scispace - formally typeset
G

Gyorgy Dan

Researcher at Royal Institute of Technology

Publications -  175
Citations -  3643

Gyorgy Dan is an academic researcher from Royal Institute of Technology. The author has contributed to research in topics: Cache & Computer science. The author has an hindex of 29, co-authored 158 publications receiving 3007 citations. Previous affiliations of Gyorgy Dan include Instituto Superior Técnico & Middle East Technical University.

Papers
More filters
Proceedings ArticleDOI

Stealth Attacks and Protection Schemes for State Estimators in Power Systems

TL;DR: This work proposes two algorithms to place encrypted devices in the system such as to maximize their utility in terms of increased system security, and illustrates the effectiveness of these algorithms on two IEEE benchmark power networks under two attack and protection cost models.
Journal ArticleDOI

Smart Meter Data Privacy: A Survey

TL;DR: This paper provides a structured overview, shortcomings, recommendations, and research directions of security solutions that are needed for privacy-preserving meter data delivery and management for the three application areas: 1) billing; 2) operations; and 3) value-added services including demand response.
Journal ArticleDOI

Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation

TL;DR: This paper investigates the vulnerability of the power system state estimator to attacks performed against the communication infrastructure and proposes approximations of these metrics, that are based on the communication network topology only, and provides efficient algorithms to calculate the security metrics.
Journal ArticleDOI

A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

TL;DR: A Cyber Security Study of a SCADA Energy Management System : Stealthy Deception Attacks on the State Estimator shows how deception attacks can be used to trick the state into thinking the system is reliable.
Posted Content

A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

TL;DR: In this article, the authors analyze the cyber security of state estimators in supervisory control and data acquisition (SCADA) for energy management systems (EMS) operating the power network.