Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
power grids
biblio
Research on Security Protection Technology System of Power Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 10:39am
real-time security monitoring
power grid transmission
power grids
power Internet of Things
Power system protection
power system security
privacy protection
production links
Protocols
pubcrawl
power engineering computing
resilience
Resiliency
Scalability
security
security monitoring
security protection technology system
sensor security
sensors
terminal identity authentication
edge area autonomy
application security risks
authentication
authority control
Cloud Computing
computer architecture
computer network management
computer network security
data communication
data transmission protection
application layer cloud fog security management
edge computing
fog calculation
Fog computing
Human behavior
internet
Internet of Things
Metrics
network security
Network Security Architecture
biblio
Power-Grid Controller Anomaly Detection with Enhanced Temporal Deep Learning
Submitted by aekwall on Mon, 01/20/2020 - 11:12am
power-grid controller anomaly detection
control engineering computing
LSTM
actuators
data-driven defense system
enhanced temporal deep learning
Hardware Performance Counter
Kolmogorov–Smirnov test
power-grid controller
Human Factors
power-grid system
programmable logic controller
security-critical cyber-physical systems
temporal deep learning detection
temporal deep learning model
time 360.0 ms
zero trust
Scalability
deep learning
sensors
process control
power grids
power system security
power engineering computing
Zero-day attacks
Substations
policy-based governance
pubcrawl
Resiliency
learning (artificial intelligence)
invasive software
malware
Hardware
file
Data-driven Real-time Data Authentication in Wide-Area Energy Infrastructure Sensor Networks
Submitted by Yilu Liu on Fri, 01/10/2020 - 3:38pm. Contributors:
Yilu Liu
Shutang You
Shengyuan Liu
Wenxuan Yao
sensor networks
data authentication
machine learning
power grids
Posters
1931975
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Vulnerability and Protocol Association of Device Firmware in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 2:42pm
Metrics
vulnerability information correlation
vulnerability association
security vulnerability
Safety
Resiliency
resilience
pubcrawl
Protocols
protocol association
power system security
power system control
power grids
power grid vulnerability analysis
composability
mass grid device firmware device attributes
intelligent power grid
Inspection
industrial power systems
industrial control system device firmware
industrial control equipment safety inspection
industrial control device firmware protocol vulnerabilities
industrial control
firmware preprocessing
firmware
features extraction
Control equipment
biblio
Network Theory Based Power Grid Criticality Assessment
Submitted by grigby1 on Tue, 11/19/2019 - 2:42pm
network theory
vulnerability assessment
Transmission line measurements
standard IEEE test cases
Resiliency
resilience
pubcrawl
power transmission lines
power grids
power grid vulnerability analysis
power grid vulnerability
power grid criticality assessment
power grid control center
power grid connectivity monitoring
network theory (graphs)
Australia
network flow problem
network flow
Metrics
maximum flow problem
linear programming problem
linear programming duality
Linear programming
Generators
flow network
energy management systems
Energy Management System
critical transmission lines identification
composability
blackout
biblio
Universal Framework for Vulnerability Assessment of Power Grid Based on Complex Networks
Submitted by grigby1 on Tue, 11/19/2019 - 2:42pm
power system
weighted betweenness evaluation index
weighted betweenness
vulnerability assessment
virtual edge weight
universal method
universal framework
unified weighting model
Topology
Resiliency
resilience
pubcrawl
power system stability
power system security
complex network theory
power grids
power grid vulnerability assessment methods
power grid vulnerability analysis
nodes vulnerability
network theory (graphs)
Metrics
Indexes
Generators
edges vulnerability
distinct weighted complex network model
composability
complex networks
biblio
Reserch on Cyber Attack of Key Measurement and Control Equipment in Power Grid
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
safe operation
power grids
Power measurement
power system security
power system stability
pubcrawl
resilience
Resiliency
risk analysis
risk analysis results
power grid vulnerability analysis
security of data
simulation penetration test environment
stable operation
subsequent attack test
subsequent KMCEPG-related attack penetration
terminal critical control devices
terminal key control equipment
test process
vulnerability mining
cyber security risks
Attack process construction
attack process construction technology
Attack test case
attack test cases
attack test results
composability
Computer crime
Control equipment
cyber attack
attack flow construction technology
Grid cyber attack
Grid key control equipment
Grid key measurement equipment
key measurement
Loss measurement
Metrics
operating systems
Power Grid
biblio
Vulnerability Assessment Method for Cyber Physical Power System Considering Node Heterogeneity
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
hierarchical system
Communication Network
complex network theory
cyber physical power system
different weighting factor
Dispatching
equilibrium
heterogeneity evaluation index system
hierarchical CPPS model
complex networks
island survivability
islanding survivability
network structure
node heterogeneity
short-term operation
vulnerability assessment method
power grid vulnerability analysis
Entropy
pubcrawl
Metrics
Resiliency
composability
Indexes
Communication networks
vulnerability assessment
power engineering computing
resilience
power system faults
Power system protection
network theory (graphs)
Power Grid
power grids
power flow
distributed system
biblio
Power Grid Security Improvement by Remedial Action Schemes Using Vulnerability Assessment Based on Fault Chains and Power Flow
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
power system security
vulnerable transmission lines
vulnerability index
vulnerability assessment
vulnerability assessemnt
resilient power grid
Resiliency
resilience
remedial action schemes
remedial action scheme
pubcrawl
probability
power transmission reliability
power transmission lines
power transmission faults
power system stability
Cascading Failures
Power system protection
power system faults
power grids
power grid vulnerability analysis
power grid security improvement
power flow-based method
power flow
Metrics
Load flow
large-scale blackout
Indexes
IEEE 14-bus test system
fault chains
fault chain theory
composability
biblio
Analytical Challenges in Reliability and Resiliency Modeling
Submitted by grigby1 on Wed, 10/02/2019 - 1:55pm
resilience
power generation reliability
power grids
power markets
power system reliability
power transmission reliability
pubcrawl
Reliability and Resiliency Standards
Reliability engineering
power distribution reliability
Resiliency
resiliency modeling
resiliency requirements
Resource Adequacy
standards
transmission facilities
Transmission Security
analytical challenges
North America
Natural gas
maintenance records
maintenance engineering
industry expectations
grid resiliency
Fuel Security
frequent weather conditions
energy limited resources
electric services
electric loads
Electric Grid
economic activities
distribution facilities
changing generation mix
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »