2016
DOI: 10.1049/iet-cta.2015.1147
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive cyber‐physical system attack detection and reconstruction with application to power systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
65
0
4

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 144 publications
(72 citation statements)
references
References 20 publications
0
65
0
4
Order By: Relevance
“…In the second approach, the incorrect data are isolated and removed once the attack is detected. So far, there are four detection schemes in cyber system: (1) Bayesian detection [308][309][310]; (2) weighted least square (WLS) [311][312][313][314]; (3) Kalman filters-basedχ2-detector [315,316]; and (4) quasi-FDI (fault detection and isolation) techniques [317,318].…”
Section: Type Of Attack Mathematical Modelmentioning
confidence: 99%
“…In the second approach, the incorrect data are isolated and removed once the attack is detected. So far, there are four detection schemes in cyber system: (1) Bayesian detection [308][309][310]; (2) weighted least square (WLS) [311][312][313][314]; (3) Kalman filters-basedχ2-detector [315,316]; and (4) quasi-FDI (fault detection and isolation) techniques [317,318].…”
Section: Type Of Attack Mathematical Modelmentioning
confidence: 99%
“…In Example 4.1, the effectiveness of the designed observer for system (1) will be tested. The IEEE 6 bus power system modified from Ao et al (2016) is considered.…”
Section: Simulation Examplesmentioning
confidence: 99%
“…In this section, in order to verify the effectiveness of the proposed scheme, firstly, we consider the IEEE 6 bus power system with three generators and six buses in the work of Pasqualetti et al where the block diagram of the system is shown in Figure . By utilizing the small signal approach, a Kron‐reduced form of the power system is given in the work of Ao et al []arrayδ̇(t)arrayMgω̇(t)=[]array0arrayIarrayLgILII1LIgLggarrayDg[]arrayδ(t)arrayω(t)+[]array0array0arrayIarrayLgILII1[]arrayPω(t)ωd(t)DgarrayPθ, …”
Section: Simulation Examplementioning
confidence: 99%
“…Hence, the security of CPSs has also gained increasing attention. 9,10 Recently, the CPS security is mainly studied from three aspects: the malicious attacks themselves, attack detection and estimation, and reliable control. For instance, in order to provide a reasonable defensive strategy in theory, from the viewpoint of the adversary, various attack policies were investigated in other works, [11][12][13][14] and then, the effect of the attacks on the system control (or remote state estimation) performance was analyzed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation