Ontology type: schema:Chapter
2013
AUTHORSWilliam L. Sousan , Qiuming Zhu , Robin Gandhi , William Mahoney
ABSTRACTThe functionalities of a Smart Grid include the use of a network of power management devices to control the demand-based power distributions, dynamic pricing, reliable power quality monitoring, self-healing, and other customer services within the grid. However, by the very nature of these functions, there arises a great need for system security as the network connection offers would-be hostile attackers an ideal target. A protection mechanism that is adaptive and forward looking for the types of attacks that are unaccounted in terms of the latent system vulnerabilities is explored in this chapter. The method of learning normal operations and monitoring for abnormal operations has the potential for providing increased security and tamper detection within the grid. This chapter reviews present day state-of-the-art behavior monitoring and anomaly detection methods along with a presentation of a new method for learning event patterns and detecting anomalies for the purposes of tamper detection. More... »
PAGES99-115
Optimization and Security Challenges in Smart Power Grids
ISBN
978-3-642-38133-1
978-3-642-38134-8
http://scigraph.springernature.com/pub.10.1007/978-3-642-38134-8_5
DOIhttp://dx.doi.org/10.1007/978-3-642-38134-8_5
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1038274376
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Artificial Intelligence and Image Processing",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"name": [
"Technical Support Inc., Omaha, NE\u00a068137, USA"
],
"type": "Organization"
},
"familyName": "Sousan",
"givenName": "William L.",
"id": "sg:person.015234355535.15",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015234355535.15"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of Nebraska at Omaha",
"id": "https://www.grid.ac/institutes/grid.266815.e",
"name": [
"College of Information Science and Technology, University of Nebraska at Omaha, Omaha, NE\u00a068182, USA"
],
"type": "Organization"
},
"familyName": "Zhu",
"givenName": "Qiuming",
"id": "sg:person.01143445260.78",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143445260.78"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of Nebraska at Omaha",
"id": "https://www.grid.ac/institutes/grid.266815.e",
"name": [
"College of Information Science and Technology, University of Nebraska at Omaha, Omaha, NE\u00a068182, USA"
],
"type": "Organization"
},
"familyName": "Gandhi",
"givenName": "Robin",
"id": "sg:person.013455401330.47",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013455401330.47"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of Nebraska at Omaha",
"id": "https://www.grid.ac/institutes/grid.266815.e",
"name": [
"College of Information Science and Technology, University of Nebraska at Omaha, Omaha, NE\u00a068182, USA"
],
"type": "Organization"
},
"familyName": "Mahoney",
"givenName": "William",
"id": "sg:person.0667471260.00",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.0667471260.00"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1145/2179298.2179326",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1000050815"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-0-387-75462-8_12",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1025907742",
"https://doi.org/10.1007/978-0-387-75462-8_12"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-0-387-75462-8_12",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1025907742",
"https://doi.org/10.1007/978-0-387-75462-8_12"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/surv.2011.101911.00087",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1061446752"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/icectech.2011.5941927",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1094229332"
],
"type": "CreativeWork"
}
],
"datePublished": "2013",
"datePublishedReg": "2013-01-01",
"description": "The functionalities of a Smart Grid include the use of a network of power management devices to control the demand-based power distributions, dynamic pricing, reliable power quality monitoring, self-healing, and other customer services within the grid. However, by the very nature of these functions, there arises a great need for system security as the network connection offers would-be hostile attackers an ideal target. A protection mechanism that is adaptive and forward looking for the types of attacks that are unaccounted in terms of the latent system vulnerabilities is explored in this chapter. The method of learning normal operations and monitoring for abnormal operations has the potential for providing increased security and tamper detection within the grid. This chapter reviews present day state-of-the-art behavior monitoring and anomaly detection methods along with a presentation of a new method for learning event patterns and detecting anomalies for the purposes of tamper detection.",
"editor": [
{
"familyName": "Pappu",
"givenName": "Vijay",
"type": "Person"
},
{
"familyName": "Carvalho",
"givenName": "Marco",
"type": "Person"
},
{
"familyName": "Pardalos",
"givenName": "Panos",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-642-38134-8_5",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-3-642-38133-1",
"978-3-642-38134-8"
],
"name": "Optimization and Security Challenges in Smart Power Grids",
"type": "Book"
},
"name": "Smart Grid Tamper Detection Using Learned Event Patterns",
"pagination": "99-115",
"productId": [
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-642-38134-8_5"
]
},
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"b6536803a6204d6b37690ec6cbdff563fd951c2bc1c58a9c071b7f334f51ece2"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1038274376"
]
}
],
"publisher": {
"location": "Berlin, Heidelberg",
"name": "Springer Berlin Heidelberg",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-642-38134-8_5",
"https://app.dimensions.ai/details/publication/pub.1038274376"
],
"sdDataset": "chapters",
"sdDatePublished": "2019-04-15T17:02",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8678_00000065.jsonl",
"type": "Chapter",
"url": "http://link.springer.com/10.1007/978-3-642-38134-8_5"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38134-8_5'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38134-8_5'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38134-8_5'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38134-8_5'
This table displays all metadata directly associated to this object as RDF triples.
111 TRIPLES
23 PREDICATES
31 URIs
20 LITERALS
8 BLANK NODES