Results 41 to 50 of about 322,557 (329)
Coordinated False Data Injection Attacks in AGC System and Its Countermeasure
The Automatic Generation Control (AGC) system is vital for power system frequency stability. The frequency and tie-line power flow are measured and transmitted to the control room to form Area Control Error (ACE), which is then sent to each generator for
Xi He, Xuan Liu, Peng Li
doaj +1 more source
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang +3 more
core +1 more source
Security attacks targeting smart contracts have been on the rise, which have led to financial loss and erosion of trust. Therefore, it is important to enable developers to discover security vulnerabilities in smart contracts before deployment.
Akca Sefa +9 more
core +1 more source
Convolutional neural networks: a magic bullet for gravitational-wave detection? [PDF]
In the last few years, machine learning techniques, in particular convolutional neural networks, have been investigated as a method to replace or complement traditional matched filtering techniques that are used to detect the gravitational-wave signature
Gebhard, Timothy D. +3 more
core +2 more sources
Distributed state estimation of active distribution network considering false data injection attack
As a key link to ensure the quality of power grid monitoring data,the state estimation provides a reliable data basis for the energy management system. Considering the problems of the large measurement errors and the vulnerability to the cyberattacks in ...
HUANG Chongxin +3 more
doaj +1 more source
A Bayesian coincidence test for noise rejection in a gravitational-wave burst search [PDF]
In searches for gravitational-wave bursts, a standard technique used to reject noise is to discard burst event candidates that are not seen in coincidence in multiple detectors.
Cannon, Kipp C.
core +1 more source
The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge,
Anwar, Adnan +2 more
core +1 more source
Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim +3 more
core +1 more source
Meta‐transcriptome analysis identified FGF19 as a peptide enteroendocrine hormone associated with colorectal cancer prognosis. In vivo xenograft models showed release of FGF19 into the blood at levels that correlated with tumor volumes. Tumoral‐FGF19 altered murine liver metabolism through FGFR4, thereby reducing bile acid synthesis and increasing ...
Jordan M. Beardsley +5 more
wiley +1 more source
Robustness of Short-Term Wind Power Forecasting against False Data Injection Attacks
The accuracy of wind power forecasting depends a great deal on the data quality, which is so susceptible to cybersecurity attacks. In this paper, we study the cybersecurity issue of short-term wind power forecasting. We present one class of data attacks,
Yao Zhang, Fan Lin, Ke Wang
doaj +1 more source

