2018
DOI: 10.1109/jas.2017.7510655
|View full text |Cite
|
Sign up to set email alerts
|

Cyber attack protection and control of microgrids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
48
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 100 publications
(48 citation statements)
references
References 29 publications
0
48
0
Order By: Relevance
“…More instance of coordinated attacks on large power systems and its vulnerability assessment is provided in [19], [20]. In this regard, risk assessment alongwith control vulnerabilities is crucial since the modeling of coordinated attacks for microgrids can be easier owing to their small system size without significant security measures [21], [22].…”
Section: Introductionmentioning
confidence: 99%
“…More instance of coordinated attacks on large power systems and its vulnerability assessment is provided in [19], [20]. In this regard, risk assessment alongwith control vulnerabilities is crucial since the modeling of coordinated attacks for microgrids can be easier owing to their small system size without significant security measures [21], [22].…”
Section: Introductionmentioning
confidence: 99%
“…The second step is to delete the multisensor WSN node that does not contain the incidence sensors. The third step is to compute the sensing time and transmitting time, according to Equation (10). Then, according to the time limit, an optimized WSN node that deals with the multitasking is reselected.…”
Section: Edge Computing-driven Sensing Strategy For Multiplementioning
confidence: 99%
“…With the development of agriculture, data collection becomes the main key step by WSN [8,9]. At the same time, cyberattacks of WSN are another hot topic for the researchers [10,11]. Therefore, more and more studies focus on the topic for different perspective, especially network attacks, data collection.…”
Section: Introductionmentioning
confidence: 99%
“…Based on the similarity level (by cosine similarity measure) and deviation level (by chi-square test) the FDI attack was detected. Recursive systematic convolutional (RSC) was combined with the Kalman filter in order to detect FDI attacks in SGs [29]. In such a system, the RSC code was employed to handle impairments in the system states and the Kalman filter was used for SE.…”
Section: Related Work On Fdi Attack Detectionmentioning
confidence: 99%