Results 21 to 30 of about 322,557 (329)

False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis [PDF]

open access: yes, 2018
In this paper, we propose a class of false analog data injection attack that can misguide the system as if topology errors had occurred. By utilizing the measurement redundancy with respect to the state variables, the adversary who knows the system ...
Cisneros-Saldana, Jorge   +2 more
core   +2 more sources

Strategy optimization of false data injection attack on AC-DC hybrid systems

open access: yes电力工程技术, 2023
False data injection (FDI) attack is one of the attacks that can seriously affect the operation of power systems. Some studies have focused on the cyber-attack methods of AC-DC hybrid systems. However, few studies pay their efforts on the optimization of
XIE Yunyun   +4 more
doaj   +1 more source

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]

open access: yes, 2017
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash   +3 more
core   +2 more sources

Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation

open access: yesEnergies, 2021
Integration of information technologies with power systems has unlocked unprecedented opportunities in optimization and control fields. Increased data collection and monitoring enable control systems to have a better understanding of the pseudo-real-time
Derya Betul Unsal   +3 more
doaj   +1 more source

Data Collaborative Detection Scheme of Electric Metering System Based on Edge Computing

open access: yesZhongguo dianli, 2019
False data injection attacks are aimed at destroying the integrity and availability of power data in electric metering system. The false data detection scheme is of great significance to the secure and stable operation of smart grid.
Bin QIAN   +5 more
doaj   +1 more source

Reachability-Based False Data Injection Attacks and Defence Mechanisms for Cyberpower System

open access: yesEnergies, 2022
With the push for higher efficiency and reliability, an increasing number of intelligent electronic devices (IEDs) and associated information and communication technology (ICT) are integrated into the Internet of Things (IoT)-enabled smart grid.
Ren Liu   +3 more
doaj   +1 more source

An Efficient Data-Driven False Data Injection Attack in Smart Grids [PDF]

open access: yes2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 2018
Data-driven false data injection attack is one of the emerging techniques in smart grids, provided that the adversary can monitor the meter readings. The basic idea is constructing attack vectors from the estimated signal subspace, without knowing system measurement matrix.
Wen, F., Liu, W.
openaire   +2 more sources

A Language for Modelling False Data Injection Attacks in Internet of Things [PDF]

open access: yes2021 IEEE/ACM 3rd International Workshop on Software Engineering Research and Practices for the IoT (SERP4IoT), 2021
8 pages, 6 figures to be published in 3rd International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT 2021)
Mathieu Briland, Fabrice Bouquet
openaire   +2 more sources

Sensitivity and specificity of detection methods for erythropoietin doping in cyclists [PDF]

open access: yes, 2019
Recombinant human erythropoietin (rHuEPO) is used as doping a substance. Anti-doping efforts include urine and blood testing and monitoring the athlete biological passport (ABP).
Burggraaf, Jacobus   +10 more
core   +1 more source

Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids [PDF]

open access: yes, 2015
This paper discusses malicious false data injection attacks on the wide area measurement and monitoring system in smart grids. Firstly, methods of constructing sparse stealth attacks are developed for two typical scenarios: random attacks in which ...
Chin, WH   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy