Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- AGC (1)
- Attribute Based Encryption (1)
- Automatic Generation Control (1)
- Blockchain (1)
- Chosen plaintext attack (CPA) (1)
-
- Cloud-Assisted Systems (1)
- Cyber attacks (1)
- Data privacy (1)
- Decentralized Authentication (1)
- Electric power (1)
- Fair exchange (1)
- Fog Federation (1)
- Geometric Programming (GP) (1)
- Gradient projection method (GPM) (1)
- Grid-connected devices (1)
- Heterogeneous architectures (1)
- Intrusion detection models (1)
- Key control system (1)
- LSTM autoencoder (1)
- Logistic regression (1)
- Machine learning (1)
- Malicious Fog Node (1)
- Mathematical optimization (1)
- Neural network models (1)
- Power generation (1)
- Power system (1)
- Recurrent neural network (1)
- Rogue Node (1)
- Threat model (1)
- User data (1)
Articles 1 - 4 of 4
Full-Text Articles in Computer Engineering
Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao
Privacy-Preserving Cloud-Assisted Data Analytics, Wei Bao
Graduate Theses and Dissertations
Nowadays industries are collecting a massive and exponentially growing amount of data that can be utilized to extract useful insights for improving various aspects of our life. Data analytics (e.g., via the use of machine learning) has been extensively applied to make important decisions in various real world applications. However, it is challenging for resource-limited clients to analyze their data in an efficient way when its scale is large. Additionally, the data resources are increasingly distributed among different owners. Nonetheless, users' data may contain private information that needs to be protected.
Cloud computing has become more and more popular in …
Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri
Securing Fog Federation From Behavior Of Rogue Nodes, Mohammed Saleh H. Alshehri
Graduate Theses and Dissertations
As the technological revolution advanced information security evolved with an increased need for confidential data protection on the internet. Individuals and organizations typically prefer outsourcing their confidential data to the cloud for processing and storage. As promising as the cloud computing paradigm is, it creates challenges; everything from data security to time latency issues with data computation and delivery to end-users. In response to these challenges CISCO introduced the fog computing paradigm in 2012. The intent was to overcome issues such as time latency and communication overhead and to bring computing and storage resources close to the ground and the …
Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi
Data Forgery Detection In Automatic Generation Control: Exploration Of Automated Parameter Generation And Low-Rate Attacks, Yatish R. Dubasi
Computer Science and Computer Engineering Undergraduate Honors Theses
Automatic Generation Control (AGC) is a key control system utilized in electric power systems. AGC uses frequency and tie-line power flow measurements to determine the Area Control Error (ACE). ACE is then used by the AGC to adjust power generation and maintain an acceptable power system frequency. Attackers might inject false frequency and/or tie-line power flow measurements to mislead AGC into falsely adjusting power generation, which can harm power system operations. Various data forgery detection models are studied in this thesis. First, to make the use of predictive detection models easier for users, we propose a method for automated generation …
Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan
Development Of A Reference Design For Intrusion Detection Using Neural Networks For A Smart Inverter, Ammar Mohammad Khan
Graduate Theses and Dissertations
The purpose of this thesis is to develop a reference design for a base level implementation of an intrusion detection module using artificial neural networks that is deployed onto an inverter and runs on live data for cybersecurity purposes, leveraging the latest deep learning algorithms and tools. Cybersecurity in the smart grid industry focuses on maintaining optimal standards of security in the system and a key component of this is being able to detect cyberattacks. Although researchers and engineers aim to design such devices with embedded security, attacks can and do still occur. The foundation for eventually mitigating these attacks …