Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Power measurement
biblio
A Methodology for Detecting Stealthy Transformer Tap Command Injection Attacks in Smart Grids
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
on load tap changers
IEEE 118-bus system
Smart Grids
Voltage control
branch currents
control signals-commands
False Data Injection
false tap command injection
malicious tap change command
Voltage measurement
on-load tap changing transformers
power system SCADA networks
SCADA channels
state variables
stealthy transformer tap command injection attacks detection
voltage regulation device
command injection attacks
pubcrawl
state estimation
Power measurement
Reactive power
power generation control
Metrics
telecommunication channels
energy management
composability
smart power grids
power system security
SCADA systems
Indexes
computer network security
Resiliency
resilience
biblio
Multi-Attacking Strategy on Smart Grid with Incomplete Network Information
Submitted by grigby1 on Fri, 08/28/2020 - 12:03pm
Power measurement
Voltage measurement
telecommunication networks
state estimation
smart power grids
Smart Grid
security of data
Scalability
Resiliency
resilience
pubcrawl
power system stability
power system operator
power system
attack vector
power engineering computing
Phasor measurement units
network information technology
multiattacking strategy
Multi-Attack
Load flow
injected false data attack
IEEE 14 bus system
Human behavior
cyber-attacks
Communication networks
Attack vectors
biblio
Detection of False Data Injection Attacks in Cyber-Physical Systems using Dynamic Invariants
Submitted by aekwall on Mon, 08/03/2020 - 10:29am
Power system dynamics
Kalman filters
learning (artificial intelligence)
Meters
Metrics
National security
power engineering computing
Power measurement
power system
Kalman filter
power system security
pubcrawl
Resiliency
robust estimation
Scalability
security of data
state estimation
traditional anomaly detection approaches
data-driven temporal causal relationships
adaptive filtering
adaptive robust thresholding
Anomaly Detection
bad data detection
Bayesian filtering
complex cyber-physical systems
cyber-physical systems
data-driven functional relationships
False Data Detection
dynamic invariant network
false data injection attack detection
false data injection attacks
G-KART
Granger causality based Kalman filter
graph theory
invariant graph
Jacobian matrices
biblio
Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
message authentication
Training data
Tamper resistance
side-channel information
Side-channel attack
security of IoT
Scalability
pubcrawl
Power measurement
Power demand
power consumption
power aware computing
Physical Unclonable Function
modeling attack
Metrics
authentication
lightweight PUF
lightweight physical unclonable function
Internet of Things
internet
Integrated circuit modeling
Industrial Internet of Things
Human Factors
Human behavior
Hardware Security
field programmable gate arrays
external Internet
Cryptography
countermeasure method
biblio
An Investigation on Detecting Bad Data Injection Attack in Smart Grid
Submitted by aekwall on Mon, 02/17/2020 - 2:17pm
Power system dynamics
Voltage measurement
partitioning of power systems
MATPOWER program
faulty nodes
chi-square test
bad data injection attack detection
bad data injection
APSE
adaptive partitioning state estimation method
Power measurement
Sensitivity
state estimation
power system state estimation
security
power grids
power system security
Smart Grids
power engineering computing
Smart Grid
smart grid security
smart power grids
Metrics
privacy
pubcrawl
Resiliency
Scalability
security of data
biblio
Secure Integration of Electric Vehicles with the Power Grid
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
power data
cyber-physical
cyber-physical anomaly detection Engine
detects anomalies
distribution networks
EV
monitoring cyber messages
monitors system behavior
pluggable electric vehicles
critical power grid component
power grid system
Power measurement
power measurements
V2G cyber network
Vehicle-to-grid
vehicle-to-grid system
worst case inspection time
Smart Grid Sensors
Inspection
Monitoring
security
Resiliency
pubcrawl
Protocols
Anomaly Detection
distributed energy resources
power system security
Intrusion Detection
distributed power generation
secure integration
Engines
Human Factors
Compositionality
Electric Vehicles
aggregator
battery powered vehicles
biblio
Neural Network Model for False Data Detection in Power System State Estimation
Submitted by grigby1 on Mon, 12/30/2019 - 2:21pm
Power systems state estimation
perceptron model
perceptron models
perceptrons
power engineering computing
Power measurement
power system measurement
Power system measurements
power system state estimation
outlier detection scheme
principal component analysis
pubcrawl
resilience
Resiliency
trained network
Training
training sets
Voltage measurement
feature extraction
13-bus IEEE test system
Artificial Neural Networks
composability
correlated data sets
cyber physical systems
Data models
data preprocessing technique
False Data Injection
False Data Detection
historical data
Human behavior
Linear programming
Measurement false data
Multi-layer perceptron
neural network model
Noise measurement
biblio
Reserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
safe operation
power grids
Power measurement
power system security
power system stability
pubcrawl
resilience
Resiliency
risk analysis
risk analysis results
power grid vulnerability analysis
security of data
simulation penetration test environment
stable operation
subsequent attack test
subsequent KMCEPG-related attack penetration
terminal critical control devices
terminal key control equipment
test process
vulnerability mining
cyber security risks
Attack process construction
attack process construction technology
Attack test case
attack test cases
attack test results
composability
Computer crime
Control equipment
cyber attack
attack flow construction technology
Grid cyber attack
Grid key control equipment
Grid key measurement equipment
key measurement
Loss measurement
Metrics
operating systems
Power Grid
biblio
Smart Grid Security Evaluation with a Big Data Use Case
Submitted by grigby1 on Fri, 03/22/2019 - 12:59pm
pubcrawl
smart power grids
Smart Grids
smart grid systems
smart grid security evaluation
Smart Grid
security of data
security
Scalability
Resiliency
resilience
Attack detection
power system
Power measurement
power engineering computing
Metrics
Energy Sector
Decision trees
Big Data techniques
big data security
Big Data
biblio
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
integrity checking program generation
composability
pubcrawl
Human behavior
Resiliency
timing information
Raspberry Pi
POWERALERT
Power measurement
power aware computing
power attestation
network round-trip time
Nash equilibrium strategy
Kernel
attestation
integrity checking
game-theoretic strategy
game theory
Frequency measurement
Current measurement
code segment
checking code
attestation systems
Adaptation models
Protocols
security
data integrity
« first
‹ previous
1
2
3
4
5
6
next ›
last »