Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart power grids
biblio
Distributed Software Infrastructure for General Purpose Services in Smart Grid
Submitted by grigby1 on Mon, 11/13/2017 - 10:50am
open systems
web services
UK distribution network
smart power grids
Smart Grid
sensors
security
Resiliency
Reliability
pubcrawl
power system security
power engineering computing
power distribution reliability
pervasive computing
peer-to-peer distributed software infrastructure
Peer-to-peer computing
Aggregation
middleware security
middleware reliability
middleware
interoperability
heterogeneous technology
hardware-independent interoperability
general purpose services
event-driven middleware
event-based middleware
distribution network
distributed systems
Demand response (DR)
composability
communication technology attacks
collaboration
biblio
Security and privacy for smart grid using scalable key management
Submitted by grigby1 on Fri, 11/03/2017 - 10:31am
Public key
symmetric key technique
symmetric key scheme works
smart power grids
Smart Grids
Smart Grid
sensors
secure key management
Scalable Security
scalable key management
Scalability
replay attack
public key cryptography
authentication
pubcrawl
Protocols
power system security
power system management
Needham-Schroeder authentication protocol
Needham Schroder Authentication
man-in-the-middle attack
key management
Fault-Tolerance
fault tolerance
elliptic curve public key technique
Cryptographic Protocols
biblio
Contextual anomaly detection for cyber-physical security in Smart Grids based on an artificial neural network model
Submitted by grigby1 on Wed, 03/29/2017 - 11:33am
pubcrawl
neural network
Neural networks
neural networks security
photovoltaic rooftop power plant data
policy-based governance
power system security
power system stability
Production
neural nets
Resiliency
security of data
Smart Grid
Smart Grids
smart power grids
Voltage control
voltage distribution
Data models
artificial neural network model
Context
Context modeling
contextual anomaly detection method
cyber-physical security
cyber-physical systems
cyberphysical security
data analysis
Anomaly Detection
Density estimation robust algorithm
distributed energy resource behaviour
energy resources
intrusion detection system
low voltage distribution grid
malicious voltage control actions
Metrics
biblio
Data security in Smart Grid with hardware implementation against DoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
IP networks
SYNflooding
SYN flooding
smart resources
smart power grids
Smart Grid
Servers
secure Web server algorithm
pubcrawl170109
Protocols
power engineering computing
LPC1768 processor
ARM Processor
internet
Hardware Implementation
Floods
DoS attacks
DoS
denial of service attack
Data Security
Cybersecurity
Computers
computer network security
Computer crime
biblio
Neighborhood area network security in smart grid using security enhanced key updating
Submitted by grigby1 on Tue, 03/07/2017 - 12:33pm
simple one-way hash function based scheme
PCL
power system security
process analysis toolkit
protocol composition logic
Protocols
pubcrawl170109
SAE protocols
security attacks
security enhanced key updating
PAT
simultaneous authentication of equals protocols
Smart Grid
smart grid infrastructure
Smart Grids
smart power grids
telecommunication security
wireless mesh networks
WMNs
EMSA protocol
Communication networks
Computer crime
Cryptographic Protocols
cyber-attacks
denial of service attack
DoS attack
efficient mesh security association protocols
EMSA
authentication
EMSA protocols
IEEE 802.11s
key refreshment strategy
Logic gates
mesh key holder security handshake
MKHSH
NAN
neighborhood area network security
biblio
Privacy on hypothesis testing in smart grids
Submitted by grigby1 on Mon, 02/27/2017 - 11:56am
power system control
Yttrium
unauthorized binary hypothesis testing
testing
smart power grids
smart meters
smart meter
Smart Grids
pubcrawl170108
pubcrawl170107
privacy risk suppression
privacy information leakage
privacy
power system security
asymptotic exponential decay rate minimization
power control
optimal energy control strategy
optimal control
minimum type II error probability
error statistics
energy supply
energy storage device
Energy storage
energy source
energy provider
data privacy
consumer behaviour
biblio
A Game-Theoretical Model for Security Risk Management of Interdependent ICT and Electrical Infrastructures
Submitted by grigby1 on Mon, 02/27/2017 - 11:55am
operating systems (computers)
Substations
smart power grids
Smart Grid
Security Risk Management
security
SCADA Security
risk management
pubcrawl170108
pubcrawl170107
power system management
power system control
power grids
power engineering computing
Communication equipment
off-the-shelf vulnerable operating systems
noncooperative game theory
Non-cooperative Game Theory
Nash Equilibrium
Mathematical model
interdependent ICT
Games
game-theoretical model
game theory
electrical infrastructures
cyber-physical system
communication infrastructure
biblio
Robust, Secure, and Cost-Effective Design for Cyber-Physical Systems
Submitted by BrandonB on Wed, 05/06/2015 - 1:16pm
middleware
stability
smart power grids
Smart Grid
security vulnerability
Robustness
quality of service
power system security
Phasor measurement units
Monitoring
cost-effective architecture
Logic gates
Intelligent systems
cyberphysical systems
cyber-physical-social systems
cyber-physical systems
CPSS
CPS
cost-effective design
biblio
Efficient Authentication and Key Management Mechanisms for Smart Grid Communications
Submitted by BrandonB on Wed, 05/06/2015 - 12:35pm
Protocols
Synthetic aperture sonar
smart power grids
smart meter (SM)
smart grid communications
smart grid (SG)
Servers
security
secure remote password protocol
secure remote password (SRP)
public-private key pairs
public key infrastructure
public key cryptography
Public key
authentication
mutual authentication
management overhead
key management protocol
key management
key generator entity
initial password
identity-based cryptography
home networks
home area network
Enhanced identity-based cryptography (EIBC)
Cryptographic Protocols
authorisation
authentication server
biblio
Cyber attack impact on critical Smart Grid infrastructures
Submitted by BrandonB on Wed, 05/06/2015 - 9:41am
power distribution reliability
utility servers
Topology
smart power grids
smart meters
Smart Grids
smart grid deployment
Smart Grid
simulation
Servers
routers
Reliability
qualitative assessment
power system security
power engineering computing
advanced metering infrastructure
grid topology
electrical distribution networks
DoS-DDoS attacks
DoS
distribution system reliability
distributed denial-of-service attacks
DDoS
cyber attack impact
cyber attack
critical smart grid infrastructures
computer network security
Computer crime
AMI
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »