Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power system security
biblio
Resilience Analysis of Power Grids Under the Sequential Attack
Submitted by BrandonB on Fri, 05/01/2015 - 6:36am
Power system protection
Substations
substation-transmission lines
sequential attack graph
sequential attack
resilience analysis
power transmission reliability
power transmission lines
power system security
Attack Strategies
power grids vulnerability
power grids
Power Grid Security
electrical service
Complexity theory
complexity analysis
catastrophic consequences
Cascading Failures
biblio
Power system adequacy assessment with probabilistic cyber attacks against breakers
Submitted by BrandonB on Fri, 05/01/2015 - 6:34am
power system adequacy assessment
Substations
substation protection
substation breakers
Smart Grid
security
SCADA systems
Reliability
probabilistic modeling
probabilistic cyber attacks
power system security
power system reliability
adequacy assessment
power engineering computing
load shedding
IEEE RTS79 system
IEC standards
Generators
Cybersecurity
cyber-physical systems
cyber-physical power grids
cyber security
cyber network
circuit breakers
biblio
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures
Submitted by BrandonB on Fri, 05/01/2015 - 6:33am
network topology
state estimation
SOCCA
situational awareness
security-oriented cyber-physical contingency analysis
security
power system topology
power system security
power system planning
power system contingency
power infrastructures
power grids
physical components
accidental contingency
Mathematical model
malicious compromises
Indexes
grid operation
cyber-physical systems
cyber-physical security evaluation
cyber perspective
cyber network configuration
cyber components
control network
contingency analysis
Algorithm design and analysis
biblio
Cyber security evaluation of synchrophasors in a power system
Submitted by BrandonB on Fri, 05/01/2015 - 6:32am
Phasor measurement units
synchrophasors
Smart Grids
Smart Grid
security of data
security
Real-time monitoring
power system security
power system
Power measurement
power grids
Power Grid
PMU
benchmark IEEE 68 bus power system model
phasor measurement
network infrastructure
line current
frequency measurements
Frequency measurement
Data Security
cyber-attacks
cyber security vulnerabilities
Current measurement
Communication Network
bus voltage
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 6:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 6:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Reliability analysis of power grids with cyber vulnerability in SCADA system
Submitted by BrandonB on Fri, 05/01/2015 - 6:26am
power grids
system breaker trip
system breaker
supervisory control and data acquisition system
Substations
SCADA systems
SCADA system
RTS79
remote access point
reliability test system 79
Reliability
power system security
power system reliability
Bayes methods
power grid reliability analysis
power engineering computing
loss of load probability
LOLP
Generators
forced outage rate
FOR model
cyber-physical power systems
cyber vulnerability
cyber security
critical data eavesdropping
Bayesian attack graph model
biblio
Enhancing Demand Response signal verification in automated Demand Response systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:25pm
automated demand response system
automated DR
demand response signal verification enhancement
energy demands
integrating renewables
OpenADR
Power Grid
power grids
power system security
privacy
received DR event information
security-enhancement mechanism
biblio
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
Submitted by BrandonB on Thu, 04/30/2015 - 1:24pm
spread spectrum systems
primary security threat
probability
radio interference broadcast
radio networks
radiofrequency interference
Receivers
Smart Grid
smart grid application
smart grid communication
Smart Grids
smart power grids
power system security
TACT
telecommunication security
telecommunication traffic
transmitting adaptive camouflage traffic
U-shaped function
well-adopted attack model
wireless communication security
wireless network deployment
wireless networks
worst-case message delay
Jamming
code channel
Communication system security
control messages
cyber-physical system
delay performance guarantee
delays
existing attack model
generic jamming process
information exchange
information technologies
camouflage traffic
jamming attack
jamming attacks
jamming resilience
latency guarantee
message delay minimization
multiple-frequency channel
network load balance
network traffic load
Power distibution
power infrastructures
biblio
High performance computation tools for real-time security assessment
Submitted by BrandonB on Thu, 04/30/2015 - 1:19pm
software tools
power system
power system security
power system transient stability
power transmission control
predictor-corrector methods
proactive operator decision-support
SCADA
SCADA systems
security assessment
power engineering computing
sparse linear solver
SuperLU_MT library
synchrophasor measurement data
system control actions
thread-parallelization
transient stability analysis
transmission operators
U.S. Department of Energy grant
EPRI
computation tools
computer software
computing machine
contingency analysis
CPU time
data visualisation
DE-OE0000628
Decision Making
dynamic simulation software
Adams-Bashforth-Moulton predictor-corrector method
ETMSP performance
extended transient midterm simulation program
hybrid measurement-based-simulation-based security-assessment tool
hybrid simulation-measurement-based tools
integration
MPI-based parallelization
operation security risk
phasor measurement
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
next ›
last »