Results 41 to 50 of about 702 (166)

Enhanced cybersecurity and cyber-attack detection in smart DC micro grids using blockchain technology and SVM technique

open access: yesAin Shams Engineering Journal
The DC-Microgrids (DC-MGs) are increasingly prone to various cyber-attacks due to the advancement of intelligent controlling, monitoring, operation methods.
Revathi Subramaniam   +2 more
doaj   +1 more source

Parameter-Free False Data Injection Attack Model on Power System’s Automatic Generation Control

open access: yesIEEE Access, 2023
Automatic generation control (AGC) plays a crucial role in frequency control and economic dispatch of electric power systems. However, AGC systems, relying heavily on frequency and tie-line power measurements, are vulnerable to cyber-attacks.
Mingqiu Du, Xiaozhe Wang, Marthe Kassouf
doaj   +1 more source

False data injection attack detection in smart grid [PDF]

open access: yes, 2022
Smart grid is a distributed and autonomous energy delivery infrastructure that constantly monitors the operational state of its overall network using smart techniques and state estimation.
Rashed, Muhammad
core   +1 more source

Detection method of false data injection attack based on unsupervised and supervised learning

open access: yes电力工程技术
False data injection attack (FDIA) is a serious threat to the security and stable operation of smart grids. In this paper, a FDIA detection algorithm that combines unsupervised and supervised learning is proposed, solving the problems of scarce labeled ...
HUANG Dongmei   +5 more
doaj   +1 more source

Conflict-driven Hybrid Observer-based Anomaly Detection

open access: yes, 2017
This paper presents an anomaly detection method using a hybrid observer -- which consists of a discrete state observer and a continuous state observer. We focus our attention on anomalies caused by intelligent attacks, which may bypass existing anomaly ...
balluchi   +10 more
core   +1 more source

Secure fusion estimation against FDI sensor attacks in cyber–physical systems

open access: yesFranklin Open
This paper is concerned with the secure fusion estimation problem in cyber–physical systems (CPSs), where false data injection attack (FDIA) is able to falsify measurement signals transmitted over network.
Pindi Weng, Bo Chen, Rusheng Wang
doaj   +1 more source

Detection and mitigation of false data injection attack in DC–DC synchronous boost converter: A real‐time implementation using shallow neural network model

open access: yesIET Power Electronics, Volume 19, Issue 1, January/December 2026.
This article proposes a neural network‐based cyber attack detection and mitigation scheme to detect and mitigate false data injection attacks on the sensors. Neural networks are used for the prediction of duty; a combination of a data sampler and a binary attack detector detects the presence of an attack.
Venkata Siva Prasad Machina   +4 more
wiley   +1 more source

Defense Strategy against False Data Injection Attacks in Ship DC Microgrids

open access: yesJournal of Marine Science and Engineering, 2022
False Data Injection Attacks (FDIA) on ship Direct Current (DC) microgrids may result in the priority trip of a large load, a black-out, and serious accidents of ship collisions when maneuvering in the port.
Hong Zeng   +3 more
doaj   +1 more source

Detection of False Data Injection Attacks in Multi-Microgrid [PDF]

open access: yes, 2021
In this thesis an Intrusion Detection System was developed to fight False Data Injection Attacks in Multi-Microgrids. Multi-Microgrids are a part of future power systems and they form the core part of critical infrastructure where resiliency and ...
Kaasalainen, Juho
core  

Resilient Energy and Flexibility Scheduling in Interconnected Local Energy Networks via AI‐Enabled Cyber‐Integrity Enhancement

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
This paper presents an AI‐enabled framework for resilient energy and flexibility scheduling in interconnected local energy networks (ILENs). By introducing a Cyber‐Connectivity Index and employing an XGBoost‐based algorithm for real‐time data correction, the model enhances operational efficiency and data integrity under cyber threats.
Ali Yazhari Kermani   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy