Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey
H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …
society, and wireless services become increasingly important as the applications of wireless …
Application of big data and machine learning in smart grid, and associated security concerns: A review
This paper conducts a comprehensive study on the application of big data and machine
learning in the electrical power grid introduced through the emergence of the next …
learning in the electrical power grid introduced through the emergence of the next …
Power system dynamic state estimation: Motivations, definitions, methodologies, and future work
This paper summarizes the technical activities of the Task Force on Power System Dynamic
State and Parameter Estimation. This Task Force was established by the IEEE Working …
State and Parameter Estimation. This Task Force was established by the IEEE Working …
Cyber security threats and vulnerabilities: a systematic mapping study
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …
cyber applications and to avoid key security threats faced by these applications. The goal of …
Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid
Cybersecurity and resiliency of wide-area monitoring, protection, and control (WAMPAC)
applications is critically important to ensure secure, reliable, and economical operation of …
applications is critically important to ensure secure, reliable, and economical operation of …
State of the art of cyber-physical systems security: An automatic control perspective
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Cybersecurity for distributed energy resources and smart inverters
The increased penetration of distributed energy resources (DER) will significantly increase
the number of devices that are owned and controlled by consumers and third‐parties. These …
the number of devices that are owned and controlled by consumers and third‐parties. These …
Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
Q Su, H Wang, C Sun, B Li, J Li - Applied Mathematics and Computation, 2022 - Elsevier
In modern power systems, the connection between cyber part and physical part is more and
more close and deeply coupled, while cyber-physical power systems (CPPS) can exactly …
more close and deeply coupled, while cyber-physical power systems (CPPS) can exactly …
Attack detection and identification for automatic generation control systems
A Ameli, A Hooshyar, EF El-Saadany… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Integrating today's power systems with communication infrastructure makes them vulnerable
to cyber-attacks, which can disrupt their normal operation undetectable. Automatic …
to cyber-attacks, which can disrupt their normal operation undetectable. Automatic …
Physical layer security for the smart grid: Vulnerabilities, threats, and countermeasures
Smart energy systems are becoming an important component of smart cities. The wide
adoption of existing computing technologies and communication standards by a smart …
adoption of existing computing technologies and communication standards by a smart …