Computer Science
Distributed Ledger Technology
100%
Testbed
66%
Protective Relay
50%
Computer Hardware
40%
Cybersecurity
38%
Enterprise System
33%
Effort Estimation
33%
Industrial Control System
33%
Case Study
33%
Integration Platform
33%
Development Platform
33%
Supervisory Control and Data Acquisition System
33%
Critical Infrastructure
33%
Protection Scheme
33%
Reconfigurable Hardware
33%
Hardware Configuration
33%
Shadow Network
33%
Network Architecture
33%
Machine Learning
33%
Learning System
33%
Data Collection
33%
Smart Grid
33%
Cyber Attack
33%
Research Project
33%
Data Analytics
33%
Energy Industry
33%
Technical Staff
33%
Technology Data
33%
Technology Project
33%
Information Technology
33%
Spoofing
33%
Network Protocols
33%
Cyber Resilience
33%
Fuzzing
33%
Malware
33%
Feature Reduction
16%
Software Engineering Effort
16%
Dimensionality Reduction
16%
Information Loss
16%
Performance Difference
16%
Security Domain
16%
Malicious Insider
16%
Threat Scenario
16%
Data Injection Attack
16%
Network Intrusion Detection System
16%
Potential Attack
16%
Potential Threat
16%
Attack Scenario
16%
Electrical Grid
16%
Malicious Code
16%
Engineering
Substations
83%
Distributed Energy Resource
66%
Electrical Grid
51%
Power Engineering
48%
Power Meter
44%
Compressed Air Motors
38%
Power Quality
33%
Technology Application
33%
Cyber Attack
33%
Main Feeder
33%
Learning System
33%
Total Power Factor
33%
Oak Ridge
33%
Current Threshold
16%
Energy Source
16%
Distributed Energy
16%
Research Project
16%
Primary Goal
16%
Real Equipment
16%
Information Technology
16%
Point of Common Coupling
14%
Blockchain
9%
Collected Data
9%
Power System Protection
7%
Fits and Tolerances
7%
Flowchart
7%
System Operator
5%
Experimental Model
5%
Application Monitoring
5%
Discriminator
5%
Microgrid
5%
Machine Learning Method
5%
Decision Maker
5%
Renewable Resource
5%
Renewable Energy Source
5%