The smart grid solution brings about significant improvement in reliability, performance, and manageability by integrating two-way communication technology into the current power grid. Added inter-connectivity enables consumers and energy suppliers to take advantage of convenience, dependability, and energy savings provided by real time energy management. However, the convergence of communication technology and energy systems creates a new realm of network security issues ranging from a larger attack surface to an abundance of sensitive information available to an intruder. Network stability is achieved by means of intrusion detection systems (IDS). An intrusion detection system monitors a network or system for malicious activity or policy ...
Doctor of PhilosophyDepartment of Electrical and Computer EngineeringHongyu WuRecent advances in the...
We study moving-target defense (MTD) that actively perturbs transmission line reactances to thwart s...
Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer sy...
Cyber attacks on distributed systems have devastating consequences. Several cybersecurity solutions ...
Supervisory Control And Data Acquisition (SCADA) communications are often subjected to various kinds...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
In this work, we examine how Moving Target Defences (MTDs) can be enhanced to circumvent intelligent...
This paper examines how moving target defenses (MTD) implemented in power systems can be countered b...
Recent research has proposed a moving target defense (MTD) approach that actively changes transmissi...
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging ...
The use of traditional defense mechanisms or intrusion detection systems presents a disadvantage for...
The static nature of many of currently used network systems has multiple practical benefits, includi...
International audienceWithout robust security mechanisms, the smart grid remains vulnerable to many ...
AbstractIntrusion detection systems (IDS) are security tools that attempt to detect malicious activi...
A kind of electricity networks in which various processes are carried out, energy measurements are m...
Doctor of PhilosophyDepartment of Electrical and Computer EngineeringHongyu WuRecent advances in the...
We study moving-target defense (MTD) that actively perturbs transmission line reactances to thwart s...
Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer sy...
Cyber attacks on distributed systems have devastating consequences. Several cybersecurity solutions ...
Supervisory Control And Data Acquisition (SCADA) communications are often subjected to various kinds...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
In this work, we examine how Moving Target Defences (MTDs) can be enhanced to circumvent intelligent...
This paper examines how moving target defenses (MTD) implemented in power systems can be countered b...
Recent research has proposed a moving target defense (MTD) approach that actively changes transmissi...
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging ...
The use of traditional defense mechanisms or intrusion detection systems presents a disadvantage for...
The static nature of many of currently used network systems has multiple practical benefits, includi...
International audienceWithout robust security mechanisms, the smart grid remains vulnerable to many ...
AbstractIntrusion detection systems (IDS) are security tools that attempt to detect malicious activi...
A kind of electricity networks in which various processes are carried out, energy measurements are m...
Doctor of PhilosophyDepartment of Electrical and Computer EngineeringHongyu WuRecent advances in the...
We study moving-target defense (MTD) that actively perturbs transmission line reactances to thwart s...
Intrusion detection is the problem of identifying unauthorized use, misuse, and abuse of computer sy...