Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power system security
biblio
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Submitted by el_wehby on Mon, 05/14/2018 - 3:07pm
physical power flow maximization
worst-case attack consequences
vulnerability assessments
upper bounds
Upper bound
state estimation
Smart Grids
security of data
scalable optimization
power system vulnerability evaluation
power system security
Polish system
Algorithm design and analysis
optimization
mixed-integer linear program
lower bounds
Load flow
Linear programming
integer programming
IEEE 118-bus system
Generators
false data injection cyber-attacks
bi-level optimization problem
1449080
biblio
Real-Time Identification of Dynamic Events in Power Systems Using PMU Data, and Potential Applications #8212;Models, Promises, and Challenges
Submitted by el_wehby on Mon, 05/14/2018 - 1:23pm
Power system dynamics
Voltage measurement
transmission systems
Switches
situational awareness
real-time identification
power transmission protection
power systems
power system stability
power system security
power system protection security
classification
Power measurement
PMU data
Phasor measurement units
phasor measurement
pattern creation
dynamic events
Data visualization
data communications
cyberattack
1549831
biblio
State Estimation Error Detection System for Online Dynamic Security Assessment
Submitted by grigby1 on Wed, 05/09/2018 - 1:50pm
Resiliency
power system monitoring
power system security
power system stability control
power system state estimation
power system transient stability
pubcrawl
Q measurement
remedial action schemes
resilience
power system
SCADA
SCADA systems
SE error detection system
security
state estimation
state estimation error detection system
supervisory control and data acquisition
Transient Stability
load shedding
DSA analysis
DSA assessment
Dynamic security assessment
dynamical system
electrical power system
generator shedding scheme
Human behavior
Hybrid power systems
Load flow
Compositionality
online dynamic security assessment
online-DSA
phasor measurement
Phasor measurement units
Phasor Measurements Units
PMU observation data
power flow value
Power measurement
biblio
Heuristics-based approach for identifying critical N \#x2014; k contingencies in power systems
Submitted by K_Hooper on Wed, 05/09/2018 - 10:03am
Power system protection
system operators
system failure
standards
standard IEEE-14 bus system
Security Heuristics
Scalability
Resiliency
Resilience.
reliable operation
pubcrawl
Prediction algorithms
power system transient stability
power system stability
power system security
power system reliability
Algorithm design and analysis
power system identification
power system faults
possible critical N - k contingencies
N—k contingency analysis
multiple critical N-k contingencies
mitigation strategies
IEEE-57 bus system
IEEE-39 bus system
Heuristic algorithms
electrical power systems
dangerous contingency
critical contingencies
Cascading Failures
blackouts
biblio
Malware Detection for Secure Microgrids: CoSSMic Case Study
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
Microgrids
vulnerability detection
SmartGrid
smart-devices
security vulnerability
security threats
security
sandbox
Resiliency
pubcrawl
Protocols
power system security
power engineering computing
performance evaluation
Monitoring
Compositionality
microgrid ecosystem
microgrid
Metrics
malware detection
malware
invasive software
Human behavior
energy infrastructure
electric microgrids
distributed power generation
Cybersecurity
cyber vulnerabilities
CoSSMic project
biblio
Vulnerability analysis and consequences of false data injection attack on power system state estimation
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
nonlinear system model
vulnerability detection
Vulnerability Analysis
state estimation
Resiliency
pubcrawl
power transmission lines
power system state estimation
power system security
physical line
optimization
AC state estimation
Metrics
Load modeling
Load flow
Limiting
Human behavior
FDI attack
false data injection attack
DC optimal power flow
Compositionality
bi-level optimization problem
biblio
False data injection attack in smart grid topology control: Vulnerability and countermeasure
Submitted by K_Hooper on Wed, 04/04/2018 - 8:58am
smart power grids
pubcrawl
real power flow measurement
reliability perspectives
renewable energy sources
residue based bad data detection
Resiliency
security of data
Smart Grids
smart grid topology control
power system state estimation
stability check
state estimation
Substations
system control operation
Topology
topology control
Transient analysis
vulnerability detection
Metrics
Compositionality
Conferences
crucial factor
cyber security issue
false data injection attack
FDIA
Human behavior
IEEE 24 bus reliability test system
Load flow
AC state estimation
modern power system
online stability check result
physical system stability
power engineering computing
power flow measurement
power system reliability
power system security
power system stability
biblio
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System
Submitted by grigby1 on Mon, 04/02/2018 - 11:53am
pubcrawl
node attack
parallel computing
Ports (Computers)
power engineering computing
power information network system
Power system protection
power system security
pre-order attack path
probability
protection requirements
Protocols
network intrusion detection system
resilience
Resiliency
security
security evaluation index system
security of data
security protection configuration
telecommunication security
tools
vulnerability exploit
vulnerability information
attacker ability
attack confidence
attack evidence
attack graph
attack graphs
attack intent
attack intention recognition method
attack probability value
attack proficiency
attack sub-graphs
attack targets
actual power system network security operation
attacker knowledge
attacker willingness
composability
current security technologies
diverse network protocols
electric power information system
graph theory
Indexes
Metrics
network attack graph
biblio
Online Analysis of Voltage Security in a Microgrid Using Convolutional Neural Networks
Submitted by grigby1 on Mon, 04/02/2018 - 11:39am
resilience
online method
policy-based governance
power engineering computing
power grids
power system security
power system stability
pubcrawl
Reactive power
online analysis
Resiliency
security
Stability criteria
Support vector machines
traditional voltage stability problem
voltage instability problems
voltage security
Artificial Neural Networks
Neurons
neural nets
modified IEEE 14-bus system
modern power systems
Microgrids
microgrid
Metrics
machine learning
learning (artificial intelligence)
Impedance
distributed power generation
Decision trees
convolutional neural networks
classification problem
back-propagation neural network
biblio
False Data Injection Attacks Targeting DC Model-Based State Estimation
Submitted by grigby1 on Mon, 03/19/2018 - 12:59pm
power system state estimation
Transmission line measurements
Topology
state variable target
state estimation
specific targets
smart power grids
Smart Grid
security of data
secure operation
Scalability
Resiliency
resilience
Q measurement
pubcrawl
pre-specified meter target
adversary
power system security
power engineering computing
network topology
Metrics
Meters
Manganese
Human behavior
grid operator
false data injection attack
economic operation
DC model
cyber-attacks
attacking vector
Adversary Models
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »