scispace - formally typeset
Search or ask a question
Author

Chen-Ching Liu

Bio: Chen-Ching Liu is an academic researcher from Virginia Tech. The author has contributed to research in topics: Electric power system & Electricity market. The author has an hindex of 57, co-authored 269 publications receiving 12126 citations. Previous affiliations of Chen-Ching Liu include Washington State University & Purdue University.


Papers
More filters
Proceedings ArticleDOI
01 Oct 2014
TL;DR: A novel cybersecurity protection scheme using network firewall technology operated at the application layer to enhance the information protection in SCADA networks is proposed and the feasibility of the proposed scheme for enhancing information security of the substations is demonstrated.
Abstract: Cybersecurity issues have raised concerns as potential loopholes exist in the Supervisory Control And Data Acquisition (SCADA) system when the system architecture moved from a proprietary to an open system. As a result of the interdependency between the power grids and SCADA communication networks, it is important to further strengthen the defense of cyber networks against malicious intrusions. The focus of this research is to model and evaluate a novel cybersecurity protection scheme using network firewall technology operated at the application layer to enhance the information protection in SCADA networks. A quantitative analysis is performed based on the attack and defense simulations on the SCADA cybersecurity testbed available at UCD. The preliminary test results elucidate the effectiveness of the proposed scheme and demonstrate the feasibility of the proposed scheme for enhancing information security of the substations.

10 citations

Journal ArticleDOI
TL;DR: The loss of the global optimal flow pattern is the lower bound of the feeder reconfiguration for loss minimization and the efficiency of the search strategies is greatly improved and the optimality of solutions can be verified.

10 citations

Proceedings ArticleDOI
25 Jul 2010
TL;DR: A global piecewise linear-affine mapping can be used to predict system patterns corresponding to forecasted load patterns, hence also dispatch levels, LMPs, and line flows.
Abstract: Short-term prediction of system variables with respect to load levels is highly important for market operations and demand response programs in wholesale power markets with congestion managed by locational marginal prices (LMPs). Previous studies have conducted local sensitivity analyses for LMPs at specific system operating points. This study undertakes a more global analysis of system variable sensitivities when LMPs are derived from DC optimal power flow solutions for day-ahead energy markets. The possible system states are first partitioned into subsets (“system patterns”) based on relatively slow-changing attributes. It is next established analytically that there is a fixed linear-affine mapping between bus load patterns and corresponding system variables, conditional on a particular system pattern. It is then explained how this global piecewise linear-affine mapping can be used to predict system patterns corresponding to forecasted load patterns, hence also dispatch levels, LMPs, and line flows. A 5-bus case study is used to illustrate the accuracy of the proposed prediction method.

9 citations

Journal ArticleDOI
TL;DR: In this article, the authors proposed intrusion prevention systems to provide secure communications in a smart grid environment, where detailed functions of intrusion prevention system are described and attack scenarios are developed to validate the effectiveness of the proposed methodology.

9 citations

08 Oct 2013
TL;DR: In this paper, a method to profile dynamic kernel memory to complement currently proposed dynamic profiling techniques is proposed, which will allow investigators to automate the identification of malicious kernel objects during a post-mortem analysis of the victim's acquired memory.
Abstract: Digital forensic investigators commonly use dynamic malware analysis methods to analyze a suspect executable found during a post-mortem analysis of the victim’s computer. Unfortunately, currently proposed dynamic malware analysis methods and sandbox solutions have a number of limitations that may lead the investigators to ambiguous conclusions. In this research, the limitations of the use of current dynamic malware analysis methods in digital forensic investigations are highlighted. In addition, a method to profile dynamic kernel memory to complement currently proposed dynamic profiling techniques is, then, proposed. The proposed method will allow investigators to automate the identification of malicious kernel objects during a post-mortem analysis of the victim’s acquired memory. The method is implemented in a prototype malware analysis environment to automate the process of profiling malicious kernel objects and assist malware forensic investigation. Finally, a case study is given to demonstrate the efficacy of the proposed approach.

9 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Journal ArticleDOI
TL;DR: The Compact Muon Solenoid (CMS) detector at the Large Hadron Collider (LHC) at CERN as mentioned in this paper was designed to study proton-proton (and lead-lead) collisions at a centre-of-mass energy of 14 TeV (5.5 TeV nucleon-nucleon) and at luminosities up to 10(34)cm(-2)s(-1)
Abstract: The Compact Muon Solenoid (CMS) detector is described. The detector operates at the Large Hadron Collider (LHC) at CERN. It was conceived to study proton-proton (and lead-lead) collisions at a centre-of-mass energy of 14 TeV (5.5 TeV nucleon-nucleon) and at luminosities up to 10(34)cm(-2)s(-1) (10(27)cm(-2)s(-1)). At the core of the CMS detector sits a high-magnetic-field and large-bore superconducting solenoid surrounding an all-silicon pixel and strip tracker, a lead-tungstate scintillating-crystals electromagnetic calorimeter, and a brass-scintillator sampling hadron calorimeter. The iron yoke of the flux-return is instrumented with four stations of muon detectors covering most of the 4 pi solid angle. Forward sampling calorimeters extend the pseudo-rapidity coverage to high values (vertical bar eta vertical bar <= 5) assuring very good hermeticity. The overall dimensions of the CMS detector are a length of 21.6 m, a diameter of 14.6 m and a total weight of 12500 t.

5,193 citations

01 Jan 2003

3,093 citations

Journal ArticleDOI
TL;DR: In this paper, the authors survey the literature till 2011 on the enabling technologies for the Smart Grid and explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.
Abstract: The Smart Grid, regarded as the next generation power grid, uses two-way flows of electricity and information to create a widely distributed automated energy delivery network. In this article, we survey the literature till 2011 on the enabling technologies for the Smart Grid. We explore three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system. We also propose possible future directions in each system. colorred{Specifically, for the smart infrastructure system, we explore the smart energy subsystem, the smart information subsystem, and the smart communication subsystem.} For the smart management system, we explore various management objectives, such as improving energy efficiency, profiling demand, maximizing utility, reducing cost, and controlling emission. We also explore various management methods to achieve these objectives. For the smart protection system, we explore various failure protection mechanisms which improve the reliability of the Smart Grid, and explore the security and privacy issues in the Smart Grid.

2,433 citations

01 Jan 2012
TL;DR: This article surveys the literature till 2011 on the enabling technologies for the Smart Grid, and explores three major systems, namely the smart infrastructure system, the smart management system, and the smart protection system.

2,337 citations