Comprehensive survey and taxonomies of false data injection attacks in smart grids: attack models, targets, and impacts
Smart Grid is organically growing over the centrally controlled power system and becoming
a massively interconnected cyber–physical system with advanced technologies of fast …
a massively interconnected cyber–physical system with advanced technologies of fast …
Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center
V Grechaninov, H Hulak, VY Sokolov… - … Trends on the …, 2022 - elibrary.kubg.edu.ua
In modern conditions of abrupt changes in the military-political situation, the problem of
ensuring the security and cyber protection of computer systems of situational centers of …
ensuring the security and cyber protection of computer systems of situational centers of …
Securing the grid: A comprehensive analysis of cybersecurity challenges in PMU-based cyber-physical power networks
The threat of cyber-attacks poses a considerable risk to Phasor Measurement Unit (PMU)
applications within Cyber-Physical Power Networks (CPPNs), leaving them susceptible to …
applications within Cyber-Physical Power Networks (CPPNs), leaving them susceptible to …
Coordinated cyber-physical attack considering false overload of lines
J Yang, G Sun, J Yin - Protection and Control of Modern Power …, 2022 - ieeexplore.ieee.org
The application of many sensor devices and complex information communication networks
in a power system brings new potential threats to the electrical cyber-physical system. In this …
in a power system brings new potential threats to the electrical cyber-physical system. In this …
A method for analyzing Stackelberg attack–defense game model in 5G by tCPSO
The development of 5G brings convenience to people, but it also brings threats. It is
particularly important to analyze attack–defense confrontation from a macro perspective …
particularly important to analyze attack–defense confrontation from a macro perspective …
Vector auto-regression-based false data injection attack detection method in edge computing environment
With the wide application of advanced communication and information technology, false
data injection attack (FDIA) has become one of the significant potential threats to the security …
data injection attack (FDIA) has become one of the significant potential threats to the security …
Stochastic encryption against stealthy attacks in CPSs: A zero-sum game approach
The zero-sum game-based stochastic encryption problem for cyber–physical systems
(CPSs) under stealthy attacks is investigated in this paper. Firstly, a deterministic encryption …
(CPSs) under stealthy attacks is investigated in this paper. Firstly, a deterministic encryption …
Scaled consensus of heterogeneous multi-agent systems under asynchronous DoS attacks
H Dai, L Ji, X Guo, Y Xie, H Li - Information Sciences, 2024 - Elsevier
This paper addresses the issue of scaled consensus in heterogeneous multi-agent systems
(HMASs) under asynchronous Denial-of-Service (DoS) attacks. In the system structure, our …
(HMASs) under asynchronous Denial-of-Service (DoS) attacks. In the system structure, our …
电力CPS 多阶段低代价虚假数据注入攻击方法.
伊娜, 徐建军, 陈月, 潘飞宇 - Zhejiang Electric Power, 2023 - search.ebscohost.com
随着信息和通信技术的快速发展, 电力系统已发展为信息系统和物理系统深度耦合的CPS
(信息物理系统), 信息流与电力流的不断交互使电网面临着潜在的网络攻击风险. 以PMU …
(信息物理系统), 信息流与电力流的不断交互使电网面临着潜在的网络攻击风险. 以PMU …
[HTML][HTML] An improved GraphSAGE to detect power system anomaly based on time-neighbor feature
C Chen, Q Li, L Chen, Y Liang, H Huang - Energy Reports, 2023 - Elsevier
With the development of smart grids, more and more information appears in power systems.
Therefore, information security has attracted more attention, since malicious attacks aimed at …
Therefore, information security has attracted more attention, since malicious attacks aimed at …