Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power system security
biblio
Computing the Worst Case Scenario for Electric Power System Dynamic Security Assessment
Submitted by grigby1 on Fri, 06/26/2020 - 12:17pm
Hopf Bifurcation
worst case scenario
VSM
voltage stability margin
safety operation
saddle-node bifurcation
power transfer limit
power system dynamic stability
operation centers
load growth direction
LGD
power system security
electric power system dynamic security assessment
bifurcation
IEEE 39 bus system
Dynamic security assessment
cyber-physical systems
Resiliency
Metrics
composability
pubcrawl
biblio
PMU Based Data Driven Approach For Online Dynamic Security Assessment in Power Systems
Submitted by grigby1 on Fri, 06/26/2020 - 12:17pm
real time synchronized measurements
power engineering computing
power system
power system control
Power system dynamics
power system security
power system stability
power system transient stability
pubcrawl
Random Forest
PMU based data driven approach
real-time systems
security
synchronized phasor measurements
system control
system operator
system pertaining
transient instability
wide-area dynamic security assessment
Decision Tree
Intelligent Data Security
Compositionality
Resiliency
Scalability
composability
cyber-physical systems
Data mining
data mining model
Data models
Intelligent Data and Security
Dynamic security assessment
IEEE 39 bus system
intelligent framework based approach
measurement data
Metrics
online dynamic security assessment
phasor measurement
Phasor measurement units
biblio
Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks
Submitted by grigby1 on Mon, 06/01/2020 - 2:58pm
Law
Wireless communication
version number attack
smart power grids
smart meters
Smart Grid
Scalability
RPL
Routing protocols
routing protocol for low-power and lossy networks
Routing
Resiliency
resilience
pubcrawl
power system security
advanced metering infrastructure
IETF ROLL working group
filtering theory
Cyber Attacks
cuckoo-RPL
cuckoo filter.
cuckoo filter based RPL
computer network security
computer network reliability
Blackhole attack
authorisation
authentication
AMI network
Advanced Metering Infrastructure (AMI)
biblio
High-risk Problem of Penetration Testing of Power Grid Rainstorm Disaster Artificial Intelligence Prediction System and Its Countermeasures
Submitted by aekwall on Mon, 06/01/2020 - 9:54am
resilience
power engineering computing
power grid rainstorm disaster artificial intelligence prediction system
power grid storm disasters
power grids
power Internet of Things
power meteorological service technology support
power system security
power transformer testing
program debugging
pubcrawl
policy-based governance
Resiliency
security of data
SQL
SQL blind bug
SQL injection
SQL injection attack behavior
SQL injection penetration test
Storms
system penetration testing
Vulnerability
host security
Artificial Intelligence
artificial storm prediction system
Companies
composability
disaster prediction information systems
disasters
electric power information system security defense work
electrical safety
energy Internet disaster safety
energy internet disaster security
application security
information security
Information systems
internet
Internet of Things
middleware
middleware security
network security
password
Penetration Testing
PGRDAIPS
biblio
Design and Implementation of a New Intelligent Substation Network Security Defense System
Submitted by aekwall on Mon, 05/04/2020 - 10:21am
power system security
Networked Control Systems Security
protection demand
network security protection level
intelligent substation network security risk
intelligent substation network security protection
intelligent substation network security defense system
defense system
intelligent substation
Predictive Metrics
Power system protection
defense mechanism
Monitoring
Communication networks
Substations
Business
composability
pubcrawl
Resiliency
network security
real-time systems
Protocols
security
biblio
Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities
Submitted by grigby1 on Fri, 04/24/2020 - 3:38pm
algorithmic approaches
Power Grid Vulnerability Assessment
Voltage measurement
SCADA
power system stability
power related errors
power grid control systems
power flow cyber-attack vulnerabilities
power flow constraints
Numerical Resilience
Load flow
Economic dispatch
cyber-attacks
contingency analysis
attack models
security of data
Metrics
power grids
convergence
control systems
composability
Smart Grid
power system security
power engineering computing
state estimation
Indexes
Resiliency
resilience
pubcrawl
biblio
An Evolutionary Computation Approach for Smart Grid Cascading Failure Vulnerability Analysis
Submitted by grigby1 on Fri, 04/24/2020 - 3:38pm
benchmark systems
Power Grid Vulnerability Assessment
smart grid security
smart grid protection
smart grid cascading failure vulnerability analysis
Reinforcement learning
power transmission reliability
power transmission protection
power transmission lines
particle swarm optimization
particle swarm optimisation
line-switching sequential attack
line-switching
evolutionary computation based vulnerability analysis framework
evolutionary computation
Cascading Failures
learning (artificial intelligence)
Power system protection
power system faults
failure analysis
Metrics
Smart Grids
composability
smart power grids
power system security
power engineering computing
cyber-physical security
Topology
Resiliency
resilience
pubcrawl
security of data
biblio
A Study on Data Security and Query privacy in Cloud
Submitted by grigby1 on Fri, 04/03/2020 - 11:33am
multifactor authentication
wide set
security policies
security of data
scalable resources
Scalability
Safety
pubcrawl
privacy problems
Privacy Policies
privacy contemplations
privacy
power system security
Oblivious RAM
noteworthy economic assistances
multioccupancy
authentication
Human behavior
high-tech tasks
encryption
effective resolutions
Economics
decreased operational expenditures
data privacy
data defence failures
confidentiality
Cloud Security
cloud platforms
cloud computing situations
Cloud Computing
Big Data
biblio
Intelligent Consumers Device and Cybersecurity of Load Management in Microgrids
Submitted by aekwall on Mon, 03/16/2020 - 9:42am
load management cybersecurity
unified energy system
territories
security of data
Scientific Computing Security
resilience
pubcrawl
Predictive Metrics
power system security
power generation economics
power engineering computing
Microgrids
Compositionality
Load management
IoT platform
Internet of Things
intelligent control system
intelligent control
intelligent consumers device
Energy Sector
Electricity supply industry
electric power industry digitalization
distributed power generation
digital technologies
biblio
Attacking IEC-60870-5-104 SCADA Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:29am
IEC 60870-5-104 protocol
SCADA Systems Security
Compositionality
Internet of Things devices
AlienVault's risk assessment
coloured Petri Net
electrical grid
European energy sector
IEC 60870 5 104
Petri nets
IEC-60870-5-104 SCADA systems
information and communications technology services
OSSIM
Power supplies
SCADA Security
SCADA threat model
SG
threat modelling
pubcrawl
security of data
Access Control
Internet of Things
Protocols
SCADA systems
supervisory control and data acquisition systems
Resiliency
Human behavior
cyberattack
risk management
smart power grids
Cyber Attacks
IEC standards
power engineering computing
power system security
Smart Grid
process control
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »