Publications

Enter search criteria and click Apply. Be sure to click Reset and re-enter criteria for subsequent searches. Looking for publications resulting from TCIP (2005-2009)? Select TCIP from the Activity option in Advanced Filters.

Total records for this search: 439

Privacy Protection Through Limited Load Signal Distortion

Nicol, T.
Year: 2011 | Type: M.S. Thesis

Lightweight Intrusion Detection for Resource-Constrained Embedded Control Systems

Reeves, J., Ramaswamy, A., Locasto, M., Bratus, S., Smith, S.W.
Year: 2011 | Type: Proceedings

Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing

Shapiro, R., Bratus, S., Rogers, E., Smith, S.W.
Year: 2011 | Type: Proceedings

Distributed Security Policy Conformance

Montanari, M., Chan, E., Larson, K., Yoo, W., Campbell, R.
Year: 2011 | Type: Proceedings

Small Inverter-Interfaced Distributed Energy Resources for Reactive Power Support

Domínguez-Garcia, A.D., Hadjicostis, C.N., Krein, P.T., Cady, S.T.
Year: 2011 | Type: Proceedings

A Control Framework for the Smart Grid for Voltage Support Using Agent Based Technologies

Aquino-Lugo, A. A., Klump, R., Overbye, T. J.
Year: 2011 | Type: Journal Article

Hybrid power flow analysis: Combination of AC and DC models

Kim, S., Overbye, T.J.
Year: 2011 | Type: Proceedings

Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks

Fatemieh, O., Farhadi, A., Chandra, R., Gunter, C. A.
Year: 2011 | Type: Proceedings

Transition to a Two-Level Linear State Estimator, part I: Architecture

Yang, T., Sun, H., Bose, A.
Year: 2011 | Type: Journal Article

Transition to a Two-Level Linear State Estimator, part II: Algorithm

Yang, T., Sun, H., Bose, A.
Year: 2011 | Type: Journal Article

Exploring Convergence for SCADA Networks

Heine, E., Khurana, H., Yardley, T.
Year: 2011 | Type: Proceedings

Distributed Non-Intrusive Load Monitoring

Bergman, D.C., Jin, D., Juen, J.P., Tanaka, N., Gunter, C.A., Wright, A.K.
Year: 2011 | Type: Proceedings

Nonintrusive Load-Shed Verification

Bergman, D. C., Jin, D., Juen, J. P., Tanaka, N., Gunter, C. A., Wright, A. K.
Year: 2011 | Type: Journal Article

FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment

Zonouz, S., Joshi, K., Sanders, W.H.
Year: 2011 | Type: Proceedings

The Value of Volatile Resources in Electricity Markets

Meyn, S., Negrete-Pincetic, M., Wang, G., Kowli, A., Shafieepoorfard, E.
Year: 2010 | Type: Proceedings

Electrical Centrality Measures for Electric Power Grid Vulnerability Analysis

Wang, Z., Scaglione, A., Thomas, R. J.
Year: 2010 | Type: Proceedings

Forenscope: A Framework for Live Forensics

Chan, E., Venkataraman, S., David, F., Chaugule, A., Campbell, R.
Year: 2010 | Type: Proceedings

Identifying Insider-based Jammers in Multi-channel Wireless Networks

Nguyen, H., Pongthawornkamol, T., Nahrstedt, K.
Year: 2010 | Type: Proceedings

Fast Simulation of Background Traffic through Fair Queueing Networks

Jin, D., Nicol, D. M.
Year: 2010 | Type: Proceedings

Pages