2018
DOI: 10.1109/access.2018.2812812
|View full text |Cite
|
Sign up to set email alerts
|

A Method for Identifying Critical Elements of a Cyber-Physical System Under Data Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(26 citation statements)
references
References 44 publications
1
25
0
Order By: Relevance
“…F2 is a distance protection function containing nine LNs. Once the impedance, admittance, or reactance of the line calculated by the TCTR and TVTR exceeds the preset PDIS limit, the line distance protection will be triggered and the XCBR will be open [18]. The modified hypergraph model of an SAS describes the connection between two LNs by edge and the relation between LNs and functions by hyperedge, which overcomes the drawbacks of simple graph or hypergraph methods.…”
Section: Modified Hypergraph Model Of the Sasmentioning
confidence: 99%
See 3 more Smart Citations
“…F2 is a distance protection function containing nine LNs. Once the impedance, admittance, or reactance of the line calculated by the TCTR and TVTR exceeds the preset PDIS limit, the line distance protection will be triggered and the XCBR will be open [18]. The modified hypergraph model of an SAS describes the connection between two LNs by edge and the relation between LNs and functions by hyperedge, which overcomes the drawbacks of simple graph or hypergraph methods.…”
Section: Modified Hypergraph Model Of the Sasmentioning
confidence: 99%
“…Hypergraph theory has been used to model the logical structure of SASs because it makes modeling a network with heterogeneous nodes or a network of networks feasible. In our previous research work [18], each logical function consisting of several logical nodes in an SAS is defined as a hyperedge in hypergraph theory. Then the efficiency indexes are defined by choosing some indexes from the hyper-network model of each SAS.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…However, standard machine learning algorithms typically assume clean labels and overlook the risk of noisy labels. Moreover, recent studies point out the increasing dirty data attacks that can maliciously alter the anomaly labels to mislead the machine learning models [10], [15], [18]. As a result, anomaly detection algorithms need to capture not only anomalies that are entangled with system dynamics but also the unreliable nature of anomaly labels.…”
Section: Introductionmentioning
confidence: 99%