Results 11 to 20 of about 62,210 (284)

False Data Injection Attack Detection in Power Systems Based on Cyber-Physical Attack Genes

open access: yesFrontiers in Energy Research, 2021
In the process of the detection of a false data injection attack (FDIA) in power systems, there are problems of complex data features and low detection accuracy.
Zhaoyang Qu   +10 more
doaj   +1 more source

An Ensemble Approach for Cyber Attack Detection System: A Generic Framework [PDF]

open access: yesInternational Journal of Networked and Distributed Computing (IJNDC), 2014
Cyber attack detection is based on assumption that intrusive activities are noticeably different from normal system activities and thus detectable. A cyber attack would cause loss of integrity, confidentiality, denial of resources.
Shailendra Singh, Sanjay Silakari
doaj   +1 more source

Cyber-Attack Detection and Countermeasure for Distributed Electric Springs for Smart Grid Applications

open access: yesIEEE Access, 2022
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system ...
Jie Chen   +4 more
doaj   +1 more source

DDoS: Distributed denial of service attack in communication standard vulnerabilities in smart grid applications and cyber security with recent developments

open access: yesEnergy Reports, 2023
Smart grid system is evident with control technologies and digital communications systems. The cyber–physical system is a critical infrastructure connected with complex drives and devices.
Mohammad Kamrul Hasan   +5 more
doaj   +1 more source

Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack

open access: yesIEEE Access, 2021
Since Smart-Islands (SIs) with advanced cyber-infrastructure are incredibly vulnerable to cyber-attacks, increasing attention needs to be applied to their cyber-security.
Moslem Dehghani   +6 more
doaj   +1 more source

Detection of Cyber Attacks in Encrypted Control Systems [PDF]

open access: yesIEEE Control Systems Letters, 2022
Recently a resilient homomorphic encryption (RHE) scheme has been proposed in [1], which allows not only to carry out the evaluation process of an output feedback controller in an encrypted environment but also can neutralize the effect of additive attacks injected into the ciphertexts.
Moritz Fauser, Ping Zhang 0022
openaire   +1 more source

A Review on Cybersecurity Analysis, Attack Detection, and Attack Defense Methods in Cyber-physical Power Systems

open access: yesJournal of Modern Power Systems and Clean Energy, 2023
Potential malicious cyber-attacks to power systems which are connected to a wide range of stakeholders from the top to tail will impose significant societal risks and challenges.
Dajun Du   +6 more
doaj   +1 more source

Cyber Attacks : Detection and Prevention

open access: yesInternational Journal of Scientific Research in Science, Engineering and Technology, 2022
Tens of millions of cyber-attacks (Emails, online transactions, live video streaming, online games, and navigation are all examples of fraudulent Internet-based intelligence gathering.) are launched every day against Internet users throughout the world. Various defences have been developed by researchers in response to these attacks.
null Jigar Vakil   +1 more
openaire   +1 more source

Detection of Cyber-Attacks in Collaborative Intersection Control [PDF]

open access: yes2021 European Control Conference (ECC), 2021
6 page conference paper accepted to 19th European Control Conference 2021, Rotterdam, The ...
Twan Keijzer   +2 more
openaire   +3 more sources

Fourier Singular Values-Based False Data Injection Attack Detection in AC Smart-Grids

open access: yesApplied Sciences, 2021
Cyber-physical threats as false data injection attacks (FDIAs) in islanded smart microgrids (ISMGs) are typical accretion attacks, which need urgent consideration.
Moslem Dehghani   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy