Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart power grids
biblio
Detection of Integrity Attacks to Smart Grids Using Process Mining and Time-Evolving Graphs
Submitted by grigby1 on Fri, 02/08/2019 - 3:29pm
integrity attack
attack graphs
work-in-progress approach
time-evolving graphs
time evolving graphs
smart power grids
smart meters
Smart Grids
process mining
Meters
Ireland Commission for Energy Regulation
integrity attacks
resilience
Frequency measurement
power system security
power engineering computing
Data mining
Anomaly Detection
graph theory
composability
Resiliency
Metrics
pubcrawl
biblio
Kalman Filter with Diffusion Strategies for Detecting Power Grid False Data Injection Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 11:33am
security of data
power grid states estimation
power grid states measurement
power system measurement
power system security
power system state estimation
pubcrawl
resilience
Resiliency
power grid false data injection attacks
sensor networks
sensor readings
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
state estimation models
electronic power grid
Computer crime
control system signals
Detectors
diffusion Kalman filter
diffusion strategies
distributed estimation models
distributed Kalman filtering
distributed network
Compositionality
estimation
estimation theory
Human behavior
Human Factors
Kalman filters
Meters
power engineering computing
biblio
Hierarchical Trust-Based Black-Hole Detection in WSN-Based Smart Grid Monitoring
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
Power Grid
WSN-based smart grid monitoring
wireless sensor networks
weighted clustering
telecommunication security
smart power grids
Smart Grid Sensors
smart grid monitoring
Resiliency
resilience
pubcrawl
Ad hoc networks
packets dropped ratio
Human Factors
Human behavior
hierarchical trust-based black-hole detection
hierarchical trust evaluation
data aggregation
Compositionality
cluster head
black-hole attack
biblio
Information-Theoretic Attacks in the Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
Mutual information
utility function
state variables
state estimation
smart power grids
Smart Grids
Smart Grid Sensors
Smart Grid
sensors
security
second order statistics
Resiliency
resilience
pubcrawl
probability
power system security
attack detection probability
kullback-leibler divergence
KL divergence
information-theoretic attacks
information theory
IEEE 30-Bus test system
Human Factors
Human behavior
higher order statistics
Gaussian random attacks
gaussian distribution
covariance matrix
Covariance matrices
Compositionality
Bayes methods
biblio
Evaluating Wireless Network Vulnerabilities and Attack Paths in Smart Grid Comprehensive Analysis and Implementation
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
resilience
wireless network vulnerabilities
wireless LAN
wireless
Wi-Fi network
Vulnerability
transitions probabilities
telecommunication security
smart power grids
Smart Grid Sensors
smart grid comprehensive analysis
Smart Grid
security of data
security levels
Resiliency
Compositionality
pubcrawl
probability density
probability
power system security
network attacks
network administrators
Markov processes
Markov Chain model
markov chain
Human Factors
Human behavior
CVE
computer network security
biblio
Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure
Submitted by grigby1 on Mon, 11/19/2018 - 11:32am
smart grid advanced metering infrastructure
power data
pubcrawl
public key cryptography
public key infrastructure
public-keys
resilience
Resiliency
Servers
Smart Grid
peer-to-peer networks
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
telecommunication network management
telecommunication security
trees (mathematics)
wireless mesh networks
wireless multihop networks
Human behavior
Advanced Metering Infrastructure AMI
AMI networks
certificate revocation list
certification
Communication Network
Compositionality
distributed CRL management model
distributed hash table
distributed hash trees
advanced metering infrastructure
Human Factors
IEEE 802.11s mesh standard
key management
Logic gates
Measurement
metering
Meters
P2P networks
Peer-to-peer computing
biblio
Research on the Node Information Security of WSN Based on Multi-Party Data Fusion Algorithm
Submitted by grigby1 on Mon, 11/19/2018 - 11:31am
Routing
WSN
wireless sensor networks
Wireless Sensor Network
Wireless communication
urban power industry
telecommunication security
telecommunication network topology
telecommunication network reliability
smart power grids
smart power grid
Smart Grids
Smart Grid Sensors
sensor fusion
routing security
Routing protocols
Big Data
Resiliency
resilience
pubcrawl
power system security
power system reliability
plane routing protocol
node information security
network topology
multiparty data fusion algorithm
Human Factors
Human behavior
data fusion technology
Compositionality
clustering routing protocol
cluster routing protocol
biblio
A Low Power Cybersecurity Mechanism for WSNs in a Smart Grid Environment
Submitted by grigby1 on Mon, 11/19/2018 - 11:31am
smart grid environment
phasor measurement
Phasor measurement units
power consumption
power system security
pubcrawl
Receivers
resilience
Resiliency
security of data
sensor devices
smart grid cybersecurity
North American Electric Reliability Corporation
smart grid monitoring application
Smart Grid Sensors
Smart Grids
smart power grids
Substations
Throughput
wireless sensor networks
WSN cybersecurity mechanism
WSN security mechanisms
WSNs
Denial-of-Sleep Attack
CIP-002 standards
CIP-009 standards
communication functionalities
Compositionality
computer security
critical infrastructure protection standards
critical power grid infrastructure
Cybersecurity
cybersecurity requirements
delay
CIP
Distributed Sensing
Human behavior
Human Factors
low power consumption
low power cybersecurity mechanism
MAC layer
Monitoring
NERC
NERC CIP requirements
NERC CIP standards
biblio
Toward a Sensor Trustworthiness Measure for Grid-Connected IoT-Enabled Smart Cities
Submitted by grigby1 on Mon, 11/19/2018 - 11:31am
situational awareness
pubcrawl
resilience
Resiliency
security
Security Metrics
security of data
sensor trustworthiness measure
sensor verification
power systems
smart cities
Smart Grid Sensors
Smart Grids
smart power grids
Trusted Computing
trustworthy power generation
wireless sensor networks
Human behavior
bulk power systems
Compositionality
critical infrastructures
cyber physical systems
cyber-physical modeling
cyber-physical systems
grid-connected IoT-enabled smart cities
Hardware
Analytical models
Human Factors
Internet of Things
large-scale critical infrastructure systems security
malevolent IoT devices
Perturbation methods
power engineering computing
power system security
biblio
Domain-Specific Requirements Elicitation for Socio- Technical System-of-Systems
Submitted by Katie Dey on Sun, 09/30/2018 - 10:32am
domain specific characteristics
RAM
EAM
Requirements
interoperability
system of systems
e-Navigation
energy domain
MAF
SGAM
interoperability perspectives
architecture management approaches
critical infrastructures
domain-specific aspects
standardized elicitation
system architectures
system-of-system engineering efforts
maritime domain
complex infrastructures
socio- technical system-of-systems
domain-specific requirements elicitation
smart power grids
power engineering computing
open systems
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »