2018 IEEE Power &Amp; Energy Society General Meeting (PESGM) 2018
DOI: 10.1109/pesgm.2018.8586470
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Moving Target Defense against False Data Injection in Distribution Network Reconfiguration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
10
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 8 publications
1
10
0
Order By: Relevance
“…where the first four items irrelative to the line reactance are consistent with the results in [11]. We can calculate s G x by using (4) and (7)(8)(9)(10) as follows:…”
Section: A Preliminaries In Derivatives In Acopf Modelsupporting
confidence: 83%
“…where the first four items irrelative to the line reactance are consistent with the results in [11]. We can calculate s G x by using (4) and (7)(8)(9)(10) as follows:…”
Section: A Preliminaries In Derivatives In Acopf Modelsupporting
confidence: 83%
“…The modern electric grid is dependent on many cyber-physical systems, such as intelligent electronic devices and advanced metering infrastructure, to enhance systemwide command and control operations, monitor energy usage, and even help support newer DER systems; however, traditionally, electric grid communications used dedicated lines for supervisory control and data acquisition system communications, but modernization efforts and the adoption of DERs have started seeing the use of the Internet as a resilient, distributed, and cost-effective open alternative (Saleem et al 2020a;de Carvalho and Saleem 2019). The grid is evolving rapidly and developing a defense mechanism for an open alternative is a moving target that is challenging and difficult (Liu et al 2018).…”
Section: Motivation For Developing Module-otmentioning
confidence: 99%
“…Second, the optimization-based operation takes both the economic cost and the detection effectiveness into account, in which the metric of detection effectiveness is maximized or taken as constraints [128], [130]. Finally, the hidden MTD operation method delicately selects D-FACTS setpoints such that all measurements remain the same after MTD is applied [134]- [136]. In this case, vigilant attackers cannot detect the MTD in place using BDD.…”
Section: E Moving Target Defensementioning
confidence: 99%