scispace - formally typeset
G

Gabriel A. Weaver

Researcher at University of Illinois at Urbana–Champaign

Publications -  22
Citations -  211

Gabriel A. Weaver is an academic researcher from University of Illinois at Urbana–Champaign. The author has contributed to research in topics: Security policy & Unix. The author has an hindex of 7, co-authored 20 publications receiving 169 citations. Previous affiliations of Gabriel A. Weaver include Dartmouth College.

Papers
More filters
Book ChapterDOI

PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure

TL;DR: An anomaly detection method that uniquely combines Principal Component Analysis PCA and Density-Based Spatial Clustering of Applications with Noise DBSCAN to verify the integrity of the smart meter measurements is proposed.
Proceedings ArticleDOI

F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids

TL;DR: A theft detector based on Kullback-Leibler (KL) divergence is proposed to detect cleverly-crafted electricity theft attacks that circumvent detectors proposed in related work and it is shown that this detector dramatically mitigates electricity theft in comparison to detectors in prior work.
Proceedings ArticleDOI

Cyber-Physical models for power grid security analysis: 8-substation case

TL;DR: A Common Format using the Cyber-Physical Topology Language (CPTL) to inventory, analyze, and exchange cyber- physical model information is defined to enable efficient information exchange of cyber-physical topologies within and among the industry as well as the research community.
Book ChapterDOI

A computational framework for certificate policy operations

TL;DR: The PKI Policy Repository, PolicyBuilder, and PolicyReporter improve the consistency of certificate policy operations as actually practiced in compliance audits, grid accreditation, and policy mapping for bridging PKIs.
Proceedings ArticleDOI

Toward a cyber-physical topology language: applications to NERC CIP audit

TL;DR: This paper introduces operators to process attributes by expanding and contracting components of a network, and implement these operations using the Boost Graph Library (BGL), and demonstrates the potential for CPTL to save auditors and utilities time and money.