Results 11 to 20 of about 63,938 (281)

Strategy optimization of false data injection attack on AC-DC hybrid systems

open access: yes电力工程技术, 2023
False data injection (FDI) attack is one of the attacks that can seriously affect the operation of power systems. Some studies have focused on the cyber-attack methods of AC-DC hybrid systems. However, few studies pay their efforts on the optimization of
XIE Yunyun   +4 more
doaj   +1 more source

Distributed Control for AC Microgrids with False Data Injection Attacks and Time Delays [PDF]

open access: yesE3S Web of Conferences, 2020
Distributed control is widely used in AC microgrids to maintain frequency and voltage stability and internal power balance. However, distributed control need realizes information interaction through communication network, which makes microgrid vulnerable
Lu Rentao, Wang Jie
doaj   +1 more source

Fourier Singular Values-Based False Data Injection Attack Detection in AC Smart-Grids

open access: yesApplied Sciences, 2021
Cyber-physical threats as false data injection attacks (FDIAs) in islanded smart microgrids (ISMGs) are typical accretion attacks, which need urgent consideration.
Moslem Dehghani   +5 more
doaj   +1 more source

A multi-stage low-cost false data injection attack method for power CPS

open access: yesZhejiang dianli, 2023
With the rapid development of information and communication technology, the power system has developed into a cyber physical system (CPS) in which the information system and the physical system are deeply coupled. The constant interplay between data flow
YI Na, XU Jianjun, CHEN Yue, PAN Feiyu
doaj   +1 more source

Defense of Massive False Data Injection Attack via Sparse Attack Points Considering Uncertain Topological Changes

open access: yesJournal of Modern Power Systems and Clean Energy, 2022
False data injection attack (FDIA) is a typical cyber-attack aiming at falsifying measurement data for state estimation (SE), which may incur catastrophic consequences on cyber-physical system operation.
Xiaoge Huang   +4 more
doaj   +1 more source

An Efficient Data-Driven False Data Injection Attack in Smart Grids [PDF]

open access: yes2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 2018
Data-driven false data injection attack is one of the emerging techniques in smart grids, provided that the adversary can monitor the meter readings. The basic idea is constructing attack vectors from the estimated signal subspace, without knowing system measurement matrix.
Wen, F., Liu, W.
openaire   +2 more sources

Dynamic Phasor Estimation Method Considering False Data Attack Detection

open access: yesTaiyuan Ligong Daxue xuebao, 2022
In this paper proposed was a dynamic phasor estimation method considering false data attack. First, an electrical signal model for dynamic conditions is established by Taylor series expansion of electrical signals with harmonic and noise conditions. Then,
Dakai ZHAO   +3 more
doaj   +1 more source

False Analog Data Injection Attack Towards Topology Errors: Formulation and Feasibility Analysis [PDF]

open access: yes, 2018
In this paper, we propose a class of false analog data injection attack that can misguide the system as if topology errors had occurred. By utilizing the measurement redundancy with respect to the state variables, the adversary who knows the system ...
Cisneros-Saldana, Jorge   +2 more
core   +2 more sources

Distributed state estimation of active distribution network considering false data injection attack

open access: yes电力工程技术, 2022
As a key link to ensure the quality of power grid monitoring data,the state estimation provides a reliable data basis for the energy management system. Considering the problems of the large measurement errors and the vulnerability to the cyberattacks in ...
HUANG Chongxin   +3 more
doaj   +1 more source

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]

open access: yes, 2017
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy