• Login
    Search 
    •   Maryland Shared Open Access Repository Home
    • ScholarWorks@UMBC
    • Search
    •   Maryland Shared Open Access Repository Home
    • ScholarWorks@UMBC
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-10 of 259

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    AI based approach to identify compromised meters in data integrity attacks on smart grid 

    Khanna, Kush; Panigrahi, Bijaya Ketan; Joshi, Anupam (IET, 2017-10-02)
    False data injection attacks can pose serious threats to the operation and control of power grid. The smarter the power grid gets, the more vulnerable it becomes to cyber attacks. Various detection methods of cyber attacks ...
    Thumbnail

    Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow 

    Khanna, Kush; Joshi, Anupam; Panigrahi, Bijaya Ketan (IET, 2017-06-12)
    Conventional power system was originally designed to provide efficient and reliable power. With the integration of information technology and advanced metering infrastructure, the power grid has become smart. The smart ...
    Thumbnail

    Entropy-based electricity theft detection in AMI network 

    Singh, Sandeep Kumar; Bose, Ranjan; Joshi, Anupam (IET, 2018-08-31)
    Advanced metering infrastructure (AMI), one of the prime components of the smart grid, has many benefits like demand response and load management. Electricity theft, a key concern in AMI security since smart meters used ...
    Thumbnail

    On Detecting False Data Injection with Limited Network Information using Statistical Techniques 

    Khanna, Kush; Bose, Ranjan; Joshi, Anupam (IEEE, 2018-02-01)
    Cyber-attacks poses a serious threat to power system operation. False data injection attack (FDIA) is one such severe threat, if wisely constructed, can cause flawed estimation of power system states, thereby, leading to ...
    Thumbnail

    Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model 

    Chopra, Khyati; Bose, Ranjan; Joshi, Anupam (2017-05-31)
    Abstract—In this paper, we consider a source, which communicates to destination, with cooperation of a relay node. An eavesdropper is tapping the second hop, when all the links undergo Rayleigh fading. Relay nodes are the ...
    Thumbnail

    Joint transformation based detection of false data injection attacks in smart grid 

    Singh, Sandeep Kumar; Khanna, Kush; Bose, Ranjan; Joshi, Anupam (IEEE, 2017-06-28)
    For reliable operation and control of smart grid, estimating the correct states is of utmost importance to the system operator. With recent incorporation of information technology and advanced metering infrastructure, the ...
    Thumbnail

    Bid Modification Attack in Smart Grid for Monetary Benefits 

    Khanna, Kush; Joshi, Anupam; Panigrahi, Bijaya Ketan (IEEE, 2016-12-19)
    In the quest for reliability and automation, the entire smart grid operation and control depends on the communication infrastructure. This reliance on the information and communication technologies has also opened up ...
    Thumbnail

    A Question and Answering System for Management of Cloud Service Level Agreements 

    Mittal, Sudip; Gupta, Aditi; Joshi, Karuna P.; Pearce, Claudia; Joshi, Anupam (IEEE, 2017-09-11)
    One of the key challenges faced by consumers is to efficiently manage and monitor the quality of cloud services. To manage service performance, consumers have to validate rules embedded in cloud legal contracts, such as ...
    Thumbnail

    App behavioral analysis using system calls 

    Das, Prajit Kumar; Joshi, Anupam; Finin, Tim (IEEE, 2017-05-01)
    System calls provide an interface to the services made available by an operating system. As a result, any functionality provided by a software application eventually reduces to a set of fixed system calls. Since system ...
    Thumbnail

    Preserving User Privacy and Security in Context-Aware Mobile Platforms 

    Das, Prajit Kumar; Ghosh, Dibyajyoti; Jagtap, Pramod; Joshi, Anupam; Finin, Tim (IGA Global, 2016-10-31)
    Contemporary smartphones are capable of generating and transmitting large amounts of data about their users. Recent advances in collaborative context modeling combined with a lack of adequate permission model for handling ...
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 26


    Albin O. Kuhn Library & Gallery
    University of Maryland, Baltimore County
    1000 Hilltop Circle
    Baltimore, MD 21250
    www.umbc.edu/scholarworks

    Contact information:
    Email: scholarworks-group@umbc.edu
    Phone: 410-455-3021


    If you wish to submit a copyright complaint or withdrawal request, please email mdsoar-help@umd.edu.

     

     

    My Account

    LoginRegister

    Browse

    This CommunityBy Issue DateTitlesAuthorsSubjectsType

    Discover

    Author
    Joshi, Anupam (259)
    Finin, Tim (146)Yesha, Yelena (38)Mittal, Sudip (31)Perich, Filip (26)Kagal, Lalana (22)Chakraborty, Dipanjan (20)Chen, Harry (15)Das, Prajit Kumar (14)Joshi, Karuna Pande (14)... View MoreSubjectUMBC Ebiquity Research Group (236)semantic web (36)pervasive computing (18)security (17)Semantic Web (13)mobile computing (12)ontology (12)cybersecurity (10)policy (10)linked data (8)... View MoreDate Issued2020 - 2022 (19)2010 - 2019 (100)2000 - 2009 (126)1999 - 1999 (4)Has File(s)Yes (207)No (52)


    Albin O. Kuhn Library & Gallery
    University of Maryland, Baltimore County
    1000 Hilltop Circle
    Baltimore, MD 21250
    www.umbc.edu/scholarworks

    Contact information:
    Email: scholarworks-group@umbc.edu
    Phone: 410-455-3021


    If you wish to submit a copyright complaint or withdrawal request, please email mdsoar-help@umd.edu.