2021
DOI: 10.1016/j.cose.2021.102283
|View full text |Cite
|
Sign up to set email alerts
|

Network-based multidimensional moving target defense against false data injection attack in power system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…These types of attacks are hazardous as they can have catastrophic consequences to the system. From the literature, it has been observed that the untrusted input is given in the form of control logic, 57 command, 18,58 false data [58][59][60][61] and time delay 62 to the ICS. Majorly researchers focussed on false data injections as they are more severe and can occur in multiple ways.…”
Section: Injection Attacksmentioning
confidence: 99%
“…These types of attacks are hazardous as they can have catastrophic consequences to the system. From the literature, it has been observed that the untrusted input is given in the form of control logic, 57 command, 18,58 false data [58][59][60][61] and time delay 62 to the ICS. Majorly researchers focussed on false data injections as they are more severe and can occur in multiple ways.…”
Section: Injection Attacksmentioning
confidence: 99%
“…Traditional defense techniques, such as firewalls and intrusion detection techniques [2,3], typically rely on known attack signatures to identify and match target behaviors, leaving them at a disadvantage against unknown vulnerabilities and backdoors in cyber warfare. A series of novel proactive defense technologies are proposed to address this issue, such as honeypots [4] and Moving Target Defense (MTD) [5][6][7]. These methods effectively improved the situation and significantly increased the difficulty and cost for attackers to launch their attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, injection attacks are received a lot of attention from academics. [13][14][15][16][17][18] Considering CPSs under false data injection attacks, a new types of Nussbaum functions are introduced in the adaptive control. 13 The problem of adaptive NN finite time resilient control is investigated for nonlinear time-delay system with actuator fault and injection attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, injection attacks are received a lot of attention from academics 13‐18 . Considering CPSs under false data injection attacks, a new types of Nussbaum functions are introduced in the adaptive control 13 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation