2017 IEEE 3rd Colombian Conference on Automatic Control (CCAC) 2017
DOI: 10.1109/ccac.2017.8276400
|View full text |Cite
|
Sign up to set email alerts
|

Resilient transactive control in microgrids under dynamic load altering attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…To summarize, using the Sylvester equation based parametrization, we can freely vary (G, β) (under Assumption 4) and compute the corresponding unique X using (13a) and the unique ∆ using (16a)-(16b). This renders (14) as an unconstrained optimization problem is variables (G, β).…”
Section: Optimal Load-altering Attacksmentioning
confidence: 99%
See 3 more Smart Citations
“…To summarize, using the Sylvester equation based parametrization, we can freely vary (G, β) (under Assumption 4) and compute the corresponding unique X using (13a) and the unique ∆ using (16a)-(16b). This renders (14) as an unconstrained optimization problem is variables (G, β).…”
Section: Optimal Load-altering Attacksmentioning
confidence: 99%
“…Next, we compute the analytical expressions for the gradient and Hessian of the cost in (14), which will be used to solve numerically the optimization problem. Let g vec(G), x v = vec(X), φ = vec(Φ), δ = vec(∆), and let the free variables of ( 14) be denoted by z…”
Section: Optimal Load-altering Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Among the researches for CPS, the system of CPS can be described as a networked control system (NCS), the models of cyber-attacks, including denialof-service (DoS), false data injection attack (FDIA), stealthy attack and replay attacks, can be formulated as a typical NCS model from control theory perspective [3]. As the traditional grid is gradually replaced by smart grids, an increasing number of smart components and new information technologies are used to improve the efficiency and reliability of power systems [4,5]. However, the usage of communication networks and information technology provides an opportunity for adversaries who can launch malicious attacks to the power system [6].…”
Section: Introductionmentioning
confidence: 99%