Results 11 to 20 of about 46,655 (287)
This study presents the phasor measurement unit (PMU) placement strategy in the presence of false data injection attacks which is one of the most serious security threats against power grid.
Junhyung Bae
doaj +1 more source
Reachability-Based False Data Injection Attacks and Defence Mechanisms for Cyberpower System
With the push for higher efficiency and reliability, an increasing number of intelligent electronic devices (IEDs) and associated information and communication technology (ICT) are integrated into the Internet of Things (IoT)-enabled smart grid.
Ren Liu +3 more
doaj +1 more source
An Efficient Data-Driven False Data Injection Attack in Smart Grids [PDF]
Data-driven false data injection attack is one of the emerging techniques in smart grids, provided that the adversary can monitor the meter readings. The basic idea is constructing attack vectors from the estimated signal subspace, without knowing system measurement matrix.
Wen, F., Liu, W.
openaire +2 more sources
Robustness of Short-Term Wind Power Forecasting against False Data Injection Attacks
The accuracy of wind power forecasting depends a great deal on the data quality, which is so susceptible to cybersecurity attacks. In this paper, we study the cybersecurity issue of short-term wind power forecasting. We present one class of data attacks,
Yao Zhang, Fan Lin, Ke Wang
doaj +1 more source
Secure LQG control for a Quadrotor under false data injection attacks
The linear quadratic Gaussian (LQG) control for a quadrotor unmanned aerial vehicle (UAV) under false data injection attacks is studied. The LQG control depends on optimal state estimation, while this type of attacks makes the optimal state estimation ...
Hong Lin +4 more
doaj +1 more source
Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems [PDF]
Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the ...
Lakshminarayana, Subhash +3 more
core +2 more sources
A moving target defense to detect stealthy attacks in cyber-physical systems [PDF]
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communication patterns when compared to classical information technology networks.
Cardenas, A, Giraldo, J, Sanfelice, RG
core +1 more source
Data Collaborative Detection Scheme of Electric Metering System Based on Edge Computing
False data injection attacks are aimed at destroying the integrity and availability of power data in electric metering system. The false data detection scheme is of great significance to the secure and stable operation of smart grid.
Bin QIAN +5 more
doaj +1 more source
Coordinated False Data Injection Attacks in AGC System and Its Countermeasure
The Automatic Generation Control (AGC) system is vital for power system frequency stability. The frequency and tie-line power flow are measured and transmitted to the control room to form Area Control Error (ACE), which is then sent to each generator for
Xi He, Xuan Liu, Peng Li
doaj +1 more source
Design of False Data Injection Attack on Distributed Process Estimation [PDF]
arXiv admin note: substantial text overlap with arXiv:2002 ...
Moulik Choraria +3 more
openaire +2 more sources

