Results 41 to 50 of about 46,655 (287)
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang +3 more
core +1 more source
PMU Placement in Electric Transmission Networks for Reliable State Estimation against False Data Injection Attacks [PDF]
Currently the false data injection (FDI) attack bring direct challenges in synchronized phase measurement unit (PMU) based network state estimation in wide-area measurement system (WAMS), resulting in degraded system reliability and power supply security.
Hao, W +5 more
core +1 more source
A Novel Diagnosis Scheme against Collusive False Data Injection Attack
The collusive false data injection attack (CFDIA) is a false data injection attack (FIDA), in which false data are injected in a coordinated manner into some adjacent pairs of captured nodes of an attacked wireless sensor network (WSN). As a result, the defense of WSN against a CFDIA is much more difficult than defense against ordinary FDIA. This paper
Jiamin Hu, Xiaofan Yang, Luxing Yang
openaire +3 more sources
Energy Market Manipulation via False-Data Injection Attacks: A Review
Locational Marginal Prices (LMPs) are critical indicators in modern energy markets, representing the cost of delivering electricity at specific locations while considering the generation and transmission constraints.
Ghadeer O. Alsharif +2 more
doaj +1 more source
Applying an Ethical Lens to the Treatment of People With Multiple Sclerosis
ABSTRACT The practice of neurology requires an understanding of clinical ethics for decision‐making. In multiple sclerosis (MS) care, there are a wide range of ethical considerations that may arise. These involve shared decision‐making around selection of a disease‐modifying therapy (DMT), risks and benefits of well‐studied medications in comparison to
Methma Udawatta, Farrah J. Mateen
wiley +1 more source
HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj +1 more source
Detection-based active defense of biased injection attack based on robust adaptive controller
As the promising technology, the cooperative cyber-physical system can enhance the operating efficiency and reliability of smart grids. Meanwhile, the characteristics that deep integration of cyber-physical system can make smart grid face new security ...
Xinyu Wang +3 more
doaj +1 more source
Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
Deep neural networks (DNN) are known to be vulnerable to adversarial attacks. Numerous efforts either try to patch weaknesses in trained models, or try to make it difficult or costly to compute adversarial examples that exploit them.
Li, Bo +5 more
core +1 more source
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy +9 more
wiley +1 more source
The false data injection attack can tamper with the measurement information collected by the Supervisory Control and Data Acquisition, threat the security of state estimation. Therefore, the analysing methods and detection methods of false data injection
Yuancheng Li +3 more
doaj +1 more source

