Channel Avatar

tcipgvideo @UCz7tarhD3LJR4QaIBI6xj3Q@youtube.com

418 subscribers - no pronouns :c

www.tcipg.org


07:29
TCIPG Industry Workshop Research Presentation: K-Time Signatures for Smartgrid Multicast
08:04
TCIPG Industry Workshop Research Presentation: TEDDI
08:51
TCIPG Industry Workshop Presentation: Specification-Based IDS for the DNP3 Protocol
10:23
TCIPG Industry Workshop Research Presentation: Robust GPS-Based Timing for PMUs
11:29
TCIPG Cross-Cutting Overview: Testbeds
13:27
TCIPG Cross-Cutting Overview: Education and Engagement
15:35
TCIPG Research Cluster Overview: Trust Assessment
10:29
TCIPG Research Cluster Overview: Cyber Events
10:27
TCIPG Research Cluster Overview: Local-Area Security
09:43
TCIPG Research Cluster Overview: Wide-Area Security
01:01:39
Our Cyber Security History and Future
59:31
On the Cybersecurity of Control Systems and Applications
58:23
Sparking Interest in Smart Grid Stuff
01:02:09
Electric Vehicles and Their Impact on Trustworthy Power Grid Informatics
01:06:40
How Would We Know?
56:07
Experience with Implementing Cybersecurity in a G&T Cooperative
15:29
LANL QKD Demonstration in TCIPG Lab
13:51
TCIPG Industry Workshop Demo: Federated Simulations
07:59
TCIPG Industry Workshop Demo: Data Injection Attacks and Prevention
10:18
TCIPG Industry Workshop Demo: Functional Security Enhancements
08:26
TCIPG Industry Workshop Demo: Zigbee Tools
58:22
GPS-Based Timing for Power System Applications: Vulnerabilities and Mitigation Strategies
01:00:20
Computational Game Theory for Security
58:21
Smart Grid Research from a Utility Perspective
01:01:35
Securing the Electric Grid with Common Cyber Security Services
01:00:57
A Trusted Safety Verifier for Cyber-Physical Control Systems
01:00:08
Dynamic Data Attacks on Real-Time Power System Operations
01:01:36
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grid
01:02:36
Interoperability and Cybersecurity in the Smart Grid
58:55
Transactive Control in the Pacific Northwest Smart Grid Demonstration
01:05:56
Challenges and Opportunities in Implementing a Security Development Lifecycle
01:01:01
Enabling Insecurity: Bringing the tools and techniques from IT to control systems
59:18
Smart Grid Cybersecurity Lessons Learned From More Than 11 Million Smart Meters Deployed
52:52
From NetAPT to NP-View, A Case Study in Transferring Technology from Academia to Industry
01:03:08
A Complex Network View of the Grid
58:14
Exelon Smart Grid Multi-Service Communications Architecture
54:38
How Extended Unix Tools Can Measure the Changing Security Posture of Power-Control Networks
56:04
Cyber-physical Models of Power System State Estimation Security
01:02:54
CyberSecurity of Field Equipment of SCADA
01:01:56
Simulation & Emulation in Smart Grid Assessment
01:06:49
Power Grid Impacts Resulting From Unintentional Demand Response
55:59
ERDC-CERL Microgrids at Fixed Installations: Security and Economics
01:01:56
Ground Truth Competency Assessment for Smart Grid Cyber Security
59:38
Overview of Distribution Grid Synchronous Measurement and Applications
01:05:29
Computation of Margins to Power System Loadability Limits Using Phasor Measurement Unit Data
58:18
The Genesis of the August 14th 2003 Blackout: The Grid, Math, Humans, and Trees
01:07:35
Making Sound Design Decisions Using Quantitative Security Metrics
01:01:15
Dealing with Your Smart Grid Insecurities
54:46
Secure Control of Cyber-Physical Systems
50:39
The Changing Threats to Power Metering
01:05:23
Cybersecurity Challenges as Learned Working with NERC CIP Requirements
59:21
Cyber-Physical Systems Security of Power Grid: Risk Modeling and Mitigation
58:46
NIST and the Smart Grid
01:05:37
Power System Driven Hardware in the Loop Simulations
58:15
Cyber-Physical Security for the Smart Grid
01:03:24
Wide-Area Modeling, Monitoring & Control of Large Power Systems Using PMU Technology
59:12
TCIPG Highlights: Past, Present, and Future
14:18
Real Time Cyber Power System Analysis
05:37
Automated Cyber-Physical Simulation Using Standardized Models
07:07
Enabling Response and Recovery in Watchdog (Software Defined Networking)