Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart power grids
biblio
MILP Modeling of Targeted False Load Data Injection Cyberattacks to Overflow Transmission Lines in Smart Grids
Submitted by grigby1 on Wed, 10/14/2020 - 11:39am
optimal power flow constraints
Transmission line measurements
False Data Detection
power system state estimation
attack model
bad data detection constraints
bi-level mixed integer linear programming optimization model
IEEE 118-bus power system
MILP modeling
Mixed Integer Linear Programming (MILP)
cyber physical systems
optimal power flow problem
optimized false data injections
overflow transmission lines
targeted false load data injection cyberattacks
targeted load buses
targeted transmission line
Transmission Line Congestion
upper level optimization problem
composability
security
pubcrawl
Human behavior
resilience
Resiliency
Data models
power system security
smart power grids
security of data
Load modeling
Smart Grids
optimisation
power transmission lines
Load flow
power system simulation
cyberattack
False Data Injection
biblio
Local Outlier Factor Based False Data Detection in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 11:39am
Smart Grids
local outlier factor
false data attack
electric power delivery
dummy data attack
density-clustering based LOF algorithm
density clustering
cyber attackers
False Data Detection
cyber physical systems
pattern clustering
security of data
power systems
power grids
composability
smart power grids
power engineering computing
Resiliency
resilience
Human behavior
pubcrawl
Anomaly Detection
biblio
Data-driven Physics-based Solution for False Data Injection Diagnosis in Smart Grids
Submitted by grigby1 on Wed, 10/14/2020 - 11:39am
intelligent FDI attack
False Data Detection
power system state estimation
bad data detection strategy
chi-squared test
data-driven machine intelligence
data-driven physics-based solution
false data injection diagnosis
gross error analysis
cyber physical systems
machine intelligence
physics based state estimation process
physics-based method
Reed-Xaoli
SG technology
statistical tests
undetected bad data
smart power grids
Anomaly Detection
Artificial Intelligence
pubcrawl
Human behavior
resilience
Resiliency
power engineering computing
power system security
security of data
composability
power system faults
Power Grid
cyber-attacks
Smart Grids
statistical testing
False Data Injection
biblio
An Accurate False Data Detection in Smart Grid Based on Residual Recurrent Neural Network and Adaptive threshold
Submitted by grigby1 on Wed, 10/14/2020 - 11:39am
false data injection attack
cyber physical systems
Transmission line measurements
False Data Detection
power system state estimation
accurate false data detection
Adaptive detection threshold
adaptive judgment threshold
adaptive threshold
Recurrent neural networks
FDIA detection method
linear prediction model
malicious attack
R2N2 model
Residual recurrent neural network
residual recurrent neural network prediction model
Weibull distribution
state estimation
security of data
Predictive models
pubcrawl
Human behavior
resilience
Resiliency
Mathematical model
Data models
Adaptation models
recurrent neural nets
power engineering computing
power system security
Smart Grid
smart power grids
composability
cyber-attacks
biblio
Enhancing Smart Grid Cyber-Security Using A Fuzzy Adaptive Autonomy Expert System
Submitted by aekwall on Mon, 10/12/2020 - 10:36am
power system security
Human automation interaction
Human behavior
human computer interaction
information technology
leave-one-out cross-validation
level of automation
performance shaping factors
power engineering computing
gradient methods
pubcrawl
Resiliency
Scalability
security of data
smart grid cybersecurity
Smart Grids
smart power grids
expert systems
Adaptive Autonomy
adaptive systems
automation
Complexity theory
Computer crime
cyber security
environmental conditions
expert system database
False Data Detection
Expert Systems and Security
fuzzy adaptive autonomy expert system
fuzzy expert system
fuzzy rule
fuzzy set theory
fuzzy systems
gradient descent algorithm
biblio
Evaluating Resilience of Grid Load Predictions under Stealthy Adversarial Attacks
Submitted by aekwall on Mon, 10/05/2020 - 10:47am
iterative attack method
adversarial perturbation
DeepForge
distributed sensor fusion
distributed smart meters
domain-specific deep-learning
Dynamic Pricing
grid maintenance
GridLAB-D
inference predictors
power distribution planning
load forecasting
load forecasting systems
model-based design
power distribution network
resilience evaluation
smart grid load prediction systems
synthetic norm-bounded modifications
testbed
CPS resilience
smart power grids
Data Security
cyber-physical systems
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Iterative methods
optimization problem
optimisation
security of data
cyber physical systems
adversarial attacks
power engineering computing
power distribution control
sensor fusion
information processing
power systems
smart meters
distributed sensors
biblio
Permissioned Blockchains and Virtual Nodes for Reinforcing Trust Between Aggregators and Prosumers in Energy Demand Response Scenarios
Submitted by aekwall on Mon, 09/28/2020 - 11:17am
grid stability
renewable energy sources
end-to-end security
cyber physical systems
active consumer participation
auditable DR framework
DERs
design innovative DR schemes
DR services
DR signals
energy demand response scenarios
energy stakeholders
energy supply
energy waste
open systems
legacy energy systems
Load management
modern smart grid technologies
modern smart grids
reliable DR framework
RES
scale deployment
smart contract-based DR framework
software stakeholders
tamper-resistant DR framework
virtual node
virtual nodes
CPS Privacy
Permissioned Blockchains
Internet of Things
IoT devices
security
Human behavior
pubcrawl
blockchain
privacy
smart power grids
Stakeholders
smart contracts
power engineering computing
Smart Grids
power grids
data privacy
distributed power generation
energy management systems
power system stability
smart meters
Human Factors
demand side management
demand response
Fog computing
energy system
contracts
blockchains
interoperability
biblio
Analysis of Cyber-Physical Security in Electric Smart Grid : Survey and challenges
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
cyber-physical system
power engineering computing
Smart Grids
Human Factors
attack motivation
CPS
Meters
security model
ICT
Smart Grid
communication system
defence
electric smart grid
information and communication technology
privacy issue
security concern
CPS Privacy
Monitoring
cyber physical systems
smart power grids
privacy
cyber-physical security
Reliability
Vulnerability
pubcrawl
Human behavior
cyber-physical systems
SCADA systems
SCADA
security
privacy concerns
data privacy
architecture
biblio
Towards a Model-centric Approach for Developing Dependable Smart Grid Applications
Submitted by aekwall on Mon, 09/28/2020 - 10:34am
Code Generation
Smart Grids criticality
SGAM
model-driven engineering
Model-Driven Architecture approach
Model-Centric Software Development solution
Model-Centric Software Development
Model-centric approach
DSSE
Domain Specific Systems Engineering
dependable Smart Grid applications
dependability
critical System-of-Systems
complex System-of-Systems
Resiliency
central quality attribute
complex systems
Formal Specification
Smart Grid
power engineering computing
Software Architecture
Automated Secure Software Engineering
Traceability
systems engineering
smart power grids
composability
pubcrawl
biblio
A Methodology for Detecting Stealthy Transformer Tap Command Injection Attacks in Smart Grids
Submitted by grigby1 on Fri, 09/18/2020 - 1:07pm
on load tap changers
IEEE 118-bus system
Smart Grids
Voltage control
branch currents
control signals-commands
False Data Injection
false tap command injection
malicious tap change command
Voltage measurement
on-load tap changing transformers
power system SCADA networks
SCADA channels
state variables
stealthy transformer tap command injection attacks detection
voltage regulation device
command injection attacks
pubcrawl
state estimation
Power measurement
Reactive power
power generation control
Metrics
telecommunication channels
energy management
composability
smart power grids
power system security
SCADA systems
Indexes
computer network security
Resiliency
resilience
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »