2022
DOI: 10.1109/tsg.2022.3156445
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Bilevel False Data Injection Attack Model Based on Pre- and Post- Dispatch

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 7 publications
(16 reference statements)
0
3
0
Order By: Relevance
“…In the LR attack model, extensive attention has been paid to constructing a representative attack vector and investigating the system response (Yuan et al, 2011;Gao et al, 2022). LR attack against state estimation was first proposed by Liu et al ((2011), which is a coordinated cyberattack against state estimation.…”
Section: Methodsmentioning
confidence: 99%
“…In the LR attack model, extensive attention has been paid to constructing a representative attack vector and investigating the system response (Yuan et al, 2011;Gao et al, 2022). LR attack against state estimation was first proposed by Liu et al ((2011), which is a coordinated cyberattack against state estimation.…”
Section: Methodsmentioning
confidence: 99%
“…In the LR attack model, extensive attention has been paid to constructing a representative attack vector and investigating the system response (Yuan et al, 2011;Liu et al, 2015;Gao et al, 2022). LR attack against state estimation was first proposed by Liu et al ((2011), which is a coordinated cyberattack against state estimation.…”
Section: Introductionmentioning
confidence: 99%
“…In the work of Liu and Li (2014) and , the concept of an attack zone is introduced, and the regional LR attack model is proposed. In the work of Gao et al (2022), an LR attack model was built based on pre-and post-dispatch, which can lead the system to an uneconomic and insecure operating state. In the work of , a simple approach was used to determine an effective attack vector to change the load data sent to the control center.…”
Section: Introductionmentioning
confidence: 99%
“…In the previous studies of cascading failure, the attack is simplified as Denial-of-Service attack, directly malfunctioning the targeted cyber nodes, and breaking down the connected physical nodes through coupling links [13][14][15]. However, most attacks in reality are secluded, and stealthily destroy systems through falsifying received systems data, like false data injection attack [21][22][23].…”
mentioning
confidence: 99%