Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power system security
biblio
Quickest Detection of Time-Varying False Data Injection Attacks in Dynamic Smart Grids
Submitted by grigby1 on Mon, 12/30/2019 - 1:22pm
Human behavior
worstcase expected detection delay
time-varying state variables
time-varying false data injection attacks
smart power grids
security of data
Resiliency
resilience
pubcrawl
power system security
power engineering computing
IEEE standards
IEEE standard power system
False Data Detection
FDIAs
false data injection attacks
expected false alarm period
dynamic smart grids
dynamic smart grid systems
Cybersecurity
cyber physical systems
cumulative-sum-type algorithms
cumulative sum
computational complexity
computational complex scaling
composability
biblio
Stealthy Injection Attacks Against IEC61850's GOOSE Messaging Service
Submitted by aekwall on Mon, 12/02/2019 - 11:04am
command injection attacks
Time factors
substation automation system
substation automation
stealthy injection attacks
security technologies
SaS
Queueing analysis
QoS requirements
Message service
IEC61850s GOOSE messaging service
generic object oriented substation events messaging service
communications channels
security of data
quality of service
power system security
power engineering computing
IEC standards
Substations
Metrics
composability
pubcrawl
Resiliency
Protocols
security
biblio
Vulnerability and Protocol Association of Device Firmware in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 2:42pm
Metrics
vulnerability information correlation
vulnerability association
security vulnerability
Safety
Resiliency
resilience
pubcrawl
Protocols
protocol association
power system security
power system control
power grids
power grid vulnerability analysis
composability
mass grid device firmware device attributes
intelligent power grid
Inspection
industrial power systems
industrial control system device firmware
industrial control equipment safety inspection
industrial control device firmware protocol vulnerabilities
industrial control
firmware preprocessing
firmware
features extraction
Control equipment
biblio
Universal Framework for Vulnerability Assessment of Power Grid Based on Complex Networks
Submitted by grigby1 on Tue, 11/19/2019 - 2:42pm
power system
weighted betweenness evaluation index
weighted betweenness
vulnerability assessment
virtual edge weight
universal method
universal framework
unified weighting model
Topology
Resiliency
resilience
pubcrawl
power system stability
power system security
complex network theory
power grids
power grid vulnerability assessment methods
power grid vulnerability analysis
nodes vulnerability
network theory (graphs)
Metrics
Indexes
Generators
edges vulnerability
distinct weighted complex network model
composability
complex networks
biblio
Reserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
safe operation
power grids
Power measurement
power system security
power system stability
pubcrawl
resilience
Resiliency
risk analysis
risk analysis results
power grid vulnerability analysis
security of data
simulation penetration test environment
stable operation
subsequent attack test
subsequent KMCEPG-related attack penetration
terminal critical control devices
terminal key control equipment
test process
vulnerability mining
cyber security risks
Attack process construction
attack process construction technology
Attack test case
attack test cases
attack test results
composability
Computer crime
Control equipment
cyber attack
attack flow construction technology
Grid cyber attack
Grid key control equipment
Grid key measurement equipment
key measurement
Loss measurement
Metrics
operating systems
Power Grid
biblio
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
smart grid devices
power system
power system security
predefined vulnerability patterns
program diagnostics
resilience
Safety
security of data
security threats
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
smart terminals
Syntactics
terminal devices
terminal security
vulnerability detection
Compositionality
pubcrawl
Human behavior
composability
Resiliency
Analytical models
automatic static analysis
buffer-overflow vulnerabilities
buffer-overflow vulnerability detection
static analysis
Computer bugs
device program information
error reporting
feature extraction
Metrics
modern power transmission network
power engineering computing
biblio
Power Grid Security Improvement by Remedial Action Schemes Using Vulnerability Assessment Based on Fault Chains and Power Flow
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
power system security
vulnerable transmission lines
vulnerability index
vulnerability assessment
vulnerability assessemnt
resilient power grid
Resiliency
resilience
remedial action schemes
remedial action scheme
pubcrawl
probability
power transmission reliability
power transmission lines
power transmission faults
power system stability
Cascading Failures
Power system protection
power system faults
power grids
power grid vulnerability analysis
power grid security improvement
power flow-based method
power flow
Metrics
Load flow
large-scale blackout
Indexes
IEEE 14-bus test system
fault chains
fault chain theory
composability
biblio
Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems
Submitted by grigby1 on Wed, 10/02/2019 - 1:55pm
system reliability
pubcrawl
resilience
Resiliency
security
security assessment
security of data
Simulation Platform
smart meters
strategic control
privacy platform
system resiliency
Temperature control
TES simulation
TESST
testbed
transactive energy
transactive energy security simulation testbed
transactive energy systems
distributed energy resources
blockchain
Computational modeling
cyber-attacks
Cyber Attacks
cyber-physical security
cyber-physical simulation platform
cyber-physical systems
data privacy
decentralized power system control problem
active distribution system operator
distributed power generation
distributed software platforms
financial markets
HVAC
power distribution economics
power distribution reliability
power engineering computing
power system security
biblio
A Design and Implementation Method of IPSec Security Chip for Power Distribution Network System Based on National Cryptographic Algorithms
Submitted by grigby1 on Wed, 09/11/2019 - 1:44pm
Predictive Metrics
national cryptographic algorithm
network layer communication security
network security
Networked Control Systems Security
power distribution automation system
power distribution network system
power distribution protection
power engineering computing
power system security
Microelectronics Security
Protocols
pubcrawl
resilience
Resiliency
security protection scheme
sercurity chip
the power distribution automation system
Virtual private networks
VPN gateway
Distribution system
authentication function
authentication gateway
authorisation
composability
computer network security
Cryptographic Protocols
distribution application layer encryption authentication device
distribution master station
distribution network system
authentication
Dual Encryption
encryption
IP networks
IPSec protocol
IPSec security chip
Logic gates
master cipher machine
master system
Metrics
biblio
Malware propagation effects on SCADA system and smart power grid
Submitted by aekwall on Mon, 07/01/2019 - 9:11am
power engineering computing
smart power grids
Smart Grids
simulated smart power grid environment
sensors
SCADA Systems Security
SCADA systems
SCADA system
Resiliency
pubcrawl
power system security
power grids
power generation
composability
Phasor measurement units
openDSS
OMNeT++ simulator
malware propagation effects
malware
invasive software
Human behavior
grid computing
cyberattack
Cyber Attacks
critical infrastructures
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »