Follow
Uttam Adhikari
Title
Cited by
Cited by
Year
Developing a hybrid intrusion detection system using data mining for power systems
S Pan, T Morris, U Adhikari
IEEE Transactions on Smart Grid 6 (6), 3104-3113, 2015
4652015
Machine learning for power system disturbance and cyber-attack discrimination
RCB Hink, JM Beaver, MA Buckner, T Morris, U Adhikari, S Pan
2014 7th International symposium on resilient control systems (ISRCS), 1-8, 2014
3522014
Modeling cyber-physical vulnerability of the smart grid with incomplete information
A Srivastava, T Morris, T Ernster, C Vellaithurai, S Pan, U Adhikari
IEEE Transactions on Smart Grid 4 (1), 235-244, 2013
2152013
Classification of disturbances and cyber-attacks in power systems using heterogeneous time-synchronized data
S Pan, T Morris, U Adhikari
IEEE Transactions on Industrial Informatics 11 (3), 650-662, 2015
1612015
WAMS Cyber-Physical Test Bed for Power System, Cybersecurity Study, and Data Mining
U Adhikari, T MORRIS, S Pan
IEEE Transactions on Smart Grid, 1-11, 2016
1152016
Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification
U Adhikari, T Morris, S Pan
IEEE Transactions on Smart Grid, doi: 10.1109/TSG.2017.2647778, 2017
77*2017
A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System.
S Pan, TH Morris, U Adhikari
Int. J. Netw. Secur. 17 (2), 174-188, 2015
742015
Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection
U Adhikari, T Morris, S Pan
IEEE Transactions on Smart Grid, 10.1109/TSG.2016.2642787, 2016
652016
Cyber security recommendations for wide area monitoring, protection, and control systems
TH Morris, S Pan, U Adhikari
2012 IEEE power and energy society general meeting, 1-6, 2012
352012
Industrial control system (ICS) cyber attack datasets
U Adhikari, S Pan, T Morris, R Borges, J Beave
datasets used in the experimentation.[Online]. Available: https://sites …, 2019
342019
Development of power system test bed for data mining of synchrophasors data, cyber-attack and relay testing in RTDS
U Adhikari, TH Morris, N Dahal, S Pan, RL King, NH Younan, V Madani
2012 IEEE Power and Energy Society General Meeting, 1-7, 2012
332012
A cyber-physical power system test bed for intrusion detection systems
U Adhikari, TH Morris, S Pan
2014 IEEE PES General Meeting| Conference & Exposition, 1-5, 2014
312014
Causal event graphs cyber-physical system intrusion detection system
S Pan, TH Morris, U Adhikari, V Madani
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
202013
A relaxation-based network decomposition algorithm for parallel transient stability simulation with improved convergence
J Shi, B Sullivan, M Mazzola, B Saravi, U Adhikari, T Haupt
IEEE Transactions on Parallel and Distributed Systems 29 (3), 496-511, 2017
192017
Event and intrusion detection systems for cyber-physical power systems
U Adhikari
Mississippi State University, 2015
132015
Protocol mutation intrusion detection for synchrophasor communications
R Sprabery, TH Morris, S Pan, U Adhikari, V Madani
Proceedings of the Eighth Annual Cyber Security and Information Intelligence …, 2013
132013
A causal event graph for cyber-power system events using synchrophasor
U Adhikari, TH Morris, S Pan
2014 IEEE PES General Meeting| Conference & Exposition, 1-5, 2014
112014
Cyber security testing and intrusion detection for synchrophasor systems
T Morris, S Pan, U Adhikari, N Younan, R King, V Madani
International Journal of Network Science 1 (1), 28-52, 2016
92016
Improving the accuracy of clustering electric utility net load data using dynamic time warping
JR Ausmus, PKPK Sen, T Wu, U Adhikari, Y Zhang, V Krishnan
2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D), 1-5, 2020
52020
Phasor measurement unit and phasor data concentrator cyber security
TH Morris, S Pan, U Adhikari, N Younan, R King, V Madani
Optimization and Security Challenges in Smart Power Grids, 141-159, 2013
42013
The system can't perform the operation now. Try again later.
Articles 1–20