Results 31 to 40 of about 46,655 (287)

Security Against False Data-Injection Attack in Cyber-Physical Systems [PDF]

open access: yesIEEE Transactions on Control of Network Systems, 2020
In this paper, secure, remote estimation of a linear Gaussian process via observations at multiple sensors is considered. Such a framework is relevant to many cyber-physical systems and internet-of-things applications. Sensors make sequential measurements that are shared with a fusion center; the fusion center applies a certain filtering algorithm to ...
Arpan Chattopadhyay, Urbashi Mitra
openaire   +2 more sources

Deep learning-based identification of false data injection attacks on modern smart grids

open access: yesEnergy Reports, 2022
With the rapid adoption of renewables within the conventional power grid, the need of real-time monitoring is inevitable. State estimation algorithms play a significant role in defining the current operating scenario of the grid.
Debottam Mukherjee   +3 more
doaj   +1 more source

Location Detection of False Data Injection Attacks in Power Grid Based on Improved Deep Extreme Learning Machine

open access: yes发电技术
ObjectivesPower systems are facing threats of false data injection attacks. Existing detection methods for false data injection attacks have the problems of insufficient feature learning ability and slow detection speed, making it difficult to locate ...
XI Lei   +3 more
doaj   +1 more source

Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise

open access: yes, 2016
In this paper, we consider the problems of state estimation and false data injection detection in smart grid when the measurements are corrupted by colored Gaussian noise.
He, Haibo   +3 more
core   +1 more source

Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements

open access: yes, 2016
The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge,
Anwar, Adnan   +2 more
core   +1 more source

Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid

open access: yesIEEE Access, 2017
Internet of Things (IoT) technologies have been broadly applied in smart grid for monitoring physical or environmental conditions. Especially, state estimation is an important IoT-based application in smart grid, which is used in system monitoring to get
Ruzhi Xu   +5 more
doaj   +1 more source

Load frequency control under false data inject attacks based on multi-agent system method in multi-area power systems

open access: yesInternational Journal of Distributed Sensor Networks, 2022
This article considers the load frequency control of multi-area power system-based multi-agent system method under false data injection attacks. The research can provide better solutions for multi-area power system load frequency control under false data
Tengfei Weng   +6 more
doaj   +1 more source

A Deviation-Based Detection Method Against False Data Injection Attacks in Smart Grid

open access: yesIEEE Access, 2021
State estimation plays a vital role to ensure safe and reliable operations in smart grid. Intelligent attackers can carefully design a destructive and stealthy false data injection attack (FDIA) sequence such that commonly used weighted least squares ...
Chao Pei   +3 more
doaj   +1 more source

Data-driven control against false data injection attacks

open access: yesAutomatica
The rise of cyber-security concerns has brought significant attention to the analysis and design of cyber-physical systems (CPSs). Among the various types of cyberattacks, denial-of-service (DoS) attacks and false data injection (FDI) attacks can be easily launched and have become prominent threats.
Liu, Wenjie   +5 more
openaire   +3 more sources

Intelligent data attacks against power systems using incomplete network information: a review

open access: yesJournal of Modern Power Systems and Clean Energy, 2018
With the integration of information technologies, power system operations are increasingly threatened by cyber-attacks. It has even been revealed that an attacker can inject false data into real-time measurements stealthily without knowing the full ...
Yufei SONG   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy