2019
DOI: 10.1109/tifs.2019.2902822
|View full text |Cite
|
Sign up to set email alerts
|

Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
92
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 198 publications
(92 citation statements)
references
References 59 publications
0
92
0
Order By: Relevance
“…As mentioned above, the CCDA can be modeled to deceive the BDD with the ultimate objective being to falsify single or multiple system states. We assumed that the attacker has complete knowledge of the topology of the power network, and the attack is initiated following the model described in [6]. The attack formulation is explained in Section 2.…”
Section: Power System Data and Attack Data Generationmentioning
confidence: 99%
See 3 more Smart Citations
“…As mentioned above, the CCDA can be modeled to deceive the BDD with the ultimate objective being to falsify single or multiple system states. We assumed that the attacker has complete knowledge of the topology of the power network, and the attack is initiated following the model described in [6]. The attack formulation is explained in Section 2.…”
Section: Power System Data and Attack Data Generationmentioning
confidence: 99%
“…Thus, the time consumed in detection can be saved; however, all measurement samples are reconstructed in this scheme, whether they were attacked or not. To extend our previous work from detection [6,25,26] to mitigation, in this paper, we propose a deep neural network (DNN)-based data reconstruction scheme (Scheme-III) to mitigate the impacts of a CCDA on the SG's measurement dataset.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, data-driven approaches have recently been applied to FDI attacks, although mostly from the defenders perspective [10] [11]. In [12], singular value decomposition is used to construct attack vectors without knowing the underlying system measurement matrix.…”
Section: Introductionmentioning
confidence: 99%