Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart meters
biblio
Detection of Integrity Attacks to Smart Grids Using Process Mining and Time-Evolving Graphs
Submitted by grigby1 on Fri, 02/08/2019 - 4:29pm
integrity attack
attack graphs
work-in-progress approach
time-evolving graphs
time evolving graphs
smart power grids
smart meters
Smart Grids
process mining
Meters
Ireland Commission for Energy Regulation
integrity attacks
resilience
Frequency measurement
power system security
power engineering computing
Data mining
Anomaly Detection
graph theory
composability
Resiliency
Metrics
pubcrawl
biblio
Kalman Filter with Diffusion Strategies for Detecting Power Grid False Data Injection Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 12:33pm
security of data
power grid states estimation
power grid states measurement
power system measurement
power system security
power system state estimation
pubcrawl
resilience
Resiliency
power grid false data injection attacks
sensor networks
sensor readings
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
state estimation models
electronic power grid
Computer crime
control system signals
Detectors
diffusion Kalman filter
diffusion strategies
distributed estimation models
distributed Kalman filtering
distributed network
Compositionality
estimation
estimation theory
Human behavior
Human Factors
Kalman filters
Meters
power engineering computing
biblio
Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
smart grid advanced metering infrastructure
power data
pubcrawl
public key cryptography
public key infrastructure
public-keys
resilience
Resiliency
Servers
Smart Grid
peer-to-peer networks
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
telecommunication network management
telecommunication security
trees (mathematics)
wireless mesh networks
wireless multihop networks
Human behavior
Advanced Metering Infrastructure AMI
AMI networks
certificate revocation list
certification
Communication Network
Compositionality
distributed CRL management model
distributed hash table
distributed hash trees
advanced metering infrastructure
Human Factors
IEEE 802.11s mesh standard
key management
Logic gates
Measurement
metering
Meters
P2P networks
Peer-to-peer computing
biblio
An Efficient NSKDP Authentication Method to Secure Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 4:09pm
privacy
Vulnerability
symmetric key distribution method
smart power grids
smart meters
Smart Grids
smart grid power
smart grid consumer privacy
Smart Grid
smart electric meters
Servers
secure smart grid
pubcrawl
private key cryptography
Communication networks
power system security
NSKDP authentication method
Meters
key management
Human Factors
Hash functions
encryption
cyber security
cryptography strategies
Cryptographic Protocols
countermeasures attacks
consumer energy supply
biblio
Design of an Authentication and Key Management System for a Smart Meter Gateway in AMI
Submitted by grigby1 on Wed, 05/30/2018 - 4:09pm
privacy
two-phase authentication mechanism
SMGW
smart meters
smart meter gateway
smart meter
smart grid consumer privacy
Smart Grid
smart appliance control
security concerns
pubcrawl
Protocols
privacy concerns
AMI
power usage statistics
Logic gates
key management scheme
internetworking
Human Factors
home automation systems
home automation
Home appliances
encryption
domestic appliances
DLMS/COSEM
authentication
biblio
On the Analysis of Collaborative Anonymity Set Formation (CASF) Method for Privacy in the Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 4:08pm
power engineering computing
smart power grids
smart meters
smart metering data privacy
Smart Grids
Smart Grid Privacy
smart grid consumer privacy
Scyther tool
Public key
pubcrawl
privacy preservation
privacy
power system security
authentication
NS-3 simulator
metering data anonymization
Human Factors
high frequency metering data
distributed communication
distributed anonymization methods
data privacy
consumer privacy
collaborative anonymity set formation method
collaboration
CASF method
biblio
A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 4:08pm
energy consumers
smart power grids
smart meters
Smart Grids
smart grid consumer privacy
Smart Grid
real-time usage data
pubcrawl
privacy
power engineering computing
Human Factors
fine-grained access control
fine- grained data access control
Access Control
encryption
Decision trees
data utility
data privacy preservation
data privacy
data integrity
data aggregation scheme
data aggregation
control center
authorisation
attribute decision tree
biblio
Automated Vulnerability Analysis Technique for Smart Grid Infrastructure
Submitted by grigby1 on Thu, 05/24/2018 - 12:30pm
smart grid infrastructure
Power system protection
pubcrawl
resilience
Resiliency
security
security of data
security vulnerability analysis
Smart Grid
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
static analysis
Vulnerability Analysis
vulnerability analysis methodologies
vulnerability discovery method
automated power electricity network
power grid system
power engineering computing
power electricity infrastructure
Metrics
Korean smart grid environment
general systems
embedded software vulnerability discovery
embedded software
cyber-physical system security
cyber-physical system
Computer bugs
computer architecture
Compositionality
composability
automated vulnerability analysis
biblio
Fast Real-Time Authentication Scheme for Smart Grids
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Batch verification
bilinear pairings
Compositionality
Policy
policy-based collaboration
privacy
protocol verification
pubcrawl
sensor nodes
Signatures
smart grid consumer privacy
Smart Grids
smart meters
biblio
Mitigating Selective Jamming Attacks in Smart Meter Data Collection Using Moving Target Defense
Submitted by grigby1 on Mon, 03/26/2018 - 1:00pm
composability
Metrics
moving target defense
network security
pubcrawl
random shuffling
resilience
Resiliency
selective jamming attacks
smart meters
wireless mesh networks
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »