2015
DOI: 10.1007/978-3-662-45928-7_11
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Attacks in the Automatic Generation Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
21
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 18 publications
0
21
0
Order By: Relevance
“…Many studies are devoted to the models and methods of detection based on the use of Markov chains [20][21][22][23]. The typical disadvantage of most SRCA that are proposed in these studies is lack of an opportunity to quickly replenish the repository of cyberattacks' patterns, as they almost always use only one methodology of recognition.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Many studies are devoted to the models and methods of detection based on the use of Markov chains [20][21][22][23]. The typical disadvantage of most SRCA that are proposed in these studies is lack of an opportunity to quickly replenish the repository of cyberattacks' patterns, as they almost always use only one methodology of recognition.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…In the above studies, which are of interest in solving the problems of identifying cyberattacks, the models used are based only on information about query inflows and saturation streams [6,8,15,16,20]. Recent cyberattacks have become extremely complex.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…On the other hand, this transformation has introduced a high dependence on data communications, as the control loops involved in the new LFC would use communication networks such as the supervisory control and data acquisition (SCADA) system to transmit measurements and control data. However, the communication channels in the SCADA network for data exchange, especially the ones for wide-area measurements, are usually unprotected, leaving the LFC system more exposed to cyber threats [4][5][6]. In fact, it has been reported that the conventional LFC loops of multi-area systems with pure AC interconnections can be vulnerable to a large number of malicious intrusions [7,8].…”
Section: Introductionmentioning
confidence: 99%
“…The applicability of reachability analysis in power systems has been reported in a wide range of applications, such as, cyber-security [4], [5], assessment of conventional power plants [6] and wind turbines [7], load flow and static performance [8], [9], reachability-based control synthesis [10], [11], estimation of stability regions [12], [13], and transient stability analysis [14], the main focus of this paper. Transient stability analysis dates back to the 1920s [15] and is widely recognized technically and historically among theorists and practitioners alike as the most problematic issue when considering the dynamic security assessment of power systems [16].…”
Section: Introductionmentioning
confidence: 99%