G
Gyorgy Dan
Researcher at Royal Institute of Technology
Publications - 175
Citations - 3643
Gyorgy Dan is an academic researcher from Royal Institute of Technology. The author has contributed to research in topics: Cache & Computer science. The author has an hindex of 29, co-authored 158 publications receiving 3007 citations. Previous affiliations of Gyorgy Dan include Instituto Superior Técnico & Middle East Technical University.
Papers
More filters
Proceedings ArticleDOI
Stealth Attacks and Protection Schemes for State Estimators in Power Systems
Gyorgy Dan,Henrik Sandberg +1 more
TL;DR: This work proposes two algorithms to place encrypted devices in the system such as to maximize their utility in terms of increased system security, and illustrates the effectiveness of these algorithms on two IEEE benchmark power networks under two attack and protection cost models.
Journal ArticleDOI
Smart Meter Data Privacy: A Survey
TL;DR: This paper provides a structured overview, shortcomings, recommendations, and research directions of security solutions that are needed for privacy-preserving meter data delivery and management for the three application areas: 1) billing; 2) operations; and 3) value-added services including demand response.
Journal ArticleDOI
Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation
TL;DR: This paper investigates the vulnerability of the power system state estimator to attacks performed against the communication infrastructure and proposes approximations of these metrics, that are based on the communication network topology only, and provides efficient algorithms to calculate the security metrics.
Journal ArticleDOI
A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator
TL;DR: A Cyber Security Study of a SCADA Energy Management System : Stealthy Deception Attacks on the State Estimator shows how deception attacks can be used to trick the state into thinking the system is reliable.
Posted Content
A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator
TL;DR: In this article, the authors analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network.