Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
state variables
biblio
False Data Detection in Power System Under State Variables' Cyber Attacks Using Information Theory
Submitted by grigby1 on Tue, 07/05/2022 - 11:23am
power system stability
state variables
Semi-supervised Learning Detection Algorithm
Relative Entropy (RE)
information theory
false data injection attack (FDIA)
Absolute Distance (AD)
power system reliability
False Data Detection
Semisupervised learning
Probability distribution
cyber security
Probability density function
real-time systems
composability
Entropy
Smart Grid
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Methodology for Detecting Stealthy Transformer Tap Command Injection Attacks in Smart Grids
Submitted by grigby1 on Fri, 09/18/2020 - 2:07pm
on load tap changers
IEEE 118-bus system
Smart Grids
Voltage control
branch currents
control signals-commands
False Data Injection
false tap command injection
malicious tap change command
Voltage measurement
on-load tap changing transformers
power system SCADA networks
SCADA channels
state variables
stealthy transformer tap command injection attacks detection
voltage regulation device
command injection attacks
pubcrawl
state estimation
Power measurement
Reactive power
power generation control
Metrics
telecommunication channels
energy management
composability
smart power grids
power system security
SCADA systems
Indexes
computer network security
Resiliency
resilience
biblio
Taming Delays in Dynamical Systems: Unbounded Verification of Delay Differential Equations
Submitted by willirn1 on Wed, 08/21/2019 - 1:35pm
DDEs
Delay Differential Equations
state variables
delayed coupling
technical dynamic systems
embedded control
safety-critical domains
Safety
safety verifications
classical stability theory
delay-dependent estimations spectral analysis
bounded verification techniques
bounded temporal horizon
unbounded temporal horizon
biblio
Information-Theoretic Attacks in the Smart Grid
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
Mutual information
utility function
state variables
state estimation
smart power grids
Smart Grids
Smart Grid Sensors
Smart Grid
sensors
security
second order statistics
Resiliency
resilience
pubcrawl
probability
power system security
attack detection probability
kullback-leibler divergence
KL divergence
information-theoretic attacks
information theory
IEEE 30-Bus test system
Human Factors
Human behavior
higher order statistics
Gaussian random attacks
gaussian distribution
covariance matrix
Covariance matrices
Compositionality
Bayes methods
biblio
Detection and Masking of Trojan Circuits in Sequential Logic
Submitted by grigby1 on Wed, 04/11/2018 - 3:00pm
Resiliency
Trojan horses
trojan horse detection
Trojan circuit masking
Trojan circuit detection
TC switch description
TC switch
sub-circuit overhead masking
STG description
state variables
state transition graph description
state estimation
sequential circuits
sequential circuit nodes
ROBDDs
binary decision diagrams
resilience
reduced ordered binary decision diagrams
pubcrawl
precise random estimations
Observability
Logic gates
internal node observability
internal node controllability
graph theory
estimation
cyber physical systems
Controllability
composability
Boolean functions