Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Smart Grids
biblio
An Improved Key Graph Based Key Management Scheme for Smart Grid AMI Systems
Submitted by grigby1 on Mon, 01/27/2020 - 12:25pm
security
Metrics
power engineering computing
Pricing
Protocols
pubcrawl
resilience
Resiliency
Scalability
scalable key management
key management scheme
Smart Grid
smart grid AMI systems
Smart Grids
smart meters
smart power grids
storage management
storage overhead
Unicast
VerSAMI key graph structure
computer network security
automatic meter reading
broadcast communication
broadcast key management performance
broadcast key management protocol
broadcast key management security
broadcast key update process
communication overhead
computer network management
computer network performance evaluation
advanced metering infrastructure
Conferences
Cryptography
graph theory
Human behavior
Human Factors
improved key graph
iVerSAMI
key graph based scheme
key management
biblio
BAP: A Batch and Auditable Privacy Preservation Scheme for Demand-Response in Smart Grids
Submitted by aekwall on Mon, 01/20/2020 - 11:45am
Resiliency
pubcrawl
IT security
Smart Grids
Predictive Metrics
Compositionality
audit
demand response
privacy preservation
encryption audits
biblio
IPv6-Based Smart Grid Communication over 6LoWPAN
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
local electric transformer
CAS
customer agents
Electric Grid
electric utilities
energy data
energy usage
future demand growth
IEEE 2030.5
IEEE 802.15 Standard
IPv6-based smart grid communication system
Carleton University
Low-Power and Lossy Networks
MESH network
OpenLab IEEE 802.15.4 chips
Routing Protocol
self-healing mesh network
Smart City concept
transformer agent
Two-Way Communication
two-way communication system
utility
6LoWPAN
IoT
RPL
IP networks
Resiliency
pubcrawl
composability
Routing protocols
Routing
Reliability
smart power grids
security
Smart Grids
Smart Grid
Mesh networks
wireless LAN
Zigbee
communication technologies
Communication Network
personal area networks
IPv6
biblio
Attacks Due to False Data Injection in Smart Grids: Detection Protection
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
Meters
uncertainty
uncertainties
system reliability
system protection
smart power grids
Smart Grids
Smart Grid
Resiliency
resilience
pubcrawl
power system security
Power Grid
power generation reliability
power generation protection
Phasor measurement units
False Data Detection
Mathematical model
Human behavior
H2control
H2 control method
H2 control
feedback controller
feedback
FDI detection methods
false data injection attacks
False Data Injection
estimation
energy saving
cyber physical systems
composability
Attack detection
biblio
Secure Kalman Filter State Estimation by Partially Homomorphic Encryption
Submitted by aekwall on Mon, 12/30/2019 - 12:35pm
secure estimation
Kalman filters
key system information
modified decryption algorithm
multiplicative homomorphic encryption scheme
normal Kalman filtering
partially homomorphic encryption
power system
quantization
IEEE 9-bus power system
secure Kalman filter state estimation
secure multiparty computation methods
SEKF
state estimates
system parameters
system state
trustworthy situation awareness
Scalability
Communication Network
associated communication channels
Homomorphic encryption
state estimation
Human Factors
sensors
Smart Grids
Metrics
pubcrawl
Resiliency
cyber-physical systems
security
data privacy
encryption
Cryptography
biblio
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Submitted by grigby1 on Tue, 11/19/2019 - 3:41pm
smart grid devices
power system
power system security
predefined vulnerability patterns
program diagnostics
resilience
Safety
security of data
security threats
power grid vulnerability analysis
Smart Grids
smart meters
smart power grids
smart terminals
Syntactics
terminal devices
terminal security
vulnerability detection
Compositionality
pubcrawl
Human behavior
composability
Resiliency
Analytical models
automatic static analysis
buffer-overflow vulnerabilities
buffer-overflow vulnerability detection
static analysis
Computer bugs
device program information
error reporting
feature extraction
Metrics
modern power transmission network
power engineering computing
biblio
Cybersecurity assurance control baselining for smart grid communication systems
Submitted by aekwall on Mon, 08/05/2019 - 10:42am
Smart Grid
Resiliency
security assurance controls
security baseline
security categorization
security impact levels
security level
security levels
security of data
Security Technical Implementation Guides
security zone
recent innovative risk-based approaches
smart grid communication networks
smart grid communication systems
smart grid security architecture
smart grid system architecture
Smart Grids
standards
Systems Security
technical functional controls
US Defense Information Systems Agency
Human behavior
assurance
assurance baseline
Business
composability
computer security
control systems
cybersecurity assurance base lining concepts
cybersecurity assurance control baselining
cybersecurity assurance controls
Networked Control Systems Security
IEC standards
industrial automation
Information Assurance
Information systems
key cybersecurity control baselining
Metrics
national security systems
policy-based governance
pubcrawl
biblio
Malware propagation effects on SCADA system and smart power grid
Submitted by aekwall on Mon, 07/01/2019 - 10:11am
power engineering computing
smart power grids
Smart Grids
simulated smart power grid environment
sensors
SCADA Systems Security
SCADA systems
SCADA system
Resiliency
pubcrawl
power system security
power grids
power generation
composability
Phasor measurement units
openDSS
OMNeT++ simulator
malware propagation effects
malware
invasive software
Human behavior
grid computing
cyberattack
Cyber Attacks
critical infrastructures
biblio
A secure data aggregation protocol for fog computing based smart grids
Submitted by aekwall on Mon, 06/24/2019 - 3:00pm
Smart Grid
policy-based governance
privacy
Protocols
pubcrawl
Resiliency
secure data aggregation
Secure Data Aggregation scheme
Security analysis
Servers
performance evaluation results
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
smart power grids
storage efficiency
storage overhead
telecommunication security
transmission overhead
edge computing
Cloud Computing
cloud server
computational overhead
Cryptography
data aggregation
data aggregation process
data privacy
Data Transmission
additive homomorphic encryption consumer privacy
end-to-end confidentiality
FCSG
Fog computing
fog layer
Human behavior
Internet of Things
Metrics
novel Domingo-Ferrer additive privacy
biblio
Data Economy for Prosumers in a Smart Grid Ecosystem
Submitted by aekwall on Mon, 06/24/2019 - 2:59pm
Data Analytics
demand response
energy management
flexibility
Human behavior
Metrics
policy-based governance
pubcrawl
Resiliency
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
…
next ›
last »