• Publications
  • Influence
Detecting False Data Injection Attacks on DC State Estimation
TLDR
State estimation is an important power system application that is used to estimate the state of the power transmission networks using a redundant set of sensor measurements and network topology information. Expand
  • 372
  • 22
  • PDF
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
TLDR
In distributed systems users need to share sensitive objects with others based on the recipients' ability to satisfy a policy. Expand
  • 183
  • 14
  • PDF
Moving Target Defense for Hardening the Security of the Power System State Estimation
TLDR
We apply moving target defense (MTD) strategies for developing a proactive defense mechanism for state estimation. Expand
  • 52
  • 12
  • PDF
AMI threats, intrusion detection requirements and deployment recommendations
TLDR
We survey the various threats facing AMIs and the common attack techniques used to realize them in order to identify and understand the requirements for a comprehensive intrusion detection solution. Expand
  • 95
  • 8
  • PDF
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures
TLDR
We present a security-oriented cyber-physical state estimation (SCPSE) system, which, at each time instant, identifies the compromised set of hosts in the cyber network and the maliciously modified set of measurements obtained from power system sensors. Expand
  • 145
  • 7
  • PDF
Topology Perturbation for Detecting Malicious Data Injection
TLDR
A perturbation-based approach for bad data detection in power systems is proposed in this work, particularly designed to detect malicious data attacks. Expand
  • 59
  • 7
  • PDF
Reliable GPS-based timing for power systems: A multi-layered multi-receiver architecture
Synchronized voltage and current phasor measurements provided by phasor measurement units (PMUs) have the potential to augment power system monitoring, control, and protection functions. PMUs use theExpand
  • 47
  • 7
  • PDF
Real-Time Systems Security through Scheduler Constraints
TLDR
We show that certain security requirements can be specified as real-time scheduling constraints. Expand
  • 42
  • 6
  • PDF
Bootstrapping security associations for routing in mobile ad-hoc networks
TLDR
We use the notion of statistically unique and cryptographically verifiable (SUCV) identifiers to implement a secure binding between IP addresses and keys that is independent of any trusted security service. Expand
  • 92
  • 5
  • PDF
A framework integrating attribute-based policies into role-based access control
TLDR
This paper proposes a framework that uses attribute-based policies to create a more traditional RBAC model. Expand
  • 59
  • 5
  • PDF
...
1
2
3
4
5
...