Survey of machine learning methods for detecting false data injection attacks in power systems
… A three-phase (a, b, and c) line impedance matrix between bus i and bus j can be … k-means
(also called hard c-mean) is an example of a clustering method, which divides data into k …
(also called hard c-mean) is an example of a clustering method, which divides data into k …
A review of current research trends in power-electronic innovations in cyber–physical systems
…, C Ogilvie, J Ospina, C Konstantinou… - IEEE Journal of …, 2021 - ieeexplore.ieee.org
In this article, a broad overview of the current research trends in power-electronic innovations
in cyber–physical systems (CPSs) is presented. The recent advances in semiconductor …
in cyber–physical systems (CPSs) is presented. The recent advances in semiconductor …
[HTML][HTML] Applications of microbial-induced carbonate precipitation: A state-of-the-art review
Y Wang, C Konstantinou, S Tang, H Chen - Biogeotechnics, 2023 - Elsevier
Microbial-Induced Carbonate Precipitation (MICP) is a naturally occurring process whereby
bacteria produce enzymes that accelerate the precipitation of calcium carbonate. This …
bacteria produce enzymes that accelerate the precipitation of calcium carbonate. This …
The cybersecurity landscape in industrial control systems
… phone line to allow devices to communicate); c) fieldbus network (that links sensors and other
… A detailed discussion of developing an assessment environment appears in Section II-C. …
… A detailed discussion of developing an assessment environment appears in Section II-C. …
Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies
Cyber-physical systems (CPS) are interconnected architectures that employ analog and
digital components as well as communication and computational resources for their operation …
digital components as well as communication and computational resources for their operation …
Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies
…, I Zografopoulos, C Konstantinou… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications spanning
from the consumer domain to commercial and industrial systems. The steep growth and …
from the consumer domain to commercial and industrial systems. The steep growth and …
[HTML][HTML] Harmonization of human biomonitoring studies in Europe: characteristics of the HBM4EU-aligned studies participants
…, M Kolossa-Gehring, C Konstantinou… - International journal of …, 2022 - mdpi.com
Human biomonitoring has become a pivotal tool for supporting chemicals’ policies. It provides
information on real-life human exposures and is increasingly used to prioritize chemicals …
information on real-life human exposures and is increasingly used to prioritize chemicals …
[HTML][HTML] The role of bacterial urease activity on the uniformity of carbonate precipitation profiles of bio-treated coarse sand specimens
… Of the three structural genes, Ure-A, Ure-B and Ure-C, Ure-C is reported to have the greatest
molecular weight 46,47,48 . The qPCR tests targeted the quantification of the RNA copies …
molecular weight 46,47,48 . The qPCR tests targeted the quantification of the RNA copies …
Blockchain and autonomous vehicles: Recent advances and future directions
…, B Nagaiah, A Kumar, C Konstantinou - IEEE …, 2021 - ieeexplore.ieee.org
Blockchain is an underlying technology for securing many real-time applications and their
data. The automobile is one such sector in which auto-manufacturers are looking forward to …
data. The automobile is one such sector in which auto-manufacturers are looking forward to …
Confirm: Detecting firmware modifications in embedded systems using hardware performance counters
X Wang, C Konstantinou… - 2015 IEEE/ACM …, 2015 - ieeexplore.ieee.org
… Assume that the attacker modifies the control flow between A and C. The count of Event x
from A to C after the modification is CA−C(Ex). If the attacker knows the “good” value of CA−B(…
from A to C after the modification is CA−C(Ex). If the attacker knows the “good” value of CA−B(…