Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Provenance-aware security risk analysis for hosts and network flows
Submitted by BrandonB on Fri, 05/01/2015 - 7:29am
Computational modeling
computer network security
deep packet inspection
Educational institutions
high risk hosts
high risk network flows
Iterative methods
Monitoring
Ports (Computers)
provenance aware security risk analysis
risk analysis
risk management
risk score
security
biblio
A characterization of uncoordinated frequency hopping for wireless secrecy
Submitted by BrandonB on Fri, 05/01/2015 - 7:16am
spread spectrum communication
wireless transmissions
wireless secrecy
Wireless communication
uncoordinated frequency hopping characterization
Time-frequency Analysis
Throughput
telecommunication security
spread spectrum scheme
communication secrecy level
security
secret-key exchange
radio transmitters
radio receivers
Jamming
Interference
Cryptography
biblio
Security risk analysis for smart grid automation
Submitted by BrandonB on Fri, 05/01/2015 - 6:48am
power engineering computing
Vulnerability Analysis
supply restoration smart grid automation
Substations
Software
smart power grids
Smart Grids
security risk analysis methodology
security
SCADA systems
risk analysis
reliability theory
random component failures
power system security
power system reliability
power system faults
attack identification
industrial automation engineering
impact analysis
IEC standards
IEC 61850
IEC 61499
fault location
fault isolation
fault diagnosis
electric grids
electric grid automation system
control engineering computing
complex system design
communications network topology
automation architecture
automation
biblio
Power system adequacy assessment with probabilistic cyber attacks against breakers
Submitted by BrandonB on Fri, 05/01/2015 - 6:34am
power system adequacy assessment
Substations
substation protection
substation breakers
Smart Grid
security
SCADA systems
Reliability
probabilistic modeling
probabilistic cyber attacks
power system security
power system reliability
adequacy assessment
power engineering computing
load shedding
IEEE RTS79 system
IEC standards
Generators
Cybersecurity
cyber-physical systems
cyber-physical power grids
cyber security
cyber network
circuit breakers
biblio
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures
Submitted by BrandonB on Fri, 05/01/2015 - 6:33am
network topology
state estimation
SOCCA
situational awareness
security-oriented cyber-physical contingency analysis
security
power system topology
power system security
power system planning
power system contingency
power infrastructures
power grids
physical components
accidental contingency
Mathematical model
malicious compromises
Indexes
grid operation
cyber-physical systems
cyber-physical security evaluation
cyber perspective
cyber network configuration
cyber components
control network
contingency analysis
Algorithm design and analysis
biblio
Cyber security evaluation of synchrophasors in a power system
Submitted by BrandonB on Fri, 05/01/2015 - 6:32am
Phasor measurement units
synchrophasors
Smart Grids
Smart Grid
security of data
security
Real-time monitoring
power system security
power system
Power measurement
power grids
Power Grid
PMU
benchmark IEEE 68 bus power system model
phasor measurement
network infrastructure
line current
frequency measurements
Frequency measurement
Data Security
cyber-attacks
cyber security vulnerabilities
Current measurement
Communication Network
bus voltage
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 6:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Cyber-related risk assessment and critical asset identification in power grids
Submitted by BrandonB on Fri, 05/01/2015 - 6:31am
Risk Methodology
optimal placing security
Power Grid
power grids
power system reliability
power system security
Reliability
risk analysis
risk assessment
risk index
N-1 contingent analysis
second pass engine
security
substation
substation automation
substation level
substation vulnerability
Substations
two-pass engine model
cyber hackers
analytic hierarchy process
analytical hierarchy process
asset reliability
automation
automation system
cost vulnerability
critical asset identification
critical substation identification
AHP
cyber related risk assessment
cyber security
cyber vulnerability
electrical power grids
Indexes
Intrusion Detection
malicious
modeling
biblio
Integrated Security Analysis on Cascading Failure in Complex Networks
Submitted by BrandonB on Fri, 05/01/2015 - 6:28am
power grids
Topology
structural vulnerability
standard IEEE 118-bus test system
security of data
security
power transfer distribution factor-based model
Power system protection
power system faults
Analytical models
power grid components
network security perspective
integrated security analysis
extended topological metric
extended topological analysis
complex networks
Complex network security
cascading failure
biblio
Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid
Submitted by BrandonB on Fri, 05/01/2015 - 6:27am
privacy
vehicle-to-grid networks
Vehicle-to-grid (V2G)
smart power grids
Smart Grids
Smart Grid
Security analysis
security
secure V2G networks
ROPS
role-dependent privacy preservation scheme
Protocols
authentication
power engineering computing
interlinked subprotocols
energy supply
Energy storage
energy demand
electricity
cyber security vulnerability
Cryptographic Protocols
battery vehicles
battery powered vehicles
authentication mechanisms
« first
‹ previous
…
429
430
431
432
433
434
435
436
437
…
next ›
last »