Results 11 to 20 of about 702 (166)

Scalable cyber‐physical testbed for cybersecurity evaluation of synchrophasors in power systems

open access: yesIET Cyber-Physical Systems
This paper presents a synchrophasor‐based real‐time cyber‐physical power system testbed with a novel security evaluation tool, pySynphasor, that can emulate different real attack scenarios on the phasor measurement unit (PMU). The testbed focuses on real‐
Shuvangkar Chandra Das   +2 more
doaj   +2 more sources

Localization Detection of False Data Injection Attacks in Novel Energy and Power Systems Based on Correlated Feature‐Multi‐Label Cascading Boosted Forests

open access: yesEngineering Reports
Under the dual influence of power system transition to integrated energy and the evolution of cyberattack technology, a correlation feature‐multilabel cascade boosted forest based false data injection attack localization and detection method is proposed ...
Lei Wang   +5 more
doaj   +2 more sources

Impact Analysis of False Data Injection Attack on Smart Grid State Estimation Under Random Packet Losses [PDF]

open access: yes, 2021
Supervisory control and data acquisition (SCADA) system has been widely used in traditional power systems for operation and control. As increasingly more ICT technologies are deployed to improve the smartness of the power grid, cyber security is becoming
D Ding   +16 more
core   +1 more source

The Detection of False Data Injection Attack for Cyber–Physical Power Systems Considering a Multi-Attack Mode

open access: yesApplied Sciences, 2023
Amidst the evolving communication technology landscape, conventional distribution networks have gradually metamorphosed into cyber–physical power systems (CPPSs). Within this transformative milieu, the cyber infrastructure not only bolsters grid security
Buxiang Zhou   +5 more
doaj   +1 more source

Learning-Based Cooperative False Data Injection Attack and Its Mitigation Techniques in Consensus-Based Distributed Estimation

open access: yesIEEE Access, 2020
For the false data injection attack (FDIA) in the consensus-based distributed estimation, the information of weight matrix is critical for both attackers and defenders.
Qiaomu Jiang   +3 more
doaj   +1 more source

Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter [PDF]

open access: yes, 2022
The distribution denial of service (DDoS) attack, fault data injection attack (FDIA) and random attack is reduced. The monitoring and security of smart grid systems are improved using reconfigurable Kalman filter.
Dayananda, Prakyath   +4 more
core   +3 more sources

Robust Intrusion Detection for Resilience Enhancement of Industrial Control Systems: An Extended State Observer Approach [PDF]

open access: yes, 2022
We address the problem of attack signal estimation in industrial control systems that are subjected to actuator false data injection attack (FDIA) and where the sensor measurements are corrupted by non-negligible high-frequency measurement noise.
Ahmad, Saif, Ahmed, Hafiz
core   +2 more sources

A Cyber-Secured Operation for Water-Energy Nexus [PDF]

open access: yes, 2021
The wide implementation of information and communication technologies (ICT) cause power system operations exposed to cyber-attacks. Meanwhile, the tendency of integrated multi energy vectors has worsened this issue with multiple energy coupled.
Cao, Zhidong   +4 more
core   +3 more sources

Detection of false data injection attack in power information physical system based on SVM–GAB algorithm

open access: yesEnergy Reports, 2022
Cyber physical power system (CPPS) is highly dependent on information and communication technology, which makes it vulnerable to network attacks. Among them, false data injection attack (FDIA) is not easy to be found by traditional bad data detection ...
Xiaoping Xiong   +5 more
doaj   +1 more source

A deep learning‐based classification scheme for cyber‐attack detection in power system

open access: yesIET Energy Systems Integration, 2021
A smart grid improves power grid efficiency by using modern information and communication technologies. However, at the same time, the system might become increasingly vulnerable to cyberattacks.
Yucheng Ding   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy