Results 41 to 50 of about 66,369 (329)

Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements

open access: yes, 2016
The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge,
Anwar, Adnan   +2 more
core   +1 more source

Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating

open access: yes, 2020
In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update procedure.
Eberz, Simon   +2 more
core   +1 more source

Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack

open access: yesIEEE Access, 2021
Since Smart-Islands (SIs) with advanced cyber-infrastructure are incredibly vulnerable to cyber-attacks, increasing attention needs to be applied to their cyber-security.
Moslem Dehghani   +6 more
doaj   +1 more source

Local Cyber-physical Attack with Leveraging Detection in Smart Grid

open access: yes, 2017
A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack ...
Chung, Hwei-Ming   +4 more
core   +1 more source

On False Data Injection Attack against Building Automation Systems

open access: yes2023 International Conference on Computing, Networking and Communications (ICNC), 2023
KNX is one popular communication protocol for a building automation system (BAS). However, its lack of security makes it subject to a variety of attacks. We are the first to study the false data injection attack against a KNX based BAS. We design a man-in-the-middle (MITM) attack to change the data from a temperature sensor and inject false data into ...
Michael Cash   +7 more
openaire   +2 more sources

False Data Injection Attacks Against Synchronization Systems in Microgrids [PDF]

open access: yesIEEE Transactions on Smart Grid, 2021
Synchronization systems play a vital role in the day-to-day operation of power systems and their restoration after cascading failures. Hence, their resilience to cyberattacks is imperative. In this paper, we demonstrate that a well-planned false data injection attack against the synchronization system of a generator is capable of causing tripping ...
Amr S. Mohamed   +3 more
openaire   +1 more source

Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

open access: yes, 2017
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the ...
Lakshminarayana, Subhash   +3 more
core   +1 more source

Detection of False Data Injection Attacks Using the Autoencoder Approach [PDF]

open access: yes2020 International Conference on Probabilistic Methods Applied to Power Systems (PMAPS), 2020
6 pages, 5 figures, 1 table ...
Wang, C. (author)   +3 more
openaire   +3 more sources

Preferences for Posttraumatic Osteoarthritis Prevention Strategies in Individuals With Anterior Cruciate Ligament Injury

open access: yesArthritis Care &Research, EarlyView.
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy   +9 more
wiley   +1 more source

False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition

open access: yes, 2017
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy