<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=generators">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=generators]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for generators]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/177/Tracking-Influence-and-Opinions-in-Social-Media"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/801/Bi-level-Modelling-of-False-Data-Injection-Attacks-on-Security-Constrained-Optimal-Power-Flow"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/802/Bid-Modification-Attack-in-Smart-Grid-for-Monetary-Benefits"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/177/Tracking-Influence-and-Opinions-in-Social-Media">
  <title><![CDATA[Tracking Influence and Opinions in Social Media]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/177/Tracking-Influence-and-Opinions-in-Social-Media</link>
  <description><![CDATA[Social Media such as blogs, wikis, formus and user-generated content
sites like flickr,
delicious and youtube have become both a source of information and
entertainment.
The size of audience that these sites currently yield is already rivaling
traditional main stream media sources like television, newspapers and
magazines.
Blogs, especially, have been reported to play a notable role in
influencing the buying patterns of consumers. Often a buyer looks for
opinions, user experiences an...]]></description>
  <dc:date>2006-10-03</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/801/Bi-level-Modelling-of-False-Data-Injection-Attacks-on-Security-Constrained-Optimal-Power-Flow">
  <title><![CDATA[Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/801/Bi-level-Modelling-of-False-Data-Injection-Attacks-on-Security-Constrained-Optimal-Power-Flow</link>
  <description><![CDATA[Conventional power system was originally designed to provide efficient and reliable power. With the integration of information technology and advanced metering infrastructure, the power grid has become smart. The smart meters have allowed the system operators to continuously monitor the power system in real time and take necessary action to avoid system failures. Malicious actor, with access to the smart meters can modify sensor measurements to disrupt the operation of power system. To make t...]]></description>
  <dc:date>2017-06-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/802/Bid-Modification-Attack-in-Smart-Grid-for-Monetary-Benefits">
  <title><![CDATA[Bid Modification Attack in Smart Grid for Monetary Benefits]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/802/Bid-Modification-Attack-in-Smart-Grid-for-Monetary-Benefits</link>
  <description><![CDATA[In the quest for reliability and automation, the entire smart grid operation and control depends on the communication infrastructure. This reliance on the information and communication technologies has also opened up possibilities of cyber intrusions. In this paper, a bid modification attack on the power exchange server is presented with the aim of gaining monetary benefits in the real-time power market. The attack is modelled for PJM 5 bus and IEEE 14 bus test system. The minimum number of l...]]></description>
  <dc:date>2016-12-19</dc:date>
 </item>
</rdf:RDF>
