2016 IEEE Global Conference on Signal and Information Processing (GlobalSIP) 2016
DOI: 10.1109/globalsip.2016.7905958
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive statistical detection of false data injection attacks in smart grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…Vector Autoregression (VAR) [8], and Kalman filters (KF) [9] are two such examples. For Quasi-static models, some examples include using Media Filtering (MF) [10] and Kriging Estimator (KE) [11]. This work is more concerned with the state-of-the-art deep learning approaches for FDIA detection, and those approaches fall majorly in the category of data-driven algorithms.…”
Section: Model-based Algorithms For Fdia Detectionmentioning
confidence: 99%
“…Vector Autoregression (VAR) [8], and Kalman filters (KF) [9] are two such examples. For Quasi-static models, some examples include using Media Filtering (MF) [10] and Kriging Estimator (KE) [11]. This work is more concerned with the state-of-the-art deep learning approaches for FDIA detection, and those approaches fall majorly in the category of data-driven algorithms.…”
Section: Model-based Algorithms For Fdia Detectionmentioning
confidence: 99%
“…In [149], the authors model the False Data Injection Attack, enabling the design of model-based detection schemes. The authors in [51][52][53][54][55][56][57][58][59][60][61] present static stateestimation techniques. In [62][63][64][65][66][67][68][69][70][71][72][73][74][75][76][77], some dynamic state-estimation techniques are presented.…”
Section: Potential Countermeasures For Availability Threatsmentioning
confidence: 99%
“…FDIAs in power grids were first introduced a decade ago by [7], which showed that an attacker with enough knowledge of the grid topology can design an unobservable attack that satisfies the power flow equations and bypasses the BDD