Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IEC 61850
biblio
Communication and Information Security Assessment of a Digital Substation
Submitted by grigby1 on Mon, 11/29/2021 - 2:10pm
Manufacturing Message Specifications (MMS)
System recovery
Substations
substation automation
standards
Sampled Value (SV)
Resiliency
resilience
pubcrawl
communication security
Internet of Things
information security
IEC standards
IEC 62351
IEC 61850
Generic Object-Oriented Substation Events (GOOSE)
cyber security
Communications technology
biblio
Cyber Attacks on Protective Relays in Digital Substations and Impact Analysis
Submitted by grigby1 on Tue, 10/12/2021 - 2:45pm
Cascading Failures
composability
Cyber Attacks
cyber-physical systems
cyber security
IEC 61850
Metrics
power grid vulnerability
power grid vulnerability analysis
pubcrawl
Resiliency
biblio
Cyber Attacks on Power System Automation and Protection and Impact Analysis
Submitted by grigby1 on Tue, 10/12/2021 - 2:44pm
power grid vulnerability
substation automation
standards
Smart Grids
Resiliency
real-time systems
pubcrawl
Power system protection
power grid vulnerability analysis
blackout
Metrics
IEC standards
IEC 61850
cyber security
Cyber Attacks
cyberattack
composability
Cascading Failures
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 1:11pm
Real-time communication protocols
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
pi calculus
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
Human behavior
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
adversary model
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
biblio
A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
power systems infrastructures
cyber physical security
cyber-attack
cyber-physical test bed
defense systems
domain based rules
electrical cyber physical systems
energy cyber-physical systems
IEC 61850 GOOSE messages
malicious change
modern power systems
neighboring devices
peer-to-peer communication
Critical Infrastructure Protection
Protection and Control
protection settings
Protective relaying
Protective Relays
relay coordination
relay coordination principles
securing protective relay settings
setting changes
setting rules
simulated cyber-attacks
CPS resilience
power system faults
collaboration
security
cyber-physical systems
pubcrawl
resilience
Resiliency
embedded systems
cyber security
power engineering computing
control layer
IEC standards
security of data
power system reliability
IEC 61850
substation automation
Substations
relay protection
Power system protection
circuit breakers
cyber physical systems
actual relays
Collaborative Defense
computing technologies
biblio
Securing GOOSE: The Return of One-Time Pads
Submitted by grigby1 on Fri, 05/08/2020 - 2:21pm
smart grid security
Protocols
pubcrawl
real-time communications
resilience
Resiliency
Secure GOOSE
securing GOOSE
security recommendations
power engineering computing
Smart Grids
smart power grids
substation automation
substation automation systems
substation security
Substations
Synthetic aperture sonar
telecommunication security
IEC 62351
Cryptographic Protocols
Denial-of-Service
devices attacks
encryption
generic object-oriented substation event
GOOSE messages
hardware requirements
IEC 61850
composability
IEC standards
international standard
latency constraints
latency requirements
Metrics
object oriented security
One-Time Pads
biblio
A microgrid ontology for the analysis of cyber-physical security
Submitted by K_Hooper on Wed, 02/14/2018 - 12:00pm
cyber-physical systems
IEC 61850-7-420 DER extension
IEC 61850
Human behavior
fault state
Energy storage
electrical system
electrical substation automation
distributed power generation
distributed generation
distributed energy resource
DER unit controllers
DER-associated devices
IEC 61850 protocol suite
cyber-physical security evaluation
cyber-physical security
control loop
controllable loads
control directives
common information model
common data classes
capacity limits
asset-specific attributes
artificial intelligence security
ADVISE framework
pubcrawl
threat model
substation design
substation configuration
substation automation
ADversary View Security Evaluation framework
state-of-charge
adversary objectives
61850-7-420 DER object classes
Scalability
Resiliency
rated capacity
ramp rate
utility grid
power system security
Power system protection
power system applications
power engineering computing
ontologies (artificial intelligence)
object models
Microgrids
microgrid ontology
Metrics
message classes
IEC standards
biblio
SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions
Submitted by grigby1 on Tue, 09/05/2017 - 1:25pm
composability
CPS modeling
Cybersecurity
electrical substations
IEC 60870
IEC 61850
Metrics
pubcrawl
Resiliency
simulation
Smart Grid
software-based testbed
biblio
Detection of cyber intrusions using network-based multicast messages for substation automation
Submitted by BrandonB on Wed, 05/06/2015 - 1:59pm
sampled value
network security
network-based cyber intrusion detection system
network-based multicast messages
NIDS
packet modification
power engineering computing
predefined security rules
replay
misclassified abnormal packets
SaS
security of data
simultaneous cyber attacks
specification-based algorithm
substation automation
substation automation systems
SV
GOOSE
computer security
cyber security of substations
cyber security testbed
denial-of-service attacks
Educational institutions
false negative ratio
FNR
generic object-oriented substation event
Anomaly Detection
GOOSE and SV
IEC 61850
IEC standards
IEEE 39-bus system model
Intrusion Detection
intrusion detection system
low-fault negative rate
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
SCADA communication protocols over TCP/IP
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
NTRU public key algorithm
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
end-to-end security
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
AGA-12
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
1
2
next ›
last »