2017
DOI: 10.1016/j.epsr.2017.04.023
|View full text |Cite
|
Sign up to set email alerts
|

Coordinated attacks on electric power systems in a cyber-physical environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
69
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 144 publications
(69 citation statements)
references
References 23 publications
0
69
0
Order By: Relevance
“…For example, attacks can guarantee the access to national infrastructures, with the consequence of interrupting essential services, such as transport, energy and financial systems. Coordinated cyber-physical attacks on critical infrastructures can be devastating and produce severe damages (Xiang et al 2017). The well-known cyberattack to Ukrainian power system in 2015 12 has shown that multiple approaches can be extremely effective, impacting remote assets both electronically and physically (Lee et al 2016).…”
Section: Physical Elements Are Neglectedmentioning
confidence: 99%
“…For example, attacks can guarantee the access to national infrastructures, with the consequence of interrupting essential services, such as transport, energy and financial systems. Coordinated cyber-physical attacks on critical infrastructures can be devastating and produce severe damages (Xiang et al 2017). The well-known cyberattack to Ukrainian power system in 2015 12 has shown that multiple approaches can be extremely effective, impacting remote assets both electronically and physically (Lee et al 2016).…”
Section: Physical Elements Are Neglectedmentioning
confidence: 99%
“…In the modest model, Wu et al [10], proposed a tri-level model and applied an instance of Bender's decomposition technique using primal cuts to achieve a more effective result. Xiang et al [11] proposed the tri-level DAD model and the solution obtained by the robust optimization approach. The attacker's damage is quantified by the load curtailment in [12], where the risk optimization method utilized to minimize the disruption's consequence.…”
Section: Introductionmentioning
confidence: 99%
“…The attacker's damage is quantified by the load curtailment in [12], where the risk optimization method utilized to minimize the disruption's consequence. Mitigating the impact of cyber-physical attack discussed in [13], and the authors examine the consequence of interrupting the transmission lines or generators in addition to load redistribution attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In these surveys, limited financial resources to repair a broken system or pay the electricity bill was implicated as a major factor. In addition to these socio-economic barriers to using AC, there is the risk of large-scale summertime power outages (Nahlik et al 2016, Moslehi and Reddy 2018, Sailor et al 2019 that are projected to increase due to climate change (Panteli and Mancarella 2015, Bartos et al 2016, van Vliet et al 2016, Burillo et al 2017 as well as the increasing vulnerability of energy grids to hacking and cyber-attacks (Xiang et al 2017). The other important factor that makes US an interesting case for this type of study is the population ageing.…”
Section: Introductionmentioning
confidence: 99%