<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/803/Feasibility-and-mitigation-of-false-data-injection-attacks-in-smart-grid">
		<rdfs:label><![CDATA[Feasibility and mitigation of false data injection attacks in smart grid]]></rdfs:label>
		<pub:title><![CDATA[Feasibility and mitigation of false data injection attacks in smart grid]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-03-04T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[The power grid is evolving rapidly. With the addition of micro-grids and renewable energy resources, and increasing automation in decision-making enabled by sensors, the grid has become very complex. Research in the area of smart grids shows that the grid is vulnerable to cyber-attacks. In particular, recent studies reveals how false data injection could lead to variety of problems in the smart grid operation. A well-crafted attack can pass the bad data detection systems during state estimation and affect the operation and control of the power grid. In this paper, we build on prior efforts in this space to describe how false data injection attacks can be alleviated using conventional techniques by protecting certain critical sensors in the power system. The feasibility of false data injection attacks with incomplete network knowledge is explained in this paper considering IEEE 14 bus test system. The assumptions for defining the attacking region are also validated with the help of different case studies. This paper depicts the importance of securing the power grid against cyber-attacks.]]></pub:abstract>
		<pub:counter>1172</pub:counter>
		<pub:tag><![CDATA[mathematical model]]></pub:tag>
		<pub:tag><![CDATA[measurement uncertainty]]></pub:tag>
		<pub:tag><![CDATA[power measurement]]></pub:tag>
		<pub:tag><![CDATA[sensors]]></pub:tag>
		<pub:tag><![CDATA[smart grids]]></pub:tag>
		<pub:tag><![CDATA[state estimation]]></pub:tag>
		<pub:booktitle><![CDATA[IEEE 6th International Conference on Power Systems (ICPS), 2016 ]]></pub:booktitle>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Kush/Khanna"><person:name><![CDATA[Kush Khanna]]></person:name><rdfs:label><![CDATA[Kush Khanna]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest rdf:resource="&rdf;nil" />
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/866.pdf]]></pub:softCopyURI>
			<pub:softCopySize>186476</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:InProceedings>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
