Results 41 to 50 of about 322,557 (329)

Coordinated False Data Injection Attacks in AGC System and Its Countermeasure

open access: yesIEEE Access, 2020
The Automatic Generation Control (AGC) system is vital for power system frequency stability. The frequency and tie-line power flow are measured and transmitted to the control room to form Area Control Error (ACE), which is then sent to each generator for
Xi He, Xuan Liu, Peng Li
doaj   +1 more source

False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition

open access: yes, 2017
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang   +3 more
core   +1 more source

How Effective are Smart Contract Analysis Tools? Evaluating Smart Contract Static Analysis Tools Using Bug Injection

open access: yes, 2020
Security attacks targeting smart contracts have been on the rise, which have led to financial loss and erosion of trust. Therefore, it is important to enable developers to discover security vulnerabilities in smart contracts before deployment.
Akca Sefa   +9 more
core   +1 more source

Convolutional neural networks: a magic bullet for gravitational-wave detection? [PDF]

open access: yes, 2019
In the last few years, machine learning techniques, in particular convolutional neural networks, have been investigated as a method to replace or complement traditional matched filtering techniques that are used to detect the gravitational-wave signature
Gebhard, Timothy D.   +3 more
core   +2 more sources

Distributed state estimation of active distribution network considering false data injection attack

open access: yes电力工程技术, 2022
As a key link to ensure the quality of power grid monitoring data,the state estimation provides a reliable data basis for the energy management system. Considering the problems of the large measurement errors and the vulnerability to the cyberattacks in ...
HUANG Chongxin   +3 more
doaj   +1 more source

A Bayesian coincidence test for noise rejection in a gravitational-wave burst search [PDF]

open access: yes, 2008
In searches for gravitational-wave bursts, a standard technique used to reject noise is to discard burst event candidates that are not seen in coincidence in multiple detectors.
Cannon, Kipp C.
core   +1 more source

Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements

open access: yes, 2016
The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge,
Anwar, Adnan   +2 more
core   +1 more source

Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]

open access: yes, 2014
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim   +3 more
core   +1 more source

Colorectal cancer‐derived FGF19 is a metabolically active serum biomarker that exerts enteroendocrine effects on mouse liver

open access: yesMolecular Oncology, EarlyView.
Meta‐transcriptome analysis identified FGF19 as a peptide enteroendocrine hormone associated with colorectal cancer prognosis. In vivo xenograft models showed release of FGF19 into the blood at levels that correlated with tumor volumes. Tumoral‐FGF19 altered murine liver metabolism through FGFR4, thereby reducing bile acid synthesis and increasing ...
Jordan M. Beardsley   +5 more
wiley   +1 more source

Robustness of Short-Term Wind Power Forecasting against False Data Injection Attacks

open access: yesEnergies, 2020
The accuracy of wind power forecasting depends a great deal on the data quality, which is so susceptible to cybersecurity attacks. In this paper, we study the cybersecurity issue of short-term wind power forecasting. We present one class of data attacks,
Yao Zhang, Fan Lin, Ke Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy