Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Integrity Attacks
biblio
A Graph Theory Approach towards IJTAG Security via Controlled Scan Chain Isolation
Submitted by grigby1 on Mon, 11/02/2020 - 11:28am
Registers
IJTAG network
IJTAG security
Instruments
intellectual property security
isolation signals
microprocessor chips
on-chip access
on-chip instruments
policy-based governance
power consumption
pubcrawl
IJTAG
resilience
Resiliency
scan chain
security
security of data
system-on-chip
system-on-chip designs
third party intellectual property providers
unauthorized user access
untrusted sources
Diagnosis
Clocks
Complexity theory
composability
controlled scan chain isolation
data integrity
Data Integrity Attacks
data manipulation
data protection scheme
data sniffing
debug
design for test
authorisation
electronic design automation
embedded instruments
embedded systems
graph coloring problem
graph colouring
graph theory approach
hidden test-data registers
IEEE standards
IEEE Std 1687
IEEE Std. 1687
biblio
Combined data integrity and availability attacks on state estimation in cyber-physical power grids
Submitted by grigby1 on Mon, 11/27/2017 - 11:24am
power engineering computing
Transmission line measurements
Substations
Smart Grids
single path routing
security of data
Security Metrics
security
Resiliency
pubcrawl
power system state estimation
power system model
power grids
power grid vulnerability analysis
power grid vulnerability
composability
multipath routing communication models
multipath routing
mixed integer linear programming
MILP problems
Metrics
Linear programming
integrity-focused mitigation schemes
integer programming
Data Integrity Attacks
data integrity
data availability attacks
data availability
cyber-physical systems
cyber-physical power grids
biblio
Model-Based Attack Detection and Mitigation for Automatic Generation Control
Submitted by BrandonB on Thu, 04/30/2015 - 12:27pm
power system operation reliability
Intrusion Detection Systems
kernel density estimation
model-based anomaly detection algorithm
model-based mitigation algorithm
network-based security technologies
physical system
Power measurement
power system control
power system frequency
host-based security technologies
power system reliability
power system stability
ramp attacks
scaling attacks
security of data
smart attack detection
smart attack mitigation
supervisory control and data acquisition
cyber-attack-resilient control techniques
Anomaly Detection
attack mitigation algorithm
attack resilient control
automatic generation control
critical assets protection
cyber layer
cyber security measures
cyber systems
AGC
data integrity
Data Integrity Attacks
electricity market operation
Electricity supply industry
electronic threats
frequency control
Frequency measurement
Generators