- invariant,
17(4)13
- keeping,
17(4)15
- launch,
16(2)8,
17(2)6
- leading,
9(4)461
- limited,
10(4)3,
12(1)2,
12(3)18,
14(4)31,
17(1)2,
17(3)9,
17(3)10
- linear,
11(2)1,
11(3)13,
11(4)21,
12(3)16,
12(3)18,
12(4)20,
14(4)29,
15(1)4,
16(4)17,
17(3)11,
18(2)5
- log,
2(2)159,
10(4)6,
13(4)30,
15(2)9,
17(3)12
- logic,
2(1)3,
2(1)65,
2(3)332,
6(1)128,
6(4)501,
11(4)21,
12(1)1,
13(3)20,
14(1)8,
14(1)9,
16(4)17,
17(1)2,
17(2)5
- made,
1(1)3,
2(1)34,
2(1)105,
12(3)14,
13(4)37,
15(2)10
- make,
2(3)332,
9(1)31,
10(1)2,
10(3)11,
10(4)6,
11(1)4,
11(3)13,
11(3)14,
11(4)22,
11(4)23,
12(1)1,
12(3)15,
13(3)22,
13(3)26,
13(3)28,
13(4)35,
14(4)29,
15(1)3,
15(1)4,
15(4)17,
16(3)10,
17(3)10,
18(1)1,
18(4)13
- Markov,
13(4)35,
15(4)17
- meter,
14(1)13,
18(1)1
- modeled,
12(3)18,
13(3)26,
15(3)13
- module,
7(2)175,
13(3)28,
15(4)17,
17(2)6
- mutable,
11(1)3
- need,
2(2)177,
2(3)230,
2(4)390,
9(4)421,
10(4)2,
10(4)3,
12(3)17,
13(3)22,
15(4)17,
15(4)18,
16(2)6,
17(3)10,
18(2)6
- own,
11(2)3,
12(2)10,
14(2)19,
14(3)25,
16(3)10
- potentially,
10(4)4,
11(4)20,
16(3)12,
18(4)12
- power,
1(1)93,
9(2)162,
10(4)1,
12(2)10,
14(1)7,
14(1)8,
14(1)13,
15(1)2,
18(2)5
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)2,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)3,
10(4)4,
10(4)6,
11(1)3,
11(1)4,
11(3)12,
11(3)15,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)24,
14(3)26,
14(4)30,
15(2)7,
15(4)17,
16(1)2,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
18(1)2
- provide,
1(1)3,
1(1)93,
2(1)3,
2(1)34,
2(1)65,
2(1)105,
2(3)230,
2(4)390,
7(2)319,
10(1)3,
10(2)8,
10(3)10,
10(4)2,
10(4)6,
11(1)3,
11(1)4,
11(2)2,
11(3)12,
11(3)13,
11(4)17,
11(4)20,
11(4)23,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)15,
12(3)16,
12(4)22,
13(3)22,
13(3)24,
13(4)31,
13(4)34,
13(4)38,
13(4)41,
14(1)4,
14(1)7,
14(1)8,
14(3)25,
14(4)28,
15(2)6,
15(2)10,
15(4)17,
15(4)18,
16(1)3,
16(2)5,
16(3)9,
16(3)11,
16(4)17,
17(2)5,
17(3)11,
17(3)12,
17(4)16,
18(1)1,
18(1)2,
18(2)5,
18(4)13,
18(4)14
- provider,
2(2)177,
10(4)4,
11(1)3,
11(3)15,
13(4)39,
14(1)10,
16(3)12,
18(4)13
- randomization,
15(2)8
- real-world,
2(2)159,
14(1)10,
15(4)15,
16(4)14,
16(4)16
- recent,
2(1)65,
2(2)138,
10(2)8,
10(3)9,
11(1)2,
11(4)22,
12(1)2,
12(2)12,
14(1)7,
14(1)14,
14(4)29,
15(1)3,
16(2)7,
16(3)10,
18(1)1,
18(2)5,
18(4)13
- restrict,
14(1)10,
18(4)13
- robust,
2(4)354,
11(4)19,
13(4)38,
14(1)5,
18(3)11,
18(4)12
- robustness,
15(1)5,
15(3)12
- Shaer, Ehab, Al-,
15(4)17
- smart,
15(2)7,
18(3)10,
18(4)14
- specification,
1(1)26,
2(1)65,
2(2)177,
3(4)207,
6(4)501,
8(2)187,
8(4)351,
10(2)7,
10(2)8,
10(3)9,
10(4)2,
11(1)4,
11(4)19,
13(3)24,
13(3)26,
14(3)24,
15(3)13,
15(4)16,
16(1)3,
16(1)4,
16(4)13,
17(2)5,
17(4)16,
18(2)8
- still,
1(1)26,
10(1)2,
11(4)17,
11(4)21,
12(2)13,
12(4)20,
13(3)20,
13(3)25,
14(3)27,
17(2)8
- study,
2(3)230,
2(4)416,
7(2)206,
10(2)5,
10(4)5,
11(1)3,
11(2)3,
11(4)23,
12(1)6,
12(3)14,
12(4)20,
13(4)40,
14(1)7,
14(2)18,
14(2)19,
15(1)5,
15(2)7,
15(2)8,
15(2)10,
15(3)13,
17(1)1,
17(2)7,
17(3)12,
17(4)14,
18(1)1,
18(1)2,
18(1)4,
18(2)5,
18(3)9,
18(4)13
- tailored,
13(3)24
- temporal,
2(3)295,
4(3)191,
5(1)62,
10(1)3,
10(4)2,
14(1)14
- thousand,
2(1)65,
10(1)4,
14(4)29,
15(4)18
- threat,
7(4)489,
10(3)11,
11(2)2,
11(2)3,
12(2)12,
14(1)7,
14(3)24,
15(1)2,
15(2)7,
16(2)6,
16(2)8,
16(3)9,
17(4)16,
18(2)5,
18(4)12,
18(4)14
- through,
5(4)367,
6(1)1,
9(2)162,
10(3)12,
10(4)2,
10(4)6,
11(2)2,
11(3)12,
11(4)22,
11(4)23,
12(2)8,
12(2)13,
13(2)12,
13(3)25,
14(1)13,
15(3)12,
15(4)16,
16(2)5,
16(2)7,
16(3)9,
17(4)14,
18(1)2,
18(3)11
- traditional,
1(1)93,
2(3)269,
10(4)4,
11(4)22,
12(1)3,
12(2)10,
12(4)21,
14(1)3,
15(1)2,
16(2)8,
17(1)2,
17(3)12,
17(4)14,
17(4)16
- turn,
11(2)1,
11(2)6,
12(1)6,
15(4)17
- unique,
10(4)3,
11(3)12,
12(3)16,
15(3)12,
16(4)14,
17(4)16,
18(3)11
- unlike,
11(3)15,
12(2)8
- unpredictable,
17(1)2
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(1)2,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- utility,
11(1)2,
16(2)7
- validate,
2(3)230,
12(2)13,
14(4)32,
15(2)6,
15(3)12
- verified,
2(3)332,
9(2)138,
13(3)26,
15(1)3,
15(3)11,
16(4)17
- very,
1(1)3,
2(1)65,
2(3)269,
10(4)1,
11(2)5,
11(3)14,
11(4)18,
13(3)22,
13(3)27,
14(1)2,
15(1)2,
15(3)12,
16(1)1,
16(3)11,
16(4)13,
17(3)10,
17(4)15,
17(4)16,
18(3)11,
18(4)12,
18(4)14
- while,
2(3)230,
2(4)354,
9(4)391,
9(4)421,
9(4)461,
10(2)5,
10(4)2,
11(1)4,
11(2)2,
11(2)6,
11(4)18,
11(4)19,
11(4)22,
12(2)9,
12(3)16,
13(1)5,
13(3)22,
13(3)25,
13(4)39,
13(4)41,
14(3)25,
14(3)26,
14(4)31,
15(3)12,
15(4)15,
15(4)17,
16(3)9,
16(3)12,
16(4)16,
17(1)4,
17(3)9,
17(4)15,
18(1)1
- world, real-,
2(2)159,
14(1)10,
15(4)15,
16(4)14,
16(4)16
- written,
16(3)9
- year,
2(1)65,
10(3)10,
11(1)2,
11(4)17,
12(1)2,
14(1)14,
16(4)16