Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Power system protection
biblio
Cascading Failure Initially from Power Grid in Interdependent Networks
Submitted by grigby1 on Thu, 05/24/2018 - 12:29pm
Metrics
smart power grids
Robustness
Resiliency
resilience
pubcrawl
power system reliability
Power system protection
power system faults
power system
power grids
power grid vulnerability analysis
power grid system
Power Grid
power engineering computing
Nickel
blackouts
Mathematical model
intranetwork
interdependent networks
inter-network
giant component
Fragmentation
failure analysis
degree distribution
coupling networks
Compositionality
composability
complex networks
Communication networks
Communication Network
cascading failure
biblio
Dynamic state estimation assisted posturing for generator out-of-step protection
Submitted by el_wehby on Mon, 05/14/2018 - 2:23pm
protective relay
Phasor measurement units
PMU-assisted particle filter
power swing
power system
Power system dynamics
Power system protection
power system state estimation
protection function improvement
phasor measurement unit assisted particle filter
relay protection
Relays
Rotors
step-up transformer voltage-side voltage phase angle
synchronous generator
synchronous generators
synchrophasor
transformer protection
machine protection
DSE-enabled algorithm
Dynamic state estimation
dynamic state estimation assisted posturing
electromechanical state estimation
generator out-of-step protection
Generators
hidden failure
Impedance
10-machine 39 bus test system
Monitoring
numerical simulation
OOS event
out-of-step
particle filtering (numerical methods)
phasor measurement
Phasor Measurement Unit
1549831
biblio
Heuristics-based approach for identifying critical N \#x2014; k contingencies in power systems
Submitted by K_Hooper on Wed, 05/09/2018 - 11:03am
Power system protection
system operators
system failure
standards
standard IEEE-14 bus system
Security Heuristics
Scalability
Resiliency
Resilience.
reliable operation
pubcrawl
Prediction algorithms
power system transient stability
power system stability
power system security
power system reliability
Algorithm design and analysis
power system identification
power system faults
possible critical N - k contingencies
N—k contingency analysis
multiple critical N-k contingencies
mitigation strategies
IEEE-57 bus system
IEEE-39 bus system
Heuristic algorithms
electrical power systems
dangerous contingency
critical contingencies
Cascading Failures
blackouts
biblio
An Attack Intention Recognition Method Based on Evaluation Index System of Electric Power Information System
Submitted by grigby1 on Mon, 04/02/2018 - 12:53pm
pubcrawl
node attack
parallel computing
Ports (Computers)
power engineering computing
power information network system
Power system protection
power system security
pre-order attack path
probability
protection requirements
Protocols
network intrusion detection system
resilience
Resiliency
security
security evaluation index system
security of data
security protection configuration
telecommunication security
tools
vulnerability exploit
vulnerability information
attacker ability
attack confidence
attack evidence
attack graph
attack graphs
attack intent
attack intention recognition method
attack probability value
attack proficiency
attack sub-graphs
attack targets
actual power system network security operation
attacker knowledge
attacker willingness
composability
current security technologies
diverse network protocols
electric power information system
graph theory
Indexes
Metrics
network attack graph
biblio
A microgrid ontology for the analysis of cyber-physical security
Submitted by K_Hooper on Wed, 02/14/2018 - 12:00pm
cyber-physical systems
IEC 61850-7-420 DER extension
IEC 61850
Human behavior
fault state
Energy storage
electrical system
electrical substation automation
distributed power generation
distributed generation
distributed energy resource
DER unit controllers
DER-associated devices
IEC 61850 protocol suite
cyber-physical security evaluation
cyber-physical security
control loop
controllable loads
control directives
common information model
common data classes
capacity limits
asset-specific attributes
artificial intelligence security
ADVISE framework
pubcrawl
threat model
substation design
substation configuration
substation automation
ADversary View Security Evaluation framework
state-of-charge
adversary objectives
61850-7-420 DER object classes
Scalability
Resiliency
rated capacity
ramp rate
utility grid
power system security
Power system protection
power system applications
power engineering computing
ontologies (artificial intelligence)
object models
Microgrids
microgrid ontology
Metrics
message classes
IEC standards
biblio
Risk assessment of cascading failures in power grid based on complex network theory
Submitted by grigby1 on Mon, 11/27/2017 - 12:24pm
power grid vulnerability analysis
Vulnerability
transmission line theory
transmission line coefficient
risk management
risk assessment
Resiliency
pubcrawl
power transmission reliability
power transmission lines
power transmission grid
Power system protection
power system faults
power grids
cascading failure
Power Grid
Metrics
Load flow
high probability events
failure analysis
critical events
composability
complex networks
Complex network theory(CNT)
complex network theory
changeable outage probability
cascading failure analysis
biblio
Identifying interdependencies using attack graph generation methods
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
risk management
Interdependency
Internet of Things
interoperability
power system faults
Power system protection
pubcrawl170107
pubcrawl170108
risk assessment methods
interdependencies modelling
Safety-Critical Systems
security
Security Metrics
security of data
system complexity
vulnerabilities identification
Wireless communications
distributed schema
attack graphs
Cascading Failures
collaboration
Collaborative Infrastructures
communication assets
complex interconnected networks
Complexity theory
critical infrastructures
attack graph generation methods
e-health
generation complexity
graph theory
heterogeneous collaborative infrastructures
industrial manufacturing automation
information and communication technologies
interdependencies identification
biblio
Defending mechanisms for protecting power systems against intelligent attacks
Submitted by grigby1 on Mon, 02/27/2017 - 12:55pm
defending mechanisms
game theory
Games
generalized game models
intelligent attacks
Load modeling
Nash Equilibrium
Numerical models
Power system protection
power system security
power systems
pubcrawl170107
pubcrawl170108
risk assessment
zero-sum game model
biblio
Optimal placement of Phasor Measurement Units in power grids using Memetic Algorithms
Submitted by BrandonB on Tue, 05/05/2015 - 12:32pm
Power Grid
wide area monitoring
synchronized measurement technology
Statistics
Sociology
smart power grids
Smart Grid
situational awareness
power system security
power system reliability
Power system protection
power system control
power network systems protection
power network systems control
power grids
distribution networks
power buses
Phasor measurement units
phasor measurement
Optimal PMU Placement
OPP problem
Observability
Memetics
memetic algorithms
Memetic Algorithm
IEEE benchmark power networks
Idaho region power network
hill-climbing method
genetic algorithms
biblio
Defining the framework for wireless-AMI security in smart grid
Submitted by BrandonB on Fri, 05/01/2015 - 9:50am
public key cryptography
Zigbee
WMN(Wireless Mesh Network)
wireless mesh Zigbee network topology
wireless mesh networks
Wireless communication
wireless AMI security
smart power grids
smart meters
Smart Grids
smart grid advanced metering infrastructure
security
public key infrastructure
AMI (Advanced Metering Infrastructure)
Power system protection
power engineering computing
PKI based digital certificate authentication
PKI
metering
intrusion detection system
Intrusion Detection
internal security attack
external security attack
computer network security
authentication
« first
‹ previous
1
2
3
4
5
6
next ›
last »