2020
DOI: 10.1109/tsg.2019.2936016
|View full text |Cite
|
Sign up to set email alerts
|

Learning Behavior of Distribution System Discrete Control Devices for Cyber-Physical Security

Abstract: Time at which devices actuates for event i t i c Time at which variable crosses upper-/lowerthreshold for event i t sampling Sampling period of controller t w Time window for events t timer Countdown timer to device actuation t f rac remain Fraction of t timer remaining when operating with an inverse time delay V lower Voltage lower threshold. V upper Voltage upper threshold. V T arget Regulator target voltage. V set User set target voltage at zero loading conditions. X Drop Voltage drop due to network reactan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Based on multi-level and multi-level theory, classify and process the data from different sources. According to the data types of different attributes, different fusion methods are adopted to provide the basis for security decision-making to realize network security situational awareness [14]. Data fusion mainly includes three levels: data fusion, feature fusion, and security decision fusion.…”
Section: Collection and Processing Of Packet Informationmentioning
confidence: 99%
“…Based on multi-level and multi-level theory, classify and process the data from different sources. According to the data types of different attributes, different fusion methods are adopted to provide the basis for security decision-making to realize network security situational awareness [14]. Data fusion mainly includes three levels: data fusion, feature fusion, and security decision fusion.…”
Section: Collection and Processing Of Packet Informationmentioning
confidence: 99%
“…SCD is used to make the power system operation process clear and visible and analyze the critical interactions in CPPS qualitatively. In [49], the usual sequential order of the control commands is modelled as { , +1 } where { 1 , 2 , … } are the defined set of transitions. The false sequential logic attack on the SCADA system changes the control commands as { +1 , }.…”
Section: (Ii) Finite State Machine (Fsm) Modelmentioning
confidence: 99%
“…The various methods of risk [41][42][43][44] and vulnerability assessment [45][46][47][48] from the component level to systemwide impacts, with cyber model assessment and physical model assessment, are performed. Substantial work on cyber-attack detection and mitigation for CPPS by monitoring the network traffic of the Supervisory Control and Data Acquisition(SCADA)/Phasor Measurement Unit(PMU) system in the power system control centre was performed in [49][50][51][52]. It forms the overall cybersecurity feature for the CPPS, which is entirely different from the traditional information security with advanced data analytics and machine learning algorithms.…”
mentioning
confidence: 99%
“…Identifying the potential and serious threats that can attack the power electronic system is a severe issue and holds various challenges [102]. Our target is to discuss the various CPS security threats in general and then on two power electronics applications, e.g., smart grid and industrial control systems.…”
Section: The Power Electronics Cps Security Threatsmentioning
confidence: 99%