Conferences related to Cyber-attack

Back to Top

2020 59th IEEE Conference on Decision and Control (CDC)

The CDC is the premier conference dedicated to the advancement of the theory and practice of systems and control. The CDC annually brings together an international community of researchers and practitioners in the field of automatic control to discuss new research results, perspectives on future developments, and innovative applications relevant to decision making, automatic control, and related areas.


2020 IEEE 23rd International Conference on Information Fusion (FUSION)

The International Conference on Information Fusion is the premier forum for interchange of the latest research in data and information fusion, and its impacts on our society. The conference brings together researchers and practitioners from academia and industry to report on the latest scientific and technical advances.


2020 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


2020 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

Innovative Smart Grid Technologies

  • 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Innovative Smart Grid Technologies

  • 2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Forum for participants to discuss state of the art innovations in Smart Grid Technologies and will feature plenary and panel sessions as well as technical paper presentations and poster sessions.

  • 2017 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Forum for participants to discuss state of the art innovations in smart grid technologies and will feature plenary and panel sessions as well as technical paper presentations and poster sessions

  • 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    The Conference will be a forum for participants to discuss state-of-the-art innovations in smart grid technologies and will feature plenary and panel sessions as well as technical paper presentations and poster sessions.

  • 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; - Energy MgmtSystems (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2014 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2013 IEEE PES Innovative Smart Grid Technologies (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2012 IEEE PES Innovative Smart Grid Technologies (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2011 IEEE PES Innovative Smart Grid Technologies (ISGT)

    Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and more.

  • 2010 Innovative Smart Grid Technologies (ISGT)

    -Power and Energy System Applications (generation, transmission, distribution, distribution, markets, operations, and planning) - Cyber and Physical Security Systems (Intelligent Monitoring and Outage Management)-Smart Sensing, Communication, and Control in Energy Systems; - Wireless Communications and Advanced Metering Infrastructure; -Energy Mgmt Systmes (with applications to buildings and home automation); - Interdependent Energy Infrastructures (with applications to gas, water, transportation, and telec


2019 14th Annual Conference System of Systems Engineering (SoSE)

IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the 14th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is “Internet of Things as System of Systems”. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2018 13th Annual Conference on System of Systems Engineering (SoSE)

    SoSE is the main conference on Systems of Systems, defined as complex systems created by the systematic and dynamic assembly of various interacting sub-systems. The 2018 conference theme is “Systems of systems Management and Control: Frontiers between cyber, physical, and social systems”.

  • 2017 12th System of Systems Engineering Conference (SoSE)

    Internet of Things as System of Systems

  • 2016 11th System of Systems Engineering Conference (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the Eleventhth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, maritime, energy, environment, healthcare, and transportation. The conference theme is "SoSE and Cyber Physical Systems (CPS), from academia to application and back" We welcome papers on theories, methodologies, and applications of SoSE and CPS in science, technology, industry, and education. Particularly those that deal with the interaction between research institutes, industry, funding and policy makers. What can we do to stimulate both knowledge creation and economic value? Papers should be five to six pages in length, in standard two-column IEEE Conference Proceedings format.

  • 2015 10th System of Systems Engineering Conference (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the Sixth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is “SoSE Controls, Modeling, and Simulation” three areas of significant investment within the public and private sectors as well as being significant initiatives areas of IEEE. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2014 9th International Conference on System of Systems Engineering (SOSE)

    Sociotechnical Aspects of SoSE; The Nexus between Complex Systems Concepts and SoSE; SoSE Application Domains and Case Studies; Open Cloud Computing; SoSE Approaches, Tools, Methods and Processes; SoSE modelling, simulation & and analysis; Entrepreneurship.

  • 2013 8th International Conference on System of Systems Engineering (SoSE)

    IEEE System, Man, and Cybernetics Society and IEEE Reliability Society announce the 8th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is

  • 2012 7th International Conference on System of Systems Engineering (SoSE)

    The conference theme is SoSE in cooperative and competitive distributed decision making in complex dynamic systems , focusing on SoSE control and simulation methodologies to support decisions in different application fields, among others transport, energy, industrial and environmental risk management. Papers on theories, methodologies, and applications of System of Systems Engineering in science, technology, industry, and education are welcome.

  • 2011 6th International Conference on System of Systems Engineering (SoSE)

    the Sixth International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is SoSE in Cloud Computing, Smart Grid, and Cyber Security, three areas of significant investment within the public and private sectors as well

  • 2010 5th International Conference on System of Systems Engineering (SoSE)

    The 5th International Conference on System of Systems Engineering (SoSE) covers engineering fields such as control, computing, communication, information technology and the applications to manufacturing, defense, national and homeland security, aerospace, aeronautics, energy, environment, transport.

  • 2009 IEEE International Conference on System of Systems Engineering (SoSE)

    SYSTEM OF SYSTEMS, ARCHITECHTURE, MODLEING, SIMULATION, EMERGENCE, ENGINEERING, CONTROL, APPLICATION IN DEFENSE, ENERGY, SECURITY, SPACE, AERONAUTICS, MANUFACTURING, EARTH OBSERVATION, WATER RESOURCES, ETC.

