Results 31 to 40 of about 702 (166)

Detection of false data injection in point-of-sale systems during credit card transactions using tuned deep learning models and oversampling techniques [PDF]

open access: yesPeerJ Computer Science
Background False data injection attack (FDIA) occurs during credit card transactions at point-of-sale systems (POS). FDI increases in POS due to free WIFI access at sales counters.
S. Jhansi Ida, K. Balasubadra
doaj   +2 more sources

Detection of false data injection attacks on power systems based on measurement-eigenvalue residual similarity test

open access: yesFrontiers in Energy Research, 2023
Existing False data injection attack (FDIA) detection methods based on measurement similarity testing have difficulty in distinguishing between actual power grid accidents and FDIAs.
Yihua Zhu   +7 more
doaj   +1 more source

Preventive Dispatch Strategy Against FDIA Induced Overloads in Power Systems With High Wind Penetration

open access: yesIEEE Access, 2020
The penetration of renewable energy generations, e.g., wind power, not only introduces the randomness and fluctuations into power system operations but also increases the possibilities of cybersecurity issues.
Kehe Wu   +4 more
doaj   +1 more source

An adaptive sliding‐mode resilient control strategy in smart grid under mixed attacks

open access: yesIET Control Theory & Applications, 2021
This paper is concerned with security problems for cyber‐physical systems (CPSs) under dynamic load altering attacks (DLAA) and false data injection attacks (FDIA). The smart grid, as a typical CPS system, is taken as an example in this paper.
Jian Li   +3 more
doaj   +1 more source

A Deviation-Based Detection Method Against False Data Injection Attacks in Smart Grid

open access: yesIEEE Access, 2021
State estimation plays a vital role to ensure safe and reliable operations in smart grid. Intelligent attackers can carefully design a destructive and stealthy false data injection attack (FDIA) sequence such that commonly used weighted least squares ...
Chao Pei   +3 more
doaj   +1 more source

Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids [PDF]

open access: yes, 2015
This paper discusses malicious false data injection attacks on the wide area measurement and monitoring system in smart grids. Firstly, methods of constructing sparse stealth attacks are developed for two typical scenarios: random attacks in which ...
Chin, WH   +4 more
core   +1 more source

On addressing the security and stability issues due to false data injection attacks in DC microgrids an adaptive observer approach [PDF]

open access: yes, 2021
© 2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting /republishing this material for advertising or promotional purposes, creating new ...
Blaabjerg, Frede   +4 more
core   +4 more sources

Modified Red Fox Optimizer With Deep Learning Enabled False Data Injection Attack Detection

open access: yesIEEE Access, 2023
Recently, power systems are drastically developed and shifted towards cyber-physical power systems (CPPS). The CPPS involve numerous sensor devices which generates enormous quantities of information. The data gathered from each sensing component needs to
Hayam Alamro   +5 more
doaj   +1 more source

Detecting False Data Injection Attacks Against Power System State Estimation with Fast Go-Decomposition Approach [PDF]

open access: yes, 2019
State estimation is a fundamental function in modern energy management system, but its results may be vulnerable to false data injection attacks (FDIAs).
Chen, Ying   +5 more
core   +1 more source

False data injection attack (FDIA): An overview and new metrics for fair evaluation of its countermeasure [PDF]

open access: yes, 2020
The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically means the case when an attacker compromises sensor readings in such tricky way that undetected errors are ...
Ahmed, Mohiuddin, Pathan, Al-Sakib Khan
core   +1 more source

Home - About - Disclaimer - Privacy