Adam Hahn

Orcid: 0000-0003-1214-3466

According to our database1, Adam Hahn authored at least 29 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Intrusion Detection for Cybersecurity of Smart Meters.
IEEE Trans. Smart Grid, 2021

2020
Cyber Physical Security Analytics for Transactive Energy Systems.
IEEE Trans. Smart Grid, 2020

CP-SAM: Cyber-Physical Security Assessment Metric for Monitoring Microgrid Resiliency.
IEEE Trans. Smart Grid, 2020

CP-TRAM: Cyber-Physical Transmission Resiliency Assessment Metric.
IEEE Trans. Smart Grid, 2020

Cyber Threat Impact Analysis to Air Traffic Flows Through Dynamic Queue Networks.
ACM Trans. Cyber Phys. Syst., 2020

Assessing Cyber-Physical Risks of IoT-Based Energy Devices in Grid Operations.
IEEE Access, 2020

2019
Energy Crowdsourcing and Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids.
IEEE Trans. Syst. Man Cybern. Syst., 2019

A Diversity-Based Substation Cyber Defense Strategy Utilizing Coloring Games.
IEEE Trans. Smart Grid, 2019

DER-TEE: Secure Distributed Energy Resource Operations Through Trusted Execution Environments.
IEEE Internet Things J., 2019

CyPhyR: a cyber-physical analysis tool for measuring and enabling resiliency in microgrids.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

Evaluating the Observability of Network Security Monitoring Strategies With TOMATO.
IEEE Access, 2019

An Distributed Cyberattack Diagnosis Scheme for Malicious Protection Operation based on IEC 61850.
Proceedings of the Fifth Annual Industrial Control System Security Workshop, 2019

A Real-Time Transmission-Distribution Testbed for Resiliency Analysis.
Proceedings of the 2019 IEEE Industry Applications Society Annual Meeting, Baltimore, MD, USA, September 29, 2019

2018
ARCADES: analysis of risk from cyberattack against defensive strategies for the power grid.
IET Cyper-Phys. Syst.: Theory & Appl., 2018

Attack Surface Metrics and Privilege-based Reduction Strategies for Cyber-Physical Systems.
CoRR, 2018

Securing Your ICS Software with the AttackSurface Host Analyzer (AHA).
Proceedings of the 4th Annual Industrial Control System Security Workshop, 2018

Enhancing Microgrid Resiliency Against Cyber Vulnerabilities.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2018

Cyber Physical Security Analytics for Anomalies in Transmission Protection Systems.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2018

2017
Smart contract-based campus demonstration of decentralized transactive energy auctions.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

Feedback control systems with cyber fault-management mechanisms: Modeling and tradeoff analysis for simple examples.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

2016
Cybersecurity for distributed energy resources and smart inverters.
IET Cyper-Phys. Syst.: Theory & Appl., 2016

2015
A multi-layered and kill-chain based security analysis framework for cyber-physical systems.
Int. J. Crit. Infrastructure Prot., 2015

2013
Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid.
IEEE Trans. Smart Grid, 2013

Model-based intrustion detection for the smart grid (MINDS).
Proceedings of the Cyber Security and Information Intelligence, 2013

2012
Cyber-Physical System Security for the Electric Power Grid.
Proc. IEEE, 2012

Cyber attack-resilient control for smart grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

2011
Cyber Attack Exposure Evaluation Framework for the Smart Grid.
IEEE Trans. Smart Grid, 2011

A cyber-physical security testbed for smart grid: system architecture and studies.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Development of the PowerCyber SCADA security testbed.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010


  Loading...