2014
DOI: 10.1109/tsg.2014.2298195
|View full text |Cite
|
Sign up to set email alerts
|

Model-Based Attack Detection and Mitigation for Automatic Generation Control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
205
0
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 427 publications
(208 citation statements)
references
References 20 publications
1
205
0
2
Order By: Relevance
“…Some research in security of CPS has focused on assessing the effects of cyber threats against both the physical and the cyber dimension of networked critical infrastructures [34], [35] by using existing cyber-physical test-beds. These approaches focused on modelling dynamical systems such as sensors or actuators signals, for which timing concerns are fundamental.…”
Section: Secure Cyber-physical Systemsmentioning
confidence: 99%
“…Some research in security of CPS has focused on assessing the effects of cyber threats against both the physical and the cyber dimension of networked critical infrastructures [34], [35] by using existing cyber-physical test-beds. These approaches focused on modelling dynamical systems such as sensors or actuators signals, for which timing concerns are fundamental.…”
Section: Secure Cyber-physical Systemsmentioning
confidence: 99%
“…Protection Range Type [36] Substation Network-based [37] Substation Host-based [38][39][40] SCADA Network-based [41] Automatic generator control (AGC) Network-and host-based [42] Communication protocols Network-based [43] WAMS Host-based [44] Distribution system Host-based …”
Section: Idsmentioning
confidence: 99%
“…Sridhar et al [8] discussed the impact of DI attacks on power system and presented four attack modes: the scaling attack, the ramp attack, the pulse attack, and the random attack. Although there was no clear indication of the maximum or minimum limits in these attacks, the selection of the attack parameters had to satisfy the requirement that the attacks could not trigger any data quality alarms in the control center.…”
Section: Introductionmentioning
confidence: 99%