Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IEEE 118-bus system
biblio
Isolation Forest based Detection for False Data Attacks in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 12:40pm
Vegetation
real-time data
outlier detection
isolation forest based detection algorithm
isolation forest
integrated communication networks
IF based detection method
entire power grid
bad data detection
false data attack
False Data Detection
Transmission line measurements
cyber physical systems
network information
cyberattack
Forestry
fault diagnosis
false data injection attacks
Smart Grids
power systems
IEEE 118-bus system
state estimation
Cyber Attacks
real-time systems
composability
power system security
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Methodology for Detecting Stealthy Transformer Tap Command Injection Attacks in Smart Grids
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
on load tap changers
IEEE 118-bus system
Smart Grids
Voltage control
branch currents
control signals-commands
False Data Injection
false tap command injection
malicious tap change command
Voltage measurement
on-load tap changing transformers
power system SCADA networks
SCADA channels
state variables
stealthy transformer tap command injection attacks detection
voltage regulation device
command injection attacks
pubcrawl
state estimation
Power measurement
Reactive power
power generation control
Metrics
telecommunication channels
energy management
composability
smart power grids
power system security
SCADA systems
Indexes
computer network security
Resiliency
resilience
biblio
A New Metric to Quantify the Vulnerability of Power Grids
Submitted by grigby1 on Fri, 04/24/2020 - 4:38pm
Matrices
DC load flow
electrical equations
grid geometry
Hybrid topological model
IEEE 118-bus system
industrial software
load distribution
load-flow equations
blackout
Network capacity reserve metric
power blackouts
power generators
power systems
topological indicators
vulnerability lines
Power Grid Vulnerability Assessment
pubcrawl
Load flow
Cascading Failures
network theory (graphs)
complex network theory
power system reliability
failure analysis
Measurement
Metrics
power grids
composability
Vulnerability
Mathematical model
Generators
Resiliency
resilience
biblio
A Validity Test Methodfor Transmission Betweens and Transmission Sections Based on Chain Attack Analysisand Line Outage Distribution Factors
Submitted by grigby1 on Fri, 04/05/2019 - 10:29am
Power grid monitoring
validity test method
transmission sections
transmission section identification
transmission lines
transmission betweenness
Scalability
Resiliency
resilience
pubcrawl
power transmission lines
Power system dynamics
power grids
chain attack
power flow
power distribution reliability
Load flow
line outage distribution factors
line outage distribution factor
IEEE 39-bus system
IEEE 118-bus system
Generators
Electric breakdown
Chained Attacks
chain attack analysis
biblio
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Submitted by el_wehby on Mon, 05/14/2018 - 4:07pm
physical power flow maximization
worst-case attack consequences
vulnerability assessments
upper bounds
Upper bound
state estimation
Smart Grids
security of data
scalable optimization
power system vulnerability evaluation
power system security
Polish system
Algorithm design and analysis
optimization
mixed-integer linear program
lower bounds
Load flow
Linear programming
integer programming
IEEE 118-bus system
Generators
false data injection cyber-attacks
bi-level optimization problem
1449080
biblio
Evaluating power system vulnerability to false data injection attacks via scalable optimization
Submitted by grigby1 on Mon, 11/27/2017 - 12:24pm
Polish system
worst-case attack consequences
vulnerability assessments
upper bounds
Upper bound
state estimation
Smart Grids
security of data
scalable optimization
Resiliency
pubcrawl
power system vulnerability evaluation
power system security
power grid vulnerability analysis
Algorithm design and analysis
physical power flow maximization
optimization
mixed-integer linear program
Metrics
lower bounds
Load flow
Linear programming
integer programming
IEEE 118-bus system
Generators
false data injection cyber-attacks
composability
bi-level optimization problem