Results 11 to 20 of about 46,655 (287)

Cost-Effective Placement of Phasor Measurement Units to Defend against False Data Injection Attacks on Power Grid

open access: yesEnergies, 2020
This study presents the phasor measurement unit (PMU) placement strategy in the presence of false data injection attacks which is one of the most serious security threats against power grid.
Junhyung Bae
doaj   +1 more source

Reachability-Based False Data Injection Attacks and Defence Mechanisms for Cyberpower System

open access: yesEnergies, 2022
With the push for higher efficiency and reliability, an increasing number of intelligent electronic devices (IEDs) and associated information and communication technology (ICT) are integrated into the Internet of Things (IoT)-enabled smart grid.
Ren Liu   +3 more
doaj   +1 more source

An Efficient Data-Driven False Data Injection Attack in Smart Grids [PDF]

open access: yes2018 IEEE 23rd International Conference on Digital Signal Processing (DSP), 2018
Data-driven false data injection attack is one of the emerging techniques in smart grids, provided that the adversary can monitor the meter readings. The basic idea is constructing attack vectors from the estimated signal subspace, without knowing system measurement matrix.
Wen, F., Liu, W.
openaire   +2 more sources

Robustness of Short-Term Wind Power Forecasting against False Data Injection Attacks

open access: yesEnergies, 2020
The accuracy of wind power forecasting depends a great deal on the data quality, which is so susceptible to cybersecurity attacks. In this paper, we study the cybersecurity issue of short-term wind power forecasting. We present one class of data attacks,
Yao Zhang, Fan Lin, Ke Wang
doaj   +1 more source

Secure LQG control for a Quadrotor under false data injection attacks

open access: yesIET Control Theory & Applications, 2022
The linear quadratic Gaussian (LQG) control for a quadrotor unmanned aerial vehicle (UAV) under false data injection attacks is studied. The LQG control depends on optimal state estimation, while this type of attacks makes the optimal state estimation ...
Hong Lin   +4 more
doaj   +1 more source

Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]

open access: yes, 2017
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash   +3 more
core   +2 more sources

A moving target defense to detect stealthy attacks in cyber-physical systems [PDF]

open access: yes, 2019
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communication patterns when compared to classical information technology networks.
Cardenas, A, Giraldo, J, Sanfelice, RG
core   +1 more source

Data Collaborative Detection Scheme of Electric Metering System Based on Edge Computing

open access: yesZhongguo dianli, 2019
False data injection attacks are aimed at destroying the integrity and availability of power data in electric metering system. The false data detection scheme is of great significance to the secure and stable operation of smart grid.
Bin QIAN   +5 more
doaj   +1 more source

Coordinated False Data Injection Attacks in AGC System and Its Countermeasure

open access: yesIEEE Access, 2020
The Automatic Generation Control (AGC) system is vital for power system frequency stability. The frequency and tie-line power flow are measured and transmitted to the control room to form Area Control Error (ACE), which is then sent to each generator for
Xi He, Xuan Liu, Peng Li
doaj   +1 more source

Design of False Data Injection Attack on Distributed Process Estimation [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2022
arXiv admin note: substantial text overlap with arXiv:2002 ...
Moulik Choraria   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy