Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power system security
biblio
Enhancement of Power System Security by Fuzzy based Unified Power Flow Controller
Submitted by grigby1 on Fri, 07/28/2023 - 2:32pm
security
pubcrawl
Metrics
resilience
Resiliency
power system security
power system stability
Interference
Power system dynamics
Steady-state
Fuzzy logic
damping
damping of oscillation
fuzzy logic controller
UPFC
biblio
Power Systems Security Assessment Based on Artificial Neural Networks
Submitted by grigby1 on Tue, 07/11/2023 - 1:16pm
Stability analysis
Power systems security
power system security
N-1 contingency analysis
Contingency management
Dynamical Systems
power system reliability
Multilayer Perceptron
Power system dynamics
pubcrawl
artificial neural network
power system stability
renewable energy sources
composability
Resiliency
resilience
Metrics
biblio
Impact Analysis of Intra-Interval Variation on Dynamic Security Assessment of Wind-Energy Power Systems
Submitted by aekwall on Fri, 08/26/2022 - 11:09am
pubcrawl
Resiliency
composability
Probabilistic logic
testing
Wind power generation
Predictive Metrics
Monte Carlo methods
Power system dynamics
power system security
Dynamic security assessment
intra-internal variation
Monte-Carlo simulation
wind energy
wind power.
Dynamical Systems
biblio
Contingency Ranking Selection using Static Security Performance Indices in Future Grids
Submitted by aekwall on Fri, 08/12/2022 - 3:09pm
power system security
Voltage Performance Index
Steady-state
static security assessment
static analysis
Renewable technologies
real-time systems
Real Power Performance Index
radiation effects
pubcrawl
power system stability
Dynamical Systems
Performance analysis
Indexes
Human behavior
contingency selection
Contingency Ranking
composabiity
composability
Predictive Metrics
Resiliency
biblio
Systematically Encoded Polynomial Codes to Detect and Mitigate High-Status-Number Attacks in Inter-Substation GOOSE Communications
Submitted by grigby1 on Mon, 10/04/2021 - 2:04pm
Metrics
Substations
substation automation
Resiliency
pubcrawl
power system security
Payloads
parity check codes
object oriented security
network security
multicast communications
Communication system security
message authentication
linear codes
information security
Industrial Communication
Generators
encoding
cyber-physical systems
Cryptography
composability
biblio
Information-Theoretic Security in Stochastic Control Systems
Submitted by aekwall on Thu, 04/08/2021 - 3:42pm
anonymous system timing analysis
Physical layer
smart meters
power system control
control engineering computing
CPS
cyber-physical system
stochastic systems
information theoretic security
information-theoretic security
controller policy security
cyber-physical architecture
demand response system
networked controller
smart electricity grid
stochastic control
stochastic control system
telecommunication services
Communication system security
Monitoring
Scalability
security
information security
Resiliency
Human behavior
pubcrawl
policy-based governance
security of data
Metrics
Stochastic processes
smart power grids
cyber-physical systems
Entropy
power engineering computing
power system security
control systems
biblio
Cryptography with information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 3:39pm
quantum computing
unconditionally secure schemes
trusted initializer model
power system security
long-term security
information theoretic security
Computer graphics
cryptosystems
digital signatures
information security
Scalability
information theory
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptography
biblio
Cyber-physical data stream assessment incorporating Digital Twins in future power systems
Submitted by grigby1 on Mon, 03/29/2021 - 12:28pm
SCADA systems
power grids
power system control
power system reliability
power system security
power systems
pubcrawl
reliable grid operations
resilience
Resiliency
SCADA information
power engineering computing
Scalability
secure grid operations
security
security of data
Sparse matrices
steady system states
Steady-state
Systems architecture
transient system states
expert systems
Anomaly Detection
Artificial Intelligence
control functions
critical physical events
cyber-attacks
cyber-physical situational awareness
cyber-physical systems
data stream analysis
digital twins
expert knowledge
AI based anomaly detection functionalities
high-resolution PMU data
holistic data stream assessment methodology
Human behavior
IT-OT convergence
measurement uncertainty
Monitoring
phasor measurement
Phasor measurement units
Pollution measurement
biblio
Automatic Protection Implementation Considering Protection Assessment Method of DER Penetration for Smart Distribution Network
Submitted by grigby1 on Mon, 03/29/2021 - 12:27pm
photovoltaic power systems
graphical user interfaces
Adaptive protection
adaptive rule-based method
automatic protection implementation
bidirectional power flow
DER application
DER penetration
distribution energy resources
Gorontalo sub-system network
graphical user interface
Indonesia
microhydro plant
GUI
plant location
power distribution protection
power distribution reliability
power quality
power system reliability
protection security assessment method
PSA
relay settings
smart distribution network
smart electrical system
solar photovoltaics
Load flow
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
distributed power generation
power engineering computing
power system security
Smart Grid
smart power grids
Reliability
adaptive systems
visualization
power supply quality
system reliability
Relays
power generation protection
expert systems
expert system
power generation reliability
hydroelectric power stations
smart grid systems
solar power stations
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 11:02am
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
1
2
3
4
5
6
7
8
9
…
next ›
last »