  • 2008 IEEE International Conference on System of Systems Engineering (SoSE)

    Various concepts and fundamental theories and applications of system of systems and SoS Engineering will be discussed in this meeting. This is the 3rd of its sereis.

  • 2007 IEEE International Conference on System of Systems Engineering (SoSE)

  • 2006 IEEE/SMC International Conference on System of Systems Engineering (SoSE)


More Conferences

Periodicals related to Cyber-attack

Back to Top

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Industrial Informatics, IEEE Transactions on

IEEE Transactions on Industrial Informatics focuses on knowledge-based factory automation as a means to enhance industrial fabrication and manufacturing processes. This embraces a collection of techniques that use information analysis, manipulation, and distribution to achieve higher efficiency, effectiveness, reliability, and/or security within the industrial environment. The scope of the Transaction includes reporting, defining, providing a forum for discourse, and informing ...


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Parallel and Distributed Systems, IEEE Transactions on

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. Topic areas include, but are not limited to the following: a) architectures: design, analysis, and implementation of multiple-processor systems (including multi-processors, multicomputers, and networks); impact of VLSI on system design; interprocessor communications; b) software: parallel languages and compilers; scheduling and task partitioning; databases, operating systems, and programming environments for ...


More Periodicals

Most published Xplore authors for Cyber-attack

Back to Top

Xplore Articles related to Cyber-attack

Back to Top

A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging

2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2016

Cyber-attack incidents have become more and more frequent and serious. As a countermeasure against cyber-attacks, the technology of (IP address etc.) trace-back to the attackers is essential. Although many methods have been proposed for this purpose, the existing techniques suffer from the following problems. Only the specific attacks can be traced back. The tracing back is too time-consuming and correct ...


Research on the Modeling and Simulation on C4ISR System Structure Effect under Cyber Attack Condition

2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), 2015

Considering the problem generated by cyber attack threat on C4ISR system structure, a modeling and simulation method on C4ISR system structure effect based on statistical parameter of complex network is proposed. Firstly, the concept about C4ISR system structure effect is first presented, and two different structure effects are proposed: system structure damaged effect and structure efficiency reduction effect, Secondly, the ...


A cyber-attack on communication link in distributed systems and detection scheme based on H-infinity filtering

2017 IEEE International Conference on Industrial Technology (ICIT), 2017

In this paper, a new cyber-attack is proposed for distributed systems, while detection of such an attack is recommended based on H-infinity filtering. In particular, we study the effect of a specific attack on the communication links between local control centers. Today's cyber-physical systems are complex and large scale, so that they are distributed over a large area. Using distributed ...


Impact of cyber-attack on isolated power system

2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), 2016

In this modern era of civilization demand of electricity from interconnected grid system is increasing day by day. That is why improving the reliability of the power system has become the main concern to the experts. This article investigates the impact of cyber-attack on an isolated power station in frequency disturbing aspects during sudden changes of load of the system. ...


Mitigation of frequency disturbance in power systems during cyber-attack

2016 2nd International Conference on Electrical, Computer & Telecommunication Engineering (ICECTE), 2016

This article investigates the impact of cyber-attack on a power station in frequency disturbing aspects during sudden changes of load of the system and proposes a solution method to make it stable. Stable limit of the speed regulation for load frequency control (LFC) and integral controller gain for automatic generation control (AGC) is derived from their characteristic equations. Depending upon ...


More Xplore Articles

Educational Resources on Cyber-attack

Back to Top

IEEE-USA E-Books

  • A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging

    Cyber-attack incidents have become more and more frequent and serious. As a countermeasure against cyber-attacks, the technology of (IP address etc.) trace-back to the attackers is essential. Although many methods have been proposed for this purpose, the existing techniques suffer from the following problems. Only the specific attacks can be traced back. The tracing back is too time-consuming and correct traffic-path reconfiguration cannot be guaranteed. In this study, we propose a new method to discover attackers quickly and correctly. By using simulation data, its performance is demonstrated.

  • Research on the Modeling and Simulation on C4ISR System Structure Effect under Cyber Attack Condition

    Considering the problem generated by cyber attack threat on C4ISR system structure, a modeling and simulation method on C4ISR system structure effect based on statistical parameter of complex network is proposed. Firstly, the concept about C4ISR system structure effect is first presented, and two different structure effects are proposed: system structure damaged effect and structure efficiency reduction effect, Secondly, the cyber attack means faced by wired Network and battle wireless network are analyzed, then revealing the generation mechanism of system structure effect, and the system structure attack modeling is also established, Thridly, according to the system structure connectivity and running efficient, the math modeling is established on system structure effect based on connectivity rate, connectivity coefficient and information efficiency parameters. Finally, in the simulation environment, considering the area joint air defense combat command information system as the experiment object, the system structure effect test is developed according to set different attack strategy.

  • A cyber-attack on communication link in distributed systems and detection scheme based on H-infinity filtering

    In this paper, a new cyber-attack is proposed for distributed systems, while detection of such an attack is recommended based on H-infinity filtering. In particular, we study the effect of a specific attack on the communication links between local control centers. Today's cyber-physical systems are complex and large scale, so that they are distributed over a large area. Using distributed control and monitoring centers for such systems results in great advantages. However, cyber-attacks on distributed systems should be considered seriously. First, we address a novel cyber-attack scheme, which employs both the sensor signals and communication links between monitoring centers. Then, the detection scheme for the proposed attack is introduced from an operator point of view. The proposed schemes are simulated in a distributed power system based on IEEE standard test benches. The simulation results show the feasibility of the proposed attack and detection schemes.

  • Impact of cyber-attack on isolated power system

    In this modern era of civilization demand of electricity from interconnected grid system is increasing day by day. That is why improving the reliability of the power system has become the main concern to the experts. This article investigates the impact of cyber-attack on an isolated power station in frequency disturbing aspects during sudden changes of load of the system. Stable limit of the speed regulation for load frequency control (LFC) and integral controller gain for automatic generation control (AGC) is derived from their characteristic equations. Depending upon the nature of cyber-attack (positive biased attack or negative biased attack) simulation curves are developed to show the frequency deviations and oscillations of the power system. Most severe attack is also characterized to protect power system from unstable situation.

  • Mitigation of frequency disturbance in power systems during cyber-attack

    This article investigates the impact of cyber-attack on a power station in frequency disturbing aspects during sudden changes of load of the system and proposes a solution method to make it stable. Stable limit of the speed regulation for load frequency control (LFC) and integral controller gain for automatic generation control (AGC) is derived from their characteristic equations. Depending upon the nature of cyber-attack (positive biased or negative biased attack) simulations are performed to show the frequency deviations and oscillations of the power system. Finally a feedback LFC block with a three input switch is designed to remove these oscillations.

  • Cyber-Attack on Overloading Multiple Lines: A Bilevel Mixed-Integer Linear Programming Model

    In this letter, we propose a bilevel mixed-integer linear programming (BMILP) model for cyber-attack on multiple transmission lines in economic dispatch by injecting false load data. In contrast to the state of art research, the proposed model is able to overload a set of lines that are selected by the attacker in the framework of BMILP. Therefore, the proposed model is computationally efficient due to its bilevel linear programming property. The effectiveness of the proposed bilevel linear approach has been successfully validated on an IEEE 118-bus system.

  • An overview of cyber-attack vectors on SCADA systems

    Most of the countries evaluate their energy networks in terms of national security and define as critical infrastructure. Monitoring and controlling of these systems are generally provided by Industrial Control Systems (ICSs) and/or Supervisory Control and Data Acquisition (SCADA) systems. Therefore, this study focuses on the cyber-attack vectors on SCADA systems to research the threats and risks targeting them. For this purpose, TCP/IP based protocols used in SCADA systems have been determined and analyzed at first. Then, the most common cyber-attacks are handled systematically considering hardware-side threats, software-side ones and the threats for communication infrastructures. Finally, some suggestions are given.

  • Severe Cyber Attack for Maximizing the Total Loadings of Large-Scale Attacked Branches

    In this letter, a bilevel linear programming model is proposed to reveal the severe cyber-attack scheme in economic dispatch. By using this model, not only many branches including the targeted ones can be overloaded, but also the total loadings of all overloaded branches are maximized. This is a serious attack, since large power flows will be redistributed and it could further cause overloaded branches if those attacked branches are tripped due to overloading. Simulations on the IEEE 57-bus system show that the proposed model can successfully overload many branches including the targeted ones and maximize the total loadings of all overloaded branches.

  • An Ensemble Approach for Cyber Attack Detection System: A Generic Framework

    Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources. The fact is that no single classifier able to give maximum accuracy for all the five classes (Normal, Probe, DOS, U2R and R2L). We have proposed a Cyber Attack Detection System (CADS) and its generic framework, which performs well for all the classes. This is based on Generalized Discriminant Analysis (GDA) algorithm for feature reduction of the cyber attack dataset and an ensemble approach of classifiers for classification of cyber attacks. The ensemble approach of classifiers classifies cyber attack based on the union of the subsets of features. Thus it can detect a wider range of attacks. The C4.5 and improved Support Vector Machine (iSVM) classifiers are combined as a hierarchical hybrid classifier (C4.5-iSVM) and an ensemble approach combining the individual base classifiers and hybrid classifier for best classification of cyber attacks. The experimental results illustrate that the proposed Cyber Attack Detection System is having improved detection accuracy for all the classes of attacks.

  • A generic cyber attack response resource risk assessment model

    Summary form only given. Managers must make decisions based on limited budgets on how best to protect their networks. Resources should be allocated across three different areas: Protect, Detect, and Response. Often what might seem as an obvious solution is not the best solution for resource allocation and networks. A model using logistic regression can help a manager determine the level of probability, based on the allocation of resources, organization objectives and certain attack characteristics that the network will be within an acceptable level of risk.



Standards related to Cyber-attack

Back to Top

No standards are currently tagged "Cyber-attack"


Jobs related to Cyber-attack

Back to Top