2018
DOI: 10.1109/jstsp.2018.2833749
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(35 citation statements)
references
References 21 publications
0
35
0
Order By: Relevance
“…The deployment of distributed energy resources (DERs) is increasing day by day. The study in [46] presented meter fraud detection in DERs and provided a set of electricity fraud attacks. An assumption is made in this paper that the electricity thief is aware of the ETD method.…”
Section: Related Workmentioning
confidence: 99%
“…The deployment of distributed energy resources (DERs) is increasing day by day. The study in [46] presented meter fraud detection in DERs and provided a set of electricity fraud attacks. An assumption is made in this paper that the electricity thief is aware of the ETD method.…”
Section: Related Workmentioning
confidence: 99%
“…In parallel, the integration of DRES involves diverse types of data communication and systemon-chip technologies that are commonly manufactured with minimal security [23], [24]. Hence, enlarging the spectrum of cyber attacks that could be initiated such as to support potential energy theft acts [25].…”
Section: ) Distributed Renewable Energy Sources (Dres)mentioning
confidence: 99%
“…The work in [13] is extended in [14] to evaluate signal processing-based detection approaches for meter frauds in alternate resources like solar and wind grid data.…”
Section: Literature Survey On Machine Learning (Ml) Approaches For Anomaly Detection In Smart Gridmentioning
confidence: 99%