Siddharth Sridhar

According to our database1, Siddharth Sridhar authored at least 12 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Understanding Impacts of Data Integrity Attacks on Transactive Control Systems.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2020

Quaternion Feedback Based Autonomous Control of a Quadcopter UAV with Thrust Vectoring Rotors.
Proceedings of the 2020 American Control Conference, 2020

2019
A Multi-level Fidelity Microgrid Testbed Model for Cybersecurity Experimentation.
Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test, 2019

A Clustering Approach for Consumer Baselining and Anomaly Detection in Transactive Control.
Proceedings of the Tenth ACM International Conference on Future Energy Systems, 2019

Tilt-Rotor Quadcopter Xplored: Hardware based Dynamics, Smart Sliding Mode Controller, Attitude Hold & Wind Disturbance Scenarios.
Proceedings of the 2019 American Control Conference, 2019

2017
Substation monitoring to enhance situational awareness - challenges and opportunities.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

Data-Driven Anomaly Detection for Power System Generation Control.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

2014
Model-Based Attack Detection and Mitigation for Automatic Generation Control.
IEEE Trans. Smart Grid, 2014

2013
Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid.
IEEE Trans. Smart Grid, 2013

2012
Cyber-Physical System Security for the Electric Power Grid.
Proc. IEEE, 2012

Cyber attack-resilient control for smart grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

2010
Development of the PowerCyber SCADA security testbed.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010


  Loading...