Vitaly Ford

Vitaly Ford
Arcadia University · Department of Computer Science and Mathematics

PhD

About

17
Publications
52,678
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
234
Citations
Introduction
Vitaly Ford currently works at the Department of Computer Science and Mathematics, Arcadia University. Vitaly does research in Cybersecurity, ComSci Education, and Smart Grid.

Publications

Publications (17)
Article
The Advanced Metering Infrastructure (AMI) plays a critical role in the Smart Grid. Regarding the usage of smart meters in AMI, there is a primary concern about how utility companies manage energy consumption data, particularly with respect to consumer privacy. This research presents a novel protocol for secure and efficient communication of energy...
Conference Paper
Full-text available
Energy fraud detection is a critical aspect of smart grid security and privacy preservation. Machine learning and data mining have been widely used by researchers for extensive intelligent analysis of data to recognize normal patterns of behavior such that deviations can be detected as anomalies. This paper discusses a novel application of a machin...
Conference Paper
Full-text available
This research addresses privacy concerns in smart meter data. Smart meter data is analyzed for learning normal consumer usage of electricity. Clustering technique such as Fuzzy C-Means is used to disaggregate and learn energy consumption patterns in smart meter data. Results of experimentation with real world meter data demonstrate that it is reali...
Conference Paper
Full-text available
The electrical grid is transitioning to new smart grid technology. With smart meters becoming an essential feature in smart homes, concerns regarding smart meters and the vast amount of consumer data that it captures are on the rise. While access to this fine-grained energy consumption data captured by smart meters can potentially violate consumer...
Conference Paper
Full-text available
Machine learning techniques have been applied in many areas of science due to their unique properties like adaptability, scalability, and potential to rapidly adjust to new and unknown challenges. Cyber security is a fast-growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologie...
Preprint
A computer program has been created that makes it possible to analyze the features of the spatial distribution of Joule heat in two-phase matrix systems with round inclusions. The program uses the finite element method and is implemented in Fortran code. It was found that at certain points of the two-phase medium, the specific power of the Joule he...
Conference Paper
Usage of FEM gives opportunity to notice new mechanism of electrical contact material degradation. Until this moment the reasons for the exponential dependence of the failure rate of electrical contacts on the time of their operation was not clear. The article announces new program FEM, which gives us opportunity to explore the occurrence of therma...
Conference Paper
The finite element method (FEM) analyzes the features of the spatial distribution of Joule heat in two-phase matrix systems with round inclusions. It was found that in the processes of sintering peaks of heat generation power are formed at certain points of the medium. It is proposed to use the observed phenomenon for the formation of anisotropic a...
Conference Paper
This research presents a computer model for conjugate heat and mass transfer during laser processing of materials. The computer programs based on FEM, which allow to predict the processes of formation of evaporation and condensation zones on the surface areas surrounding the crater are implemented. There is the presence of three modes of operation,...
Conference Paper
This study explored a scenario of a new mechanism of electric shock. Using computer simulation using the finite element method, the possibility of the existence of unlikely short-term electrical breakdowns caused by synergistic effects is shown. A method for assessing the risk of a self-organizing conductive cluster of moisture droplets is proposed...
Article
An important task in business of any enterprise and, in particular, enterprises working in the industrial ecology is the timely transmission of data and relevant information. The article provides an overview and analysis of technologies of employee notification about any type of events. The model of optimization of data transmission over messengers...
Article
The problems of teaching students the synergistic basis of economy is considered. The scheme of presenting the subject is provided, which is adapted to the aspects of modern students teaching.
Conference Paper
Full-text available
In order to meet the cybersecurity workforce demand, it is important to raise cybersecurity interest among the youth. Just like ACM programming competitions, Capture the Flag (CTF) competitions allow students to learn cybersecurity skills in a fun and engaging way. It is an effective platform to increase students' interest in cybersecurity and prep...
Conference Paper
Full-text available
We are investigating a novel approach towards reliable and efficient protection of consumer privacy in the Advanced Metering Infrastructure (AMI). In the smart grid, one of the main concerns of consumers is associated with the usage of the smart meters and how utility companies handle energy consumption data, which can potentially reveal sensitive...

Network

Cited By