Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power systems
biblio
Multivariate Uncertainty Characterization for Resilience Planning in Electric Power Systems
Submitted by grigby1 on Tue, 05/25/2021 - 3:50pm
CPS resilience
cyber physical systems
Decision Making
Ellipsoids
optimization
power systems
Probabilistic forecasting
Probabilistic logic
pubcrawl
resilience
Resiliency
stochastic optimization
Stochastic processes
uncertainty
uncertainty sets
biblio
Identification of Smart Grid Attacks via State Vector Estimator and Support Vector Machine Methods
Submitted by grigby1 on Thu, 05/13/2021 - 12:20pm
Attack vectors
Cyber Attacks
Human behavior
machine learning
power systems
pubcrawl
Reliability
resilience
Resiliency
Scalability
Smart Grid
Smart Grids
state estimator
Support vector machines
Topology
Training
biblio
Automatic Error Correction Technology for the Same Field in the Same Kind of Power Equipment Account Data
Submitted by grigby1 on Wed, 05/05/2021 - 12:42pm
Human Factors
Technological innovation
Safe Coding
Resiliency
resilience
pubcrawl
Production
power systems
policy-based governance
Metrics
account data
Human behavior
Hardware
Gears
error correction
electrical power system
data quality
collaboration
Business
automatic error correction
biblio
Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring
Submitted by grigby1 on Wed, 05/05/2021 - 12:31pm
SCADA
SCADA Systems Security
undesired events
process-related threats
malicious actions
Itemsets
logs
SCADA System Security
power systems
Substations
Monitoring
Compositionality
Data mining
SCADA systems
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Servers
biblio
Power System Reliability Analysis Considering External and Insider Attacks on the SCADA System
Submitted by grigby1 on Wed, 05/05/2021 - 12:29pm
power systems
switched mode power supplies
SCADA Systems Security
SCADA systems
SCADA System Security
SCADA
Resiliency
resilience
Reliability
pubcrawl
Compositionality
power system reliability
Monte Carlo Simulation (MCS)
mean time-to-compromise (MTTC)
Local area networks
insider attacks
Human Factors
Human behavior
Cybersecurity
Computer crime
biblio
Cyber-physical data stream assessment incorporating Digital Twins in future power systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:28pm
SCADA systems
power grids
power system control
power system reliability
power system security
power systems
pubcrawl
reliable grid operations
resilience
Resiliency
SCADA information
power engineering computing
Scalability
secure grid operations
security
security of data
Sparse matrices
steady system states
Steady-state
Systems architecture
transient system states
expert systems
Anomaly Detection
Artificial Intelligence
control functions
critical physical events
cyber-attacks
cyber-physical situational awareness
cyber-physical systems
data stream analysis
digital twins
expert knowledge
AI based anomaly detection functionalities
high-resolution PMU data
holistic data stream assessment methodology
Human behavior
IT-OT convergence
measurement uncertainty
Monitoring
phasor measurement
Phasor measurement units
Pollution measurement
biblio
Modeling and Analysis Cyber Threats in Power Systems Using Architecture Analysis Design Language (AADL)
Submitted by aekwall on Mon, 11/16/2020 - 2:58pm
Power Grid
Resilient Security Architectures
switching attack
Power systems security
power system information models
Model-based analysis
FDI attack
false data injection attacks
cyber-physical modeling capabilities
cyber-physical model
cyber-grid components
Architecture Analysis & Design Language
AADL
specification languages
security of data
verification techniques
cyber threats
power systems
program verification
power grids
power system security
power engineering computing
Software Architecture
cyber-physical security
pubcrawl
Resiliency
cyber-physical systems
biblio
Industrial Control Intrusion Detection Model Based on S7 Protocol
Submitted by grigby1 on Fri, 10/16/2020 - 11:32am
S7 protocol
private industrial control protocols
production engineering computing
protocol analysis
protocol parsing technology
Protocols
pubcrawl
resilience
Resiliency
S7 data packet analysis
power systems
Scalability
Siemens Company
static white list configuration complexity
static white list configuration portability
tradtonal protocol parsing technology
Unsupervised Learning
white list detection
white list self-learning
white list self-learning algorithm
industrial control
abnormal S7 protocol packet detection
Anomaly Detection
communication process
Companies
composite intrusion detection method
computer network security
deep analysis algorithm
Heuristic algorithms
ICs
abnormal behavior detection
industrial control intrusion detection model
industrial control network security
industrial control system
Industrial Control Systems
internet
internet technology
Intrusion Detection
national Industrial 4.0 strategy
networked control systems
biblio
Isolation Forest based Detection for False Data Attacks in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 12:40pm
Vegetation
real-time data
outlier detection
isolation forest based detection algorithm
isolation forest
integrated communication networks
IF based detection method
entire power grid
bad data detection
false data attack
False Data Detection
Transmission line measurements
cyber physical systems
network information
cyberattack
Forestry
fault diagnosis
false data injection attacks
Smart Grids
power systems
IEEE 118-bus system
state estimation
Cyber Attacks
real-time systems
composability
power system security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Local Outlier Factor Based False Data Detection in Power Systems
Submitted by grigby1 on Wed, 10/14/2020 - 12:39pm
Smart Grids
local outlier factor
false data attack
electric power delivery
dummy data attack
density-clustering based LOF algorithm
density clustering
cyber attackers
False Data Detection
cyber physical systems
pattern clustering
security of data
power systems
power grids
composability
smart power grids
power engineering computing
Resiliency
resilience
Human behavior
pubcrawl
Anomaly Detection
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »