Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Substations
biblio
A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid
Submitted by aekwall on Mon, 01/11/2021 - 1:31pm
Cloud Computing
Scalability
Cryptography
power aware computing
Data models
pubcrawl
blockchain
privacy
smart power grids
Substations
Distributed databases
Smart Grid
power engineering computing
Smart Grids
blockchain technology
data visualisation
quality assurance
computer vision
power data
data modification
CBFM
cloud-blockchain fusion model
Fabric
image data
malicious eavesdropping
Meter reading
Parallel vision
parallel visual system
performance evaluations
secure manners
Secure storage
security guarantee
tamper-proof characteristics
data deletion
biblio
A Collaborative Defense for Securing Protective Relay Settings in Electrical Cyber Physical Systems
Submitted by grigby1 on Tue, 10/06/2020 - 2:11pm
security of data
collaboration
security
cyber-physical systems
pubcrawl
resilience
Resiliency
embedded systems
cyber security
power engineering computing
control layer
IEC standards
power system faults
power system reliability
IEC 61850
substation automation
Substations
relay protection
Power system protection
circuit breakers
cyber physical systems
actual relays
Collaborative Defense
computing technologies
Critical Infrastructure Protection
cyber physical security
cyber-attack
cyber-physical test bed
defense systems
domain based rules
electrical cyber physical systems
energy cyber-physical systems
IEC 61850 GOOSE messages
malicious change
modern power systems
neighboring devices
peer-to-peer communication
power systems infrastructures
Protection and Control
protection settings
Protective relaying
Protective Relays
relay coordination
relay coordination principles
securing protective relay settings
setting changes
setting rules
simulated cyber-attacks
CPS resilience
biblio
Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations
Submitted by grigby1 on Fri, 09/18/2020 - 2:08pm
security of data
pubcrawl
resilience
Resiliency
Integrated circuit modeling
power engineering computing
power system security
composability
power grids
power system control
Metrics
Power Grid
substation automation
substation automation systems
Substations
hardware-in-the loop simulation
cyberattack
relay protection
Power system protection
data injection attack
circuit breaker control
circuit breakers
Collaborative cyber defense models
cyber attack resilient distance protection
cyber intrusions
cyber–physical security test bed
digital substation
digital substations
distributed security domain layer
domain-based cyber-physical security solutions
domain-based mitigation
hardware-in-the-loop simulation
protection devices
real-time digital simulator
real-time power system analysis
smart grid cybersecurity
substation cybersecurity
transient fault signature-based cross-correlation coefficient algorithm
command injection attacks
biblio
A Hybrid Attack Model for Cyber-Physical Security Assessment in Electricity Grid
Submitted by aekwall on Tue, 09/08/2020 - 9:59am
security of data
Scalability
security
Data models
cyber-physical systems
learning (artificial intelligence)
Resiliency
pubcrawl
Mathematical model
smart power grids
Substations
power grids
power engineering computing
power system security
Games
Markov processes
electricity grid
Power Grid
Planning
markov chain
attack graph
attack propagation
bad data injection
bad data injection attack
Cyber-physical security assessment
Dynamic Defender model
execution stage
execution stages
HAM
hybrid attack model
Markov Chain model
PLADD
preparation stage
Probabilistic Learning Attacker
Chained Attacks
biblio
Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
security of data
computer network security
Monitoring
distributed processing
Protocols
SCADA
SCADA systems
Resiliency
pubcrawl
composability
network attacks
Substations
power grids
fault tolerant computing
power system reliability
resilience
computer centres
Power Grid
intrusion tolerance
data centers
network attack
control centers
data acquisition systems
nation-state-level attackers
network-attack-resilient intrusion-tolerant SCADA
power grid infrastructure
SCADA system management
simultaneous intrusions
sophisticated network-level attacks
Spire
supervisory control
System recovery
biblio
A Creditability-based Intrusion Tolerant Method for Protection Equipment in Transformer Substations
Submitted by aekwall on Mon, 07/27/2020 - 12:12pm
security of data
Internet of Things
telecommunication security
real-time systems
Resiliency
pubcrawl
composability
smart phones
data analysis
Substations
power engineering computing
sensors
Numerical models
Integrated circuit modeling
open network environment
Abnormal data diagnose
CIT algorithm
creditability-based intrusion-tolerant algorithm
Cyber network attack
interconnected network environment
interconnection of all things(IoT)
Intrusion-tolerant
malfunction protection
mobile terminal devices
protection equipment
Protective relaying
Protective Relays
relay protection
relays protection
security distribution network
sensing data analysis
transformer substations
intrusion tolerance
biblio
Graph-Based Event Classification in Grid Security Gateways
Submitted by grigby1 on Fri, 07/24/2020 - 1:01pm
Cryptography
security
Protocols
power engineering computing
power system security
telecommunication security
probability
pubcrawl
encryption
transport protocols
Anomaly Detection
graph theory
power grids
Cyber-physical attacks
DERA
distributed power generation
electrical grid distribution network
encrypted communications
Grid Security
grid security gateways
Grid Trust
network anomaly detection
network security
packet header behavioral analysis
power distribution control
power distribution control devices
renewable distributed energy resource aggregators
renewable energy sources
SG system
Substations
TCP-IP packet
TCPIP
time-series data
Trusted Communications
Control Theory
biblio
Simulating the Efficiency of Thermoelectrical Generators for Sensor Nodes
Submitted by grigby1 on Thu, 07/16/2020 - 11:44am
autarkic energy supply
batteries
composability
computational fluid dynamics
computational fluid dynamics model converter
Conductivity
converter
converter station
course means
CPS modeling
Electric Vehicles
electrical vehicles
electricity
energy harvesting
environmental factors
Europe
fossil fuels
Generators
green electrical power
Grid Security
high voltage direct current technology
HVDC power convertors
HVDC power transmission
Mathematical model
Metrics
power grids
power system security
precise monitoring
production site
pubcrawl
renewable energy sources
renewable sources
resilience
Resiliency
sensor node
simulation
simulations
specific environment
Substations
Temperature sensors
thermoelectric conversion
thermoelectrical generator
wireless sensor networks
wireless sensor nodes
biblio
Cyber-Physical Emulation and Optimization of Worst-Case Cyber Attacks on the Power Grid
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
CPS resilience
cyber physical systems
bulk electric system
Compositionality
control engineering computing
CrashOverride
CrashOverride malware
CrashOverride malware attack
Cyber Dependencies
cyber experiments
cyber interdiction optimization
cyber-physical emulation
cyber-physical systems
DC optimal power flow
DC power transmission
design of experiments
Human Factors
interdiction optimization
load control
Load flow
Metrics
notional electric system
optimisation
power control
power control area
power engineering computing
power grid operations
power grids
power system control
power system security
power system simulation
pubcrawl
Remote Terminal Units
Resiliency
SCADA systems
SCADA/ICS controls
Scalability
security of data
substation controlling
Substations
worst-case cyber attacks
worst-case loss
biblio
Securing GOOSE: The Return of One-Time Pads
Submitted by grigby1 on Fri, 05/08/2020 - 2:21pm
composability
Cryptographic Protocols
Denial-of-Service
devices attacks
encryption
generic object-oriented substation event
GOOSE messages
hardware requirements
IEC 61850
IEC 62351
IEC standards
international standard
latency constraints
latency requirements
Metrics
object oriented security
One-Time Pads
power engineering computing
Protocols
pubcrawl
real-time communications
resilience
Resiliency
Secure GOOSE
securing GOOSE
security recommendations
smart grid security
Smart Grids
smart power grids
substation automation
substation automation systems
substation security
Substations
Synthetic aperture sonar
telecommunication security
1
2
3
4
5
next ›
last »