2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) 2015
DOI: 10.1109/ssic.2015.7245325
|View full text |Cite
|
Sign up to set email alerts
|

Malicious data identification in smart grid based on residual error method

Abstract: Most of methods on malicious data identification are based on the residual in power system applications. Residual error method, which is an effective method to identify a single malicious data can be basically divided into weighted residual error method and normalized residual error method. In this paper the states and measurement estimated value can be calculated firstly by the traditional weighted least squares state estimation algorithm. Then the measurement residual and the objective function value can be … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18])…”
Section: Sms Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18])…”
Section: Sms Resultsmentioning
confidence: 99%
“…C9. Security Intrusion detection ( [8], [15], [52], [74], [76], [77], [143], [148], [209]),false data injection attacks ( [13], [16], [17], [31], [100], [119], [151], [163], [168], [184], [185], [230], [251], [257]), energy theft ( [54], [99], [169], [191], [254], [258]), distinguishing cyber-attacks from physical faults ( [18]) C10. SG failures fault status detection [41], [46], [61], [62], [126], [127], [142], [176], fault type classification [197], power distribution reliability [149], [195] As it can be seen, there is large variability in the aspects covered by the research.…”
Section: B Rq2mentioning
confidence: 99%