Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Substations
biblio
A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid
Submitted by aekwall on Mon, 01/11/2021 - 1:31pm
Parallel vision
power data
data modification
CBFM
cloud-blockchain fusion model
Fabric
image data
malicious eavesdropping
Meter reading
computer vision
parallel visual system
performance evaluations
secure manners
Secure storage
security guarantee
tamper-proof characteristics
data deletion
Substations
Scalability
Cryptography
power aware computing
Data models
pubcrawl
blockchain
privacy
smart power grids
Cloud Computing
Distributed databases
Smart Grid
power engineering computing
Smart Grids
blockchain technology
data visualisation
quality assurance
biblio
A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
power systems infrastructures
cyber physical security
cyber-attack
cyber-physical test bed
defense systems
domain based rules
electrical cyber physical systems
energy cyber-physical systems
IEC 61850 GOOSE messages
malicious change
modern power systems
neighboring devices
peer-to-peer communication
Critical Infrastructure Protection
Protection and Control
protection settings
Protective relaying
Protective Relays
relay coordination
relay coordination principles
securing protective relay settings
setting changes
setting rules
simulated cyber-attacks
CPS resilience
power system faults
collaboration
security
cyber-physical systems
pubcrawl
resilience
Resiliency
embedded systems
cyber security
power engineering computing
control layer
IEC standards
security of data
power system reliability
IEC 61850
substation automation
Substations
relay protection
Power system protection
circuit breakers
cyber physical systems
actual relays
Collaborative Defense
computing technologies
biblio
Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
domain-based cyber-physical security solutions
circuit breaker control
circuit breakers
Collaborative cyber defense models
cyber attack resilient distance protection
cyber intrusions
cyber–physical security test bed
digital substation
digital substations
distributed security domain layer
data injection attack
domain-based mitigation
hardware-in-the-loop simulation
protection devices
real-time digital simulator
real-time power system analysis
smart grid cybersecurity
substation cybersecurity
transient fault signature-based cross-correlation coefficient algorithm
command injection attacks
Metrics
pubcrawl
resilience
Resiliency
Integrated circuit modeling
power engineering computing
power system security
composability
power grids
power system control
security of data
Power Grid
substation automation
substation automation systems
Substations
hardware-in-the loop simulation
cyberattack
relay protection
Power system protection
biblio
A Hybrid Attack Model for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 9:59am
execution stage
Planning
markov chain
attack graph
attack propagation
bad data injection
bad data injection attack
Cyber-physical security assessment
Dynamic Defender model
Power Grid
execution stages
HAM
hybrid attack model
Markov Chain model
PLADD
preparation stage
Probabilistic Learning Attacker
Chained Attacks
smart power grids
Scalability
security
Data models
cyber-physical systems
learning (artificial intelligence)
Resiliency
pubcrawl
Mathematical model
security of data
Substations
power grids
power engineering computing
power system security
Games
Markov processes
electricity grid
biblio
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
computer centres
System recovery
supervisory control
Spire
sophisticated network-level attacks
simultaneous intrusions
SCADA system management
power grid infrastructure
network-attack-resilient intrusion-tolerant SCADA
nation-state-level attackers
data acquisition systems
control centers
network attack
data centers
intrusion tolerance
Power Grid
security of data
resilience
power system reliability
fault tolerant computing
power grids
Substations
network attacks
composability
pubcrawl
Resiliency
SCADA systems
SCADA
Protocols
distributed processing
Monitoring
computer network security
biblio
A Creditability-based Intrusion Tolerant Method for Protection Equipment in Transformer Substations
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
Protective relaying
creditability-based intrusion-tolerant algorithm
Cyber network attack
interconnected network environment
interconnection of all things(IoT)
Intrusion-tolerant
malfunction protection
mobile terminal devices
protection equipment
CIT algorithm
Protective Relays
relay protection
relays protection
security distribution network
sensing data analysis
transformer substations
intrusion tolerance
security of data
Abnormal data diagnose
open network environment
Integrated circuit modeling
Numerical models
sensors
power engineering computing
Substations
data analysis
smart phones
composability
pubcrawl
Resiliency
real-time systems
telecommunication security
Internet of Things
biblio
Graph-Based Event Classification in Grid Security Gateways
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
renewable distributed energy resource aggregators
Grid Security
grid security gateways
Grid Trust
network anomaly detection
network security
packet header behavioral analysis
power distribution control
power distribution control devices
encrypted communications
renewable energy sources
SG system
Substations
TCP-IP packet
TCPIP
time-series data
Trusted Communications
Control Theory
transport protocols
security
Protocols
power engineering computing
power system security
telecommunication security
probability
pubcrawl
encryption
Cryptography
Anomaly Detection
graph theory
power grids
Cyber-physical attacks
DERA
distributed power generation
electrical grid distribution network
biblio
Simulating the Efficiency of Thermoelectrical Generators for Sensor Nodes
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
Resiliency
Mathematical model
Metrics
power grids
power system security
precise monitoring
production site
pubcrawl
renewable energy sources
renewable sources
resilience
HVDC power transmission
sensor node
simulation
simulations
specific environment
Substations
Temperature sensors
thermoelectric conversion
thermoelectrical generator
wireless sensor networks
wireless sensor nodes
electrical vehicles
batteries
composability
computational fluid dynamics
computational fluid dynamics model converter
Conductivity
converter
converter station
course means
CPS modeling
Electric Vehicles
autarkic energy supply
electricity
energy harvesting
environmental factors
Europe
fossil fuels
Generators
green electrical power
Grid Security
high voltage direct current technology
HVDC power convertors
biblio
Cyber-Physical Emulation and Optimization of Worst-Case Cyber Attacks on the Power Grid
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
Remote Terminal Units
optimisation
power control
power control area
power engineering computing
power grid operations
power grids
power system control
power system security
power system simulation
pubcrawl
notional electric system
Resiliency
SCADA systems
SCADA/ICS controls
Scalability
security of data
substation controlling
Substations
worst-case cyber attacks
worst-case loss
cyber-physical emulation
cyber physical systems
bulk electric system
Compositionality
control engineering computing
CrashOverride
CrashOverride malware
CrashOverride malware attack
Cyber Dependencies
cyber experiments
cyber interdiction optimization
CPS resilience
cyber-physical systems
DC optimal power flow
DC power transmission
design of experiments
Human Factors
interdiction optimization
load control
Load flow
Metrics
biblio
Securing GOOSE: The Return of One-Time Pads
Submitted by grigby1 on Fri, 05/08/2020 - 2:21pm
smart grid security
Protocols
pubcrawl
real-time communications
resilience
Resiliency
Secure GOOSE
securing GOOSE
security recommendations
power engineering computing
Smart Grids
smart power grids
substation automation
substation automation systems
substation security
Substations
Synthetic aperture sonar
telecommunication security
IEC 62351
Cryptographic Protocols
Denial-of-Service
devices attacks
encryption
generic object-oriented substation event
GOOSE messages
hardware requirements
IEC 61850
composability
IEC standards
international standard
latency constraints
latency requirements
Metrics
object oriented security
One-Time Pads
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »