<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/804/On-Detecting-False-Data-Injection-with-Limited-Network-Information-using-Statistical-Techniques">
		<rdfs:label><![CDATA[On Detecting False Data Injection with Limited Network Information using Statistical Techniques]]></rdfs:label>
		<pub:title><![CDATA[On Detecting False Data Injection with Limited Network Information using Statistical Techniques]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-11-30T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[Abstract—Cyber-attacks poses a serious threat to power system operation. False data injection attack (FDIA) is one such severe threat, if wisely constructed, can cause flawed estimation of power system states, thereby, leading to uneconomical and unsecured operation of power system. In recent years many methods are proposed to secure the smart grid against malicious cyber-events by protecting certain critical measurement sensors. However, making a system completely hack-proof is rather idealistic. In this paper, in addition to the research carried out in this space, we present a new Log transformation based method to detect the FDIA in real time with high probability. The detection probability of the proposed scheme is compared with existing method using IEEE 14 bus system.]]></pub:abstract>
		<pub:counter>1133</pub:counter>
		<pub:tag><![CDATA[cyber security]]></pub:tag>
		<pub:tag><![CDATA[false data injection]]></pub:tag>
		<pub:tag><![CDATA[kullback-
leibler distance]]></pub:tag>
		<pub:tag><![CDATA[log transformation]]></pub:tag>
		<pub:tag><![CDATA[smart grid.]]></pub:tag>
		<pub:booktitle><![CDATA[IEEE Power and Energy Society General Meeting, Chicago, 2017]]></pub:booktitle>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Kush/Khanna"><person:name><![CDATA[Kush Khanna]]></person:name><rdfs:label><![CDATA[Kush Khanna]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Ranjan/Bose"><person:name><![CDATA[Ranjan Bose]]></person:name><rdfs:label><![CDATA[Ranjan Bose]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest rdf:resource="&rdf;nil" />
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/867.pdf]]></pub:softCopyURI>
			<pub:softCopySize>186301</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:InProceedings>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
