2019
DOI: 10.1007/978-3-030-18214-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Physical Anomaly Detection for Power Grid with Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…0: Average attention to policy access. 1: Priority attention to policy access [40] C8: Mobile connected medical devices Lack of updates or lack of patching, a common threat that can have a significant impact on the healthcare organization −1: Low Information Security maintenance 0: Average Information Security maintenance 1: High Information Security maintenance [5] C9: Supplier eligibility criteria Establish security baseline requirements and translate them into eligibility criteria when selecting suppliers The concepts allow complex and critical ecosystem threats to be exploited in a telehealth system. However, the lack or inefficiency of information security planning makes it challenging to identify cybersecurity.…”
Section: −1mentioning
confidence: 99%
“…0: Average attention to policy access. 1: Priority attention to policy access [40] C8: Mobile connected medical devices Lack of updates or lack of patching, a common threat that can have a significant impact on the healthcare organization −1: Low Information Security maintenance 0: Average Information Security maintenance 1: High Information Security maintenance [5] C9: Supplier eligibility criteria Establish security baseline requirements and translate them into eligibility criteria when selecting suppliers The concepts allow complex and critical ecosystem threats to be exploited in a telehealth system. However, the lack or inefficiency of information security planning makes it challenging to identify cybersecurity.…”
Section: −1mentioning
confidence: 99%
“…But, as CPS becomes more complex and the attack is more stealthy, this method is more difficult to ensure the status of CPS (for example, protecting multi-variate physical measurement). It requires further domain knowledge (for example, correlation and more components) [10]. An anomaly detection system needs to adapt to capture novel features of CPS.…”
Section: Introductionmentioning
confidence: 99%