Distributed energy resources cybersecurity outlook: Vulnerabilities, attacks, impacts, and mitigations
I Zografopoulos, ND Hatziargyriou… - IEEE Systems …, 2023 - ieeexplore.ieee.org
The digitization and decentralization of the electric power grid are key thrusts for an
economically and environmentally sustainable future. Toward this goal, distributed energy …
economically and environmentally sustainable future. Toward this goal, distributed energy …
Impact analysis of cyber attacks on smart grid: A review and case study
This chapter presents a comprehensive review of the impacts of cyber attacks on the smart
distribution grid and discusses the potential methods in the literature to mitigate them. The …
distribution grid and discusses the potential methods in the literature to mitigate them. The …
Predictive analytics-based cybersecurity framework for cloud infrastructure
A Bhardwaj, K Kaushik - International Journal of Cloud Applications …, 2022 - igi-global.com
The most valuable asset for any organization and individual is data and the information it
holds. This is the main reason for Information Security to be the top concern in boardrooms …
holds. This is the main reason for Information Security to be the top concern in boardrooms …
Technological Perspective of Cyber Secure Smart Inverters Used in Power Distribution System: State of the Art Review
S Surya, MK Srinivasan, S Williamson - Applied Sciences, 2021 - mdpi.com
The purpose of smart grid architecture as compared to the conventional grid is to ensure
more stability, reliability and bi-directional communication between the utility and the …
more stability, reliability and bi-directional communication between the utility and the …
Intrusion detection for cybersecurity of power electronics dominated grids: Inverters PQ set-points manipulation
A Khan, M Hosseinzadehtaher… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
This work provides cybersecurity analytics for a high photovoltaic (PV) penetrated
distribution network, representing future power electronics dominated grid (PEDG). Firstly …
distribution network, representing future power electronics dominated grid (PEDG). Firstly …
Artificial intelligence based anomaly detection and classification for grid-interactive cascaded multilevel inverters
M Baker, H Althuwaini… - 2022 3rd International …, 2022 - ieeexplore.ieee.org
The cascaded multi-level inverter (CMI) is becoming increasingly popular for wide range of
applications in power electronics dominated grid (PEDG). The increased number of …
applications in power electronics dominated grid (PEDG). The increased number of …
An observer based intrusion detection framework for smart inverters at the grid-edge
Z Zhang, M Easley… - 2020 IEEE Energy …, 2020 - ieeexplore.ieee.org
This paper presents an observer based predictive control scheme for grid-interactive
inverters with intrusion detection capability. The proposed framework is robust to potential …
inverters with intrusion detection capability. The proposed framework is robust to potential …
Intrusion Detection System for Multilayer-Controlled Power Electronics-Dominated Grid
This article presents an intrusion detection system (IDS) for a multi-layer-controlled power
electronics-dominated grid (PEDG). This IDS improves the situational awareness of PEDG …
electronics-dominated grid (PEDG). This IDS improves the situational awareness of PEDG …
Investigation of false data injection attacks on smart inverter settings
With drive towards renewable-heavy smart grid, the use of smart inverters to provide grid
support services is becoming more attractive. The dynamic operation of smart inverters (SI) …
support services is becoming more attractive. The dynamic operation of smart inverters (SI) …
Anomaly detection in distribution power system based on a condition monitoring vector and ultra-short demand forecasting
M Hosseinzadehtaher, A Khan… - 2020 IEEE …, 2020 - ieeexplore.ieee.org
This paper presents a proactive intrusion detection system (IDS) for smart distribution power
systems. The considered attack scenario is manipulation of the advanced measuring …
systems. The considered attack scenario is manipulation of the advanced measuring …