2023
DOI: 10.1016/j.segan.2023.101027
|View full text |Cite
|
Sign up to set email alerts
|

Early detection of cyber–physical attacks on fast charging stations using machine learning considering vehicle-to-grid operation in microgrids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…To enhance e ciency in anti-phishing techniques, [23] presents an improved predictive model based on machine learning, utilizing six different algorithms and [24] focuses on cyberattacks related to fast-charging stations and introduces a machine learning-based approach for early detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…To enhance e ciency in anti-phishing techniques, [23] presents an improved predictive model based on machine learning, utilizing six different algorithms and [24] focuses on cyberattacks related to fast-charging stations and introduces a machine learning-based approach for early detection.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The baseline settings of both frequencies and voltages are changed after 0.1 s, while RL-oriented methods keep the rest of the systems in check. To research the delayed advantage-actor dissent-oriented MAS RL technique described in 166 , a four-line rechargeable ESD simulation was carried out. When harmonic frequency management and SOC balance synchronization can be done jointly in the face of DoS attacks, the suggested system can attain its full potential as a system.…”
Section: Advance Hierarchical Controlmentioning
confidence: 99%
“…The author [8] proposed an intrusion detection approach to early detect the cyber-physical attacks targeting Fast Charging Station (FCS) considering Vehicle-to-Grid (V2G) operation. In this discreate power samples data is used and use the Gini index for calculation of power mid-point and then use the DT for the detection of DoS attack.…”
Section: Literature Surveymentioning
confidence: 99%