no code implementations • 10 May 2023 • Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta
One effective approach to improving IoT security is to deploy IoT honeypot systems, which can collect attack information and reveal the methods and strategies used by attackers.
no code implementations • 29 Apr 2022 • Sina Gharebaghi, Nilanjan Ray Chaudhuri, Ting He, Thomas La Porta
To solve this, we propose a fast cascading failure simulation approach based on implicit Backward Euler method (BEM) with stiff decay property.
no code implementations • 13 Apr 2021 • Sai Gopal Vennelaganti, Nilanjan Ray Chaudhuri, Ting He, Thomas La Porta
Knowledge of power grid's topology during cascading failure is an essential element of centralized blackout prevention control, given that multiple islands are typically formed, as a cascade progresses.
no code implementations • 18 Jan 2021 • Yudi Huang, Ting He, Nilanjan Ray Chaudhuri, Thomas La Porta
Our numerical evaluations based on the Polish power grid and IEEE 300-bus system demonstrate that the proposed algorithms are highly successful in verifying the states of truly failed links, and can thus greatly help in prioritizing repairs during the recovery process.
Performance
no code implementations • 27 Sep 2017 • Zongqing Lu, Swati Rallapalli, Kevin Chan, Thomas La Porta
In doing so Augur tackles several challenges: (i) how to overcome pro ling and measurement overhead; (ii) how to capture the variance in different mobile platforms with different processors, memory, and cache sizes; and (iii) how to account for the variance in the number, type and size of layers of the different CNN configurations.