2013 IEEE Power &Amp; Energy Society General Meeting 2013
DOI: 10.1109/pesmg.2013.6672176
|View full text |Cite
|
Sign up to set email alerts
|

Statistical structure learning of smart grid for detection of false data injection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 10 publications
0
18
0
Order By: Relevance
“…In fact, they are stronger than Theorem 1 since we did not find any case where the LD detector results in C * (LD) such that C * (LD) = 0 and supp C * (LD) ⊆ I. (To Side) 1, 3,4,8,9,12,13,14,15,18,19,21,22,27,31,32,35,36,45,47,48,50,51,56,61,65,66,67,68,69,73,78,79,91,92,94,111,112,113,115,116,117,118,119,120,123,124,125,127,131,132,134,140,145,146,160,166,168,174,…”
Section: Numerical Resultsmentioning
confidence: 82%
“…In fact, they are stronger than Theorem 1 since we did not find any case where the LD detector results in C * (LD) such that C * (LD) = 0 and supp C * (LD) ⊆ I. (To Side) 1, 3,4,8,9,12,13,14,15,18,19,21,22,27,31,32,35,36,45,47,48,50,51,56,61,65,66,67,68,69,73,78,79,91,92,94,111,112,113,115,116,117,118,119,120,123,124,125,127,131,132,134,140,145,146,160,166,168,174,…”
Section: Numerical Resultsmentioning
confidence: 82%
“…In the smart-world systems (e.g., smart cities, smart grid, smart transportation), a number of efforts have been devoted to studying the impacts of cyber attacks as well as the development of defensive schemes [5,6,7,11,13,17,18,19,20,21,22,23,24,25,27,28,29,30,31,32]. For example, Ericsson et al [33] presented some important issues on the cyber security and information security in the energy-based cyber-physical systems.…”
Section: Related Workmentioning
confidence: 99%
“…Existing approaches on state estimation in the presence of data substitutions [3], [17], [25], [28], [36], [38] usually attempt to identify and protect some key PMUs so as to prevent the intruders from injecting unobservable attacks. To the best of our knowledge, only one recent paper [38] addresses the detection of unobservable attacks in Supervisory Control and Data Acquisition (SCADA) system.…”
Section: Data Substitutionmentioning
confidence: 99%
“…To the best of our knowledge, only one recent paper [38] addresses the detection of unobservable attacks in Supervisory Control and Data Acquisition (SCADA) system. The detection method proposed in [38] is based on statistical learning and relies on the assumption that the measurements at different time instants are independent and identically distributed samples of random variables. This assumption might not hold when the system is experiencing some disturbances.…”
Section: Data Substitutionmentioning
confidence: 99%