Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Attacker Modeling
biblio
Vulnerability analysis of power systems based on cyber-attack and defense models
Submitted by willirn1 on Thu, 05/30/2019 - 3:34pm
defender modeling
resilience
RTUs
Smart Grid
SCADA
Cascading Failures
blackouts
Monitoring
Power system protection
power system faults
power transmission lines
Load modeling
Substations
game theory
Attacker Modeling
game-theoretic approach
defense models
Vulnerability Analysis
cyber-attack
system operators
power systems
security of data
power system security
Vanderbilt
power engineering computing
biblio
Vulnerability analysis of power systems based on cyber-attack and defense models
Submitted by grigby1 on Mon, 01/21/2019 - 11:39am
Power system protection
Vulnerability Analysis
system operators
Substations
Smart Grid
security of data
Scalability
SCADA
RTUs
Resiliency
resilience
pubcrawl
power transmission lines
power systems
power system security
Adversary Models
power system faults
power engineering computing
Monitoring
Metrics
Load modeling
Human behavior
game-theoretic approach
game theory
defense models
defender modeling
cyber-attack
Cascading Failures
blackouts
Attacker Modeling
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Wed, 05/06/2015 - 8:58am
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness
biblio
Model-based control of device replication for trusted data collection
Submitted by BrandonB on Thu, 04/30/2015 - 1:06pm
Hierarchical Control
voting protocol mechanisms
trusted data collection
Trusted Computing
Situational Assessment
Sensor Replication
security of data
security attack
quality of service
QoS
Protocols
malicious devices
Adaptive Fault-tolerance
Frequency modulation
device replication autonomic management
delays
data corruptions
Data collection
black-box
batteries
bandwidth attack
Bandwidth
Attacker Modeling
algorithm correctness