Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
SCADA systems
biblio
Research and Construction of Dynamic Awareness Security Protection Model Based on Security Policy
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
authentication
collaboration
data acquisition
dynamic awareness
Electric power SCADA
Monitoring
network dynamics
policy-based governance
power systems
pubcrawl
Safety
SCADA systems
SCADA Systems Security
security
Security Policies Analysis
security policy
biblio
Autonomic computing meets SCADA security
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
architecture
Autonomic computing
Autonomic Security
computer architecture
computer security
critical infrastructures
Cyber Attacks
Handheld computers
machine learning
Metrics
pubcrawl
Resiliency
SCADA Security
SCADA systems
Scalability
Transportation
biblio
Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)
Submitted by grigby1 on Mon, 11/20/2017 - 12:28pm
internet
Voltage measurement
Voltage Characteristics
Tamper-Resistance
Tamper resistance
SCADA systems
SCADA
Resiliency
resilience
pubcrawl
Power measurement
lightweight current-based intrusion detection
lightweight current-based IDS
knowledge-based detection
Intrusion Detection
batteries
integrated circuits
Industrial Control Systems
industrial control
IDS
ICs
false alarm rate
Dr. WATTson
Data Breach
Current measurement
Current Drain Intrusion Detection
computer network security
composability
CBID
behavior-based detection
biblio
"Security information sharing for the polish power system"
Submitted by abfox on Tue, 02/14/2017 - 2:24pm
multi-agent systems
Substations
substation
Stakeholders
security of data
SCADA systems
SCADA system
pubcrawl170101
power system security
power generation
power engineering computing
Polish power system
multiagent architecture
anonymity
information sharing security
information sharing
information security
information management
information exchange
information and communication technology
Electric Grid
distributed control system
distributed control
cybersecurity technology
cyberattack
Computer crime
biblio
"Initial investigation of Industrial Control System (ICS) security using Artificial Immune System (AIS)"
Submitted by abfox on Tue, 02/14/2017 - 12:32pm
industrial control system
Zero-day attacks
targeted attacks
supervisory control and data acquisition
standards
security systems
SCADA systems
SCADA
pubcrawl170101
production engineering computing
process control
Microorganisms
IT systems
Intrusion Detection
information yechnology systems
industrial processes control
advanced persistent threat
industrial control
Immune system
ICS security
distributed control systems
distributed control
DCS
control systems
control engineering computing
Computer crime
artificial immune systems
artificial immune system
APT
AIS
advanced persistent threats
biblio
An abrupt change detection heuristic with applications to cyber data attacks on power systems
Submitted by BrandonB on Wed, 05/06/2015 - 1:57pm
abrupt change detection heuristic
bounded state variations
cyber data attacks
Fault detection/accomodation
History
history matrix
Monitoring
Noise level
Power system dynamics
power systems
SCADA systems
singular value decomposition
Time measurement
Vectors
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
SCADA communication protocols over TCP/IP
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
NTRU public key algorithm
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
end-to-end security
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
AGA-12
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
biblio
A Framework for Wide-Area Monitoring and Control Systems Interoperability and Cybersecurity Analysis
Submitted by BrandonB on Tue, 05/05/2015 - 12:37pm
nonfunctional quality
wide-area monitoring and control systems (WAMCS)
wide area monitoring and control systems interoperability
WAMC ICT architecture
Unified modeling language
SCADA systems
real time situational awareness
Protocols
power systems
power system security
power system measurement
power system management
open systems
Analytical models
next generation operational management system
Network interfaces
interoperability
information and communication technology
enterprise architecture method
enterprise architecture analysis
Electric Power System
Decision Making
cybersecurity analysis
Cybersecurity
computer security
Communication Systems
biblio
High performance computation tools for real-time security assessment
Submitted by BrandonB on Tue, 05/05/2015 - 12:10pm
hybrid simulation-measurement-based tools
U.S. Department of Energy grant
SuperLU_MT library
SCADA systems
SCADA
predictor-corrector methods
power transmission control
power system transient stability
power system security
power system
power engineering computing
phasor measurement
operation security risk
MPI-based parallelization
integration
Adams-Bashforth-Moulton predictor-corrector method
hybrid measurement-based-simulation-based security-assessment tool
extended transient midterm simulation program
ETMSP performance
EPRI
dynamic simulation software
Decision Making
DE-OE0000628
data visualisation
CPU time
contingency analysis
computing machine
computer software
computation tools
biblio
Synchrophasor Data Baselining and Mining for Online Monitoring of Dynamic Security Limits
Submitted by BrandonB on Tue, 05/05/2015 - 12:09pm
security monitoring
power system reliability
power system security
power system stability
power transfer measurement
random forest (RF)
SBSA
SCADA measurements
SCADA systems
seasonal security margins
security
power engineering computing
Stability criteria
synchrophasor
synchrophasor data baselining
synchrophasor-based situational awareness
system interfaces
system reliability
system stress
system visibility
Table lookup
network backbone buses
Baselining
clustering
critical interfaces
Data mining
dynamic security assessment (DSA)
dynamic security limits
look-up tables
medoid clustering
Monitoring
angle shifts
nomograms
online monitoring
PAM clustering
partitioning around medoids (PAM)
pattern clustering
phase-angle differences
phasor measurement
phasor measurement unit (PMU)
Phasor measurement units
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »