2014 TCIPG Industry Workshop Poster Session
iHotel and Conference Center
1900 South First Street, Champaign, Illinois
November 12-13, 2014
Posters are organized by research cluster and listed alphabetically by poster title. Click on the links below to view PDFs of the posters.
Fact Sheets for these activities are available by following the specific research activity link from the Reserach Page. A complete Fact Sheet Book from the poster session is also available.
- Trustworthy Technologies for Wide-Area Monitoring and Control
- Cryptographic Scalability in the Smart Grid
- Functional Security Enhancements for Existing SCADA Systems
Cyber-Physical Data Analytics Based on "Hybrid Control" Network Intrusion Detection - GridStat Middleware Communication Framework: Application Requirements
Cyber-Physical Co-Simulation for Analyzing Impact of Cyber Events on the Power Grid - GridStat Middleware Communication Framework: Management Security and Trust
K-Time Signature Deployment: A Practical Framework
Security Implications of Transport-Layer Protocols in Power Grid Synchrophasor Data Communication - GridStat Middleware Communication Framework: Systematic Adaptation
Rate-Based Failure Detection for Mission-Critical Data Delivery - PMU Enhanced Power System Operations
- Real-time Streaming Data Processing Engine for Embedded Systems
- State-Aware Decentralized Database Systems for Smart Grid
Robust State Estimation for Power Systems under Asynchronous Sampling - Trustworthy Time-Synchronous Measurement Systems
Pulse Coupled Syncrhonization and Scheduling Protocol
- Trustworthy Technologies for Local Area Management, Monitoring, and Control
- Cognitive Bias and Demand Response
Impact of Cognitive Biases in System Security - Development of the Information Layer for the V2G Framework Implementation
Funding the Transportation Infrastructure in a V2G Environment - Password Changing Protocol
- Smart-Grid-Enabled Distributed Voltage Support
- Trustworthy Framework for Mobile Smart Meters
Charging Facility Planning for Electric Vehicles
- Cognitive Bias and Demand Response
- Responding To and Managing Cyber Events
- A Game-Theoretic Intrustion Response and Recovery Engine
- Assessment and Forensics for Large-Scale Smart Grid Networks
Volatile Memory Analysis - Detection/Interdiction of Malware Carried by Application-Layer AMI Protocols
- Intrusion Detection for Smart Grid Components by Leveraging of Real-Time Properties
- Specification-based IDS for Smart Meters
- Specification-based IDS for the DNP3 Protocol
- Trust Assessment
- 802.15.4/ZigBee Security Tools
- Quantifying the Impacts on Reliability of Coupling between Power System Cyber and Physical Components
- Security and Robustness Evaluation and Enhancement of Power System Applications
- Synchrophasor Data Quality
Synchrophasor Data Quality on American Transmission Company's (ATC) Transmission System
NISTR 7628 Cyber Security Visualization
Open-Box Phasor Measurement Unit (PMU) - Tamper Event Detection Using Distributed SCADA Hardware
- Testbed-Driven Assessment: Experimental Validation of System Security and Reliability
- Trustworthiness Enhancement Tools for SCADA Software and Platforms
- Understanding and Mitigating the Impacts of GPS/GNSS Vulnerabilities
- Cross-Cutting Efforts
- Incubator Research Activity