Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power system security
biblio
Off-line voltage security assessment of power transmission systems using UVSI through artificial neural network
Submitted by grigby1 on Mon, 11/20/2017 - 11:20am
substratal apparatus
power engineering computing
power system security
power system stability
power transmission systems
power utilities
pubcrawl
Resiliency
Stability analysis
Static VAr compensators
policy-based governance
transmission networks
two-bus network
unified voltage stability indicator
UVSI
voltage collapse
voltage collapse point assessment
Voltage control
Voltage regulators
voltage stability indicator
Government
artificial neural network
artificial neural network (ANN)
Artificial Neural Networks
collaboration
contingency analysis
feedforward neural nets
feedforward neural network
FFNN
Governance
ANN architecture
IEEE 30-bus power system
load demand
Loading
multibus power system network
neural net architecture
off-line voltage security assessment
online monitoring
Policy
biblio
A network data security analysis method based on DPI technology
Submitted by grigby1 on Mon, 11/20/2017 - 11:20am
protocol matching
network data legality
network data security analysis
network servers
Policy
policy-based governance
power system
power system security
protocol analysis
matched filters
protocol parsing
Protocols
pubcrawl
Resiliency
security gateway
Servers
threat data
visiting data security
deep packet inspection technology
Artificial Neural Networks
collaboration
computer network security
data content detection
data filtering
data legitimacy
data protocol
deep packet inspection (DPI) technology
artificial neural network
DPI technology
Fingerprint recognition
Governance
Government
Inspection
internetworking
Logic gates
biblio
Optimal control via waveform relaxation for power systems cyber-security applications
Submitted by grigby1 on Mon, 11/13/2017 - 10:55am
optimal control
waveform relaxation
Time-frequency Analysis
Time Frequency Analysis
standard nonlinear program
security
Scalability
Resiliency
pubcrawl
power systems cyber-security applications
power systems
power system security
power system control
power grids
optimization
constraint equations
objective function
nonlinear programming
Metrics
Mathematical model
Linear programming
grid vulnerability
grid control systems
Generators
GAMS optimization environment
feedback control system parameters
feedback
decision variables
cyber-attacks
biblio
Distributed Software Infrastructure for General Purpose Services in Smart Grid
Submitted by grigby1 on Mon, 11/13/2017 - 10:50am
open systems
web services
UK distribution network
smart power grids
Smart Grid
sensors
security
Resiliency
Reliability
pubcrawl
power system security
power engineering computing
power distribution reliability
pervasive computing
peer-to-peer distributed software infrastructure
Peer-to-peer computing
Aggregation
middleware security
middleware reliability
middleware
interoperability
heterogeneous technology
hardware-independent interoperability
general purpose services
event-driven middleware
event-based middleware
distribution network
distributed systems
Demand response (DR)
composability
communication technology attacks
collaboration
biblio
Security and privacy for smart grid using scalable key management
Submitted by grigby1 on Fri, 11/03/2017 - 10:31am
Public key
symmetric key technique
symmetric key scheme works
smart power grids
Smart Grids
Smart Grid
sensors
secure key management
Scalable Security
scalable key management
Scalability
replay attack
public key cryptography
authentication
pubcrawl
Protocols
power system security
power system management
Needham-Schroeder authentication protocol
Needham Schroder Authentication
man-in-the-middle attack
key management
Fault-Tolerance
fault tolerance
elliptic curve public key technique
Cryptographic Protocols
biblio
Contextual anomaly detection for cyber-physical security in Smart Grids based on an artificial neural network model
Submitted by grigby1 on Wed, 03/29/2017 - 11:33am
pubcrawl
neural network
Neural networks
neural networks security
photovoltaic rooftop power plant data
policy-based governance
power system security
power system stability
Production
neural nets
Resiliency
security of data
Smart Grid
Smart Grids
smart power grids
Voltage control
voltage distribution
Data models
artificial neural network model
Context
Context modeling
contextual anomaly detection method
cyber-physical security
cyber-physical systems
cyberphysical security
data analysis
Anomaly Detection
Density estimation robust algorithm
distributed energy resource behaviour
energy resources
intrusion detection system
low voltage distribution grid
malicious voltage control actions
Metrics
biblio
The achieve of power manager application honey-pot based on sandbox
Submitted by grigby1 on Wed, 03/08/2017 - 1:38pm
power manager application honey-pot
Sandboxing technology
sandbox
pubcrawl170114
power systems
power system simulation
power system security
power system management
power system
application layer simulation
power manager application
Power industry
Packaging
implementation
honeypot
Decision support systems
cyber-attack reduction
attack capture method
biblio
Study of the disturbance propagation in the discrete model of power networks
Submitted by grigby1 on Wed, 03/08/2017 - 1:31pm
Mathematical model
wave transfer function
Transfer functions
Rotors
pubcrawl170112
Propagation
power system simulation
power system security
power system interconnection
power network discrete model
Oscillators
1D chained power network
local oscillation
interconnected power networks
frequency dispersion
electromechanical wave equation
electromechanical wave
disturbance propagation
dispersion
discrete inertia model
Decision support systems
corner frequency
biblio
Neighborhood area network security in smart grid using security enhanced key updating
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
simple one-way hash function based scheme
PCL
power system security
process analysis toolkit
protocol composition logic
Protocols
pubcrawl170109
SAE protocols
security attacks
security enhanced key updating
PAT
simultaneous authentication of equals protocols
Smart Grid
smart grid infrastructure
Smart Grids
smart power grids
telecommunication security
wireless mesh networks
WMNs
EMSA protocol
Communication networks
Computer crime
Cryptographic Protocols
cyber-attacks
denial of service attack
DoS attack
efficient mesh security association protocols
EMSA
authentication
EMSA protocols
IEEE 802.11s
key refreshment strategy
Logic gates
mesh key holder security handshake
MKHSH
NAN
neighborhood area network security
biblio
Privacy on hypothesis testing in smart grids
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
power system control
Yttrium
unauthorized binary hypothesis testing
testing
smart power grids
smart meters
smart meter
Smart Grids
pubcrawl170108
pubcrawl170107
privacy risk suppression
privacy information leakage
privacy
power system security
asymptotic exponential decay rate minimization
power control
optimal energy control strategy
optimal control
minimum type II error probability
error statistics
energy supply
energy storage device
Energy storage
energy source
energy provider
data privacy
consumer behaviour
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
next ›
last »