Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power system security
biblio
An Accurate False Data Detection in Smart Grid Based on Residual Recurrent Neural Network and Adaptive threshold
Submitted by grigby1 on Wed, 10/14/2020 - 12:39pm
false data injection attack
cyber physical systems
Transmission line measurements
False Data Detection
power system state estimation
accurate false data detection
Adaptive detection threshold
adaptive judgment threshold
adaptive threshold
Recurrent neural networks
FDIA detection method
linear prediction model
malicious attack
R2N2 model
Residual recurrent neural network
residual recurrent neural network prediction model
Weibull distribution
state estimation
security of data
Predictive models
pubcrawl
Human behavior
resilience
Resiliency
Mathematical model
Data models
Adaptation models
recurrent neural nets
power engineering computing
power system security
Smart Grid
smart power grids
composability
cyber-attacks
biblio
Modelling an Adaptable Multi-Objective Fuzzy Expert System Based Transmission Network Transfer Capacity Enhancement
Submitted by aekwall on Mon, 10/12/2020 - 11:38am
multiobjective fuzzy expert system
TTC enhancement
transmission network transfer capacity enhancement
Transfer capacity
thyristor-controlled series capacitors
thyristor applications
steady state line power loss
Security margin
Scalability
Resiliency
pubcrawl
power transmission economics
power system security
power markets
power engineering computing
Network losses
False Data Detection
LSI
Load flow
line suitability index
IEEE 30 bus system show
Human behavior
fuzzy systems
fuzzy system
fuzzy expert system membership functions
Expert Systems and Security
expert systems
DSB techniques
distributed slack bus techniques
CPF techniques
continuous power flow techniques
Collapse Voltage
biblio
Extending Functionality of Early Fault Diagnostic System for Online Security Assessment of Nuclear Power Plant
Submitted by aekwall on Mon, 10/12/2020 - 11:37am
prohibited plant state
online security assessment
operational stage
plant operational modes
plant operators
plant parameters
power engineering computing
power generation
power system security
nuclear power stations
pubcrawl
Resiliency
Safety
Scalability
security
security of data
simulators
fault diagnosis
computer security
control systems
Decision support systems
dynamic models
EDS
expert system
expert systems
Expert Systems and Security
False Data Detection
fault diagnostic system
Human behavior
instrumentation
NPP industry-cyber threat
nuclear engineering
nuclear engineering computing
nuclear power plant
biblio
Enhancing Smart Grid Cyber-Security Using A Fuzzy Adaptive Autonomy Expert System
Submitted by aekwall on Mon, 10/12/2020 - 11:36am
power system security
Human automation interaction
Human behavior
human computer interaction
information technology
leave-one-out cross-validation
level of automation
performance shaping factors
power engineering computing
gradient methods
pubcrawl
Resiliency
Scalability
security of data
smart grid cybersecurity
Smart Grids
smart power grids
expert systems
Adaptive Autonomy
adaptive systems
automation
Complexity theory
Computer crime
cyber security
environmental conditions
expert system database
False Data Detection
Expert Systems and Security
fuzzy adaptive autonomy expert system
fuzzy expert system
fuzzy rule
fuzzy set theory
fuzzy systems
gradient descent algorithm
biblio
Cybersecure Distributed Voltage Control of AC Microgrids
Submitted by grigby1 on Tue, 10/06/2020 - 1:41pm
secondary voltage control
power system security
Protocols
pubcrawl
Reactive power
reactive power control
resilience
resilience threshold
Resiliency
resilient control approach
resilient flocking
multi-robot systems
security of data
Synchronization
synchronization behavior
utilized control protocols
virtual time-varying communication graph
Voltage control
voltage restoration
weighted mean subsequence reduced algorithm
WMSR algorithm
distributed energy resources
communication links
Computing Theory
control engineering computing
cyber-attacks
cybersecure distributed voltage control
Cybersecurity
cyberthreats
Decentralized Control
DERs
distributed control
AC microgrids
distributed power generation
distributed secondary voltage control
frequency control
graph theory
malicious adversaries
microgrid test system
Microgrids
mobile robot team
mobile robots
biblio
Energy Data Security and Multi-Source Coordination Mechanism Based on Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 11:42am
blockchain-based energy data supervision
transaction model
summary directory tree
multisource synergy mechanism
multisource coordination mechanism
multisource collaboration
multi-source collaboration
internet technology
energy industry
energy data security
consensus mechanism
clean energy
Scalability
blockchain security
blockchain technology
power system security
power engineering computing
Distributed databases
internet
pubcrawl
Resiliency
Data Security
Cryptography
biblio
Development of a Cyber-Resilient Line Current Differential Relay
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
power system relaying
cyber-security concerns
digital communication channels
false line tripping
FDIA
LCDR
LCDR's trip command
line current differential relays (LCDRs)
line terminals
measured superimposed voltages
positive-sequence
cyber-resilient line current differential relay
power transmission faults
protected line
protection systems
remote current measurement
superimposed voltage
Transmission line measurements
transmission line protection
two-terminal lines
command injection attacks
Metrics
Cyber-security
pubcrawl
resilience
Resiliency
Circuit faults
power engineering computing
power system security
composability
computer security
cyber-physical systems
security of data
power transmission lines
power transmission protection
Voltage measurement
false data injection attacks
Global Positioning System
Relays
Current measurement
relay protection
coordinated attacks
biblio
Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
domain-based cyber-physical security solutions
circuit breaker control
circuit breakers
Collaborative cyber defense models
cyber attack resilient distance protection
cyber intrusions
cyber–physical security test bed
digital substation
digital substations
distributed security domain layer
data injection attack
domain-based mitigation
hardware-in-the-loop simulation
protection devices
real-time digital simulator
real-time power system analysis
smart grid cybersecurity
substation cybersecurity
transient fault signature-based cross-correlation coefficient algorithm
command injection attacks
Metrics
pubcrawl
resilience
Resiliency
Integrated circuit modeling
power engineering computing
power system security
composability
power grids
power system control
security of data
Power Grid
substation automation
substation automation systems
Substations
hardware-in-the loop simulation
cyberattack
relay protection
Power system protection
biblio
A Methodology for Detecting Stealthy Transformer Tap Command Injection Attacks in Smart Grids
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
on load tap changers
IEEE 118-bus system
Smart Grids
Voltage control
branch currents
control signals-commands
False Data Injection
false tap command injection
malicious tap change command
Voltage measurement
on-load tap changing transformers
power system SCADA networks
SCADA channels
state variables
stealthy transformer tap command injection attacks detection
voltage regulation device
command injection attacks
pubcrawl
state estimation
Power measurement
Reactive power
power generation control
Metrics
telecommunication channels
energy management
composability
smart power grids
power system security
SCADA systems
Indexes
computer network security
Resiliency
resilience
biblio
Ontology Based Security Risk Model for Power Terminal Equipment
Submitted by aekwall on Mon, 09/14/2020 - 12:32pm
Ontology
Vulnerability
security risk model
security of data
security
pubcrawl
power terminal device
power system stability
power system security
power IoT terminal device
power grids
power engineering computing
operating systems
ontology-based knowledge representation method
ontology based security risk model
APT attack
ontologies (artificial intelligence)
Ontologies
networked power terminal equipment oriented cyberspace security
network attack
Knowledge representation
IoT based technology
Internet of Things
Hardware
electric power IoT
Cryptography
computational intelligence
Compositionality
composability
APT security attack
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »