2021
DOI: 10.1109/access.2021.3122009
|View full text |Cite
|
Sign up to set email alerts
|

Big Data-Driven Detection of False Data Injection Attacks in Smart Meters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(14 citation statements)
references
References 36 publications
0
14
0
Order By: Relevance
“…Much research has been done using the data-driven approach using data preparation classifier modelling. For example, a data-driven technique is applied in reference [12] using machine learning, deep learning, and parallel computing techniques to detect malicious electricity users. A Turkish smart grid dataset is chosen for the model implementation and detection of false data injection.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Much research has been done using the data-driven approach using data preparation classifier modelling. For example, a data-driven technique is applied in reference [12] using machine learning, deep learning, and parallel computing techniques to detect malicious electricity users. A Turkish smart grid dataset is chosen for the model implementation and detection of false data injection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bernoulli naive Bayes classifier (NBC) uses naive Bayes theorem for independent feature identification [43]. The mathematical form of Bayes rule is stated in Equation (12).…”
Section: Bernoulli Naive Byes Classifiermentioning
confidence: 99%
“…Extensive academic and industrial investigations have been carried out on cyber-attacks and their effects on smart grid networks. The research community has developed different methods of detecting these attacks and has studied the failure propagations they have caused [12], [13], [18]- [21].…”
Section: Related Workmentioning
confidence: 99%
“…The Temporal Failure Propagation Graph (TFPG) approach is utilized in the second stage to build attack pathways for detecting attack events. In [21], the authors proposed an attack detection framework using supervised machine-learning and deep learning algorithms to assess secured and unsecured networks.…”
Section: Related Workmentioning
confidence: 99%
“…In this context, investigations on false data injection attacks (FDIAs) on smart grids have gained relevance. Reference [14] highlights that most of the attacks on smart grids usually lead to false data injection; then, many detection algorithms are developed, as in [15][16][17][18], while evaluating the effects of false data on power systems is a less investigated topic. Moreover, FDIA detection algorithms are often tested against manually calculated anomalous profiles that do not consider probabilistic scenarios, as in [17].…”
Section: Introductionmentioning
confidence: 99%