2013 TCIPG Industry Workshop Poster Session
iHotel and Conference Center
1900 South First Street, Champaign, Illinois
November 6-7, 2013
Posters are organized by research cluster and listed alphabetically by poster title. Click on the links below to view 8.5" x 11" PDFs of the posters.
Fact Sheets for these activities are available by following the specific research activity link from the Reserach Page. A complete Fact Sheet Book from the poster session is also available.
- Trustworthy Technologies for Wide-Area Monitoring and Control
- Cryptographic Scalability in the Smart Grid
- Functional Security Enhancements for Existing SCADA Systems
Intrusion Detection Based on Verification of Hybrid Automata Models - GridStat Middleware Communication Framework: Application Requirements
Cyber-Power System Analysis Using a Real-Time Test Bed - GridStat Middleware Communication Framework: Management Security and Trust
Flexible Data Authentication Evaluated for the Smart Grid
Resilience of State Estimation using Hybrid SCADA and PMU Data - GridStat Middleware Communication Framework: Systematic Adaptation
Rate-Based Failure Detection for Mission-Critical Data Delivery - PMU Enhanced Power System Operations
- Real-time Streaming Data Processing Engine for Embedded Systems
- State-Aware Decentralized Database Systems for Smart Grid
Advances in Decentralized State Estimation for Power Systems - Trustworthy Time-Synchronous Measurement Systems
Pulse Coupled Oscillators Network Time and Access Protocol
- Trustworthy Technologies for Local Area Management, Monitoring, and Control
- Development of the Information Layer for the V2G Framework Implementation
Funding the Transportation Infrastructure in a V2G Environment - Password Changing Protocol
SCAPACH: Scalable Password-Changing Protocol
Secure Data Collection in Smart Grid - Smart-Grid-Enabled Distributed Voltage Support
- Trustworthy Framework for Mobile Smart Meters
- Development of the Information Layer for the V2G Framework Implementation
- Responding To and Managing Cyber Events
- A Game-Theoretic Intrustion Response and Recovery Engine
- Assessment and Forensics for Large-Scale Smart Grid Networks
- Detection/Interdiction of Malware Carried by Application-Layer AMI Protocols
- Intrusion Detection for Smart Grid Components by Leveraging of Real-Time Properties
- Specification-based IDS for Smart Meters
Amilyzer: IDS Sensor for AMI - Specification-based IDS for the DNP3 Protocol
- Trust Assessment
- 802.15.4/ZigBee Security Tools
Active Fingerprinting of IEEE 802.15.4/ZigBee Devices - Quantifying the Impacts on Reliability of Coupling between Power System Cyber and Physical Components
- Security and Robustness Evaluation and Enhancement of Power System Applications
Malicious Data Detection in State Estimation Leveraging System Losses & Estimation of Perturbed Parameters
Trustworthy Cloud Computing for Power - Synchrophasor Data Quality
Open-Box Phasor Measurement Unit (PMU)
Synchrophasor Data Quality on American Transmission Company's (ATC) Transmission System
NISTR 7628 Cyber Security Visualization - Tamper Event Detection Using Distributed SCADA Hardware
- Testbed-Driven Assessment: Experimental Validation of System Security and Reliability
- Trustworthiness Enhancement Tools for SCADA Software and Platforms
CrossingGuard: Protectiong Perimeter-Crossing Buses
Trusted Software Stack for Control Systems - Understanding and Mitigating the Impacts of GPS/GNSS Vulnerabilities
- 802.15.4/ZigBee Security Tools
- Cross-Cutting Efforts