2017
DOI: 10.1109/tsg.2016.2614884
|View full text |Cite
|
Sign up to set email alerts
|

Active Synchronous Detection of Deception Attacks in Microgrid Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
13
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 47 publications
(14 citation statements)
references
References 5 publications
1
13
0
Order By: Relevance
“…It can be seen from Fig. 7(a) that by cutting off the branch (10, 11), (10,32), (19,33), (20,34), or (23,36) at the beginning, the government will pay much more for repairing the system after cascading failures. Comparing these two lines, we can also draw the conclusion that the weighted adjustment is more economical than the average one.…”
Section: Simulation In Case 2 Settingsmentioning
confidence: 99%
See 2 more Smart Citations
“…It can be seen from Fig. 7(a) that by cutting off the branch (10, 11), (10,32), (19,33), (20,34), or (23,36) at the beginning, the government will pay much more for repairing the system after cascading failures. Comparing these two lines, we can also draw the conclusion that the weighted adjustment is more economical than the average one.…”
Section: Simulation In Case 2 Settingsmentioning
confidence: 99%
“…the IEEE 118-bus system (including 54 generators, 54 loads, and 186 branches) is considered as a large standard test system to investigate the effectiveness of the proposed model approach [2]. It is assumed that utilities are divided into six regions, as 10 (a) 7 8 Cost/100 MVA shown in Fig. 9.…”
Section: Computational Complexity In This Sectionmentioning
confidence: 99%
See 1 more Smart Citation
“…By now, securing the automatic control systems of microgrids against cyber-attacks is still at an early stage. There are many open technical challenges to be addressed, such as risk assessment [8], intrusion detection [9,10], and attack - 1 mitigation [11][12][13]. Among a variety of cyber attacks, denial of service (DoS) attacks and false data injection (FDI) attacks are most reported and investigated.…”
Section: Introductionmentioning
confidence: 99%
“…The quadratic control issues toward CPSs under replay attacks were discussed in Reference 10. Resilient control and estimation design for CPSs under DI attacks has been systematically studied in References 11‐15.…”
Section: Introductionmentioning
confidence: 99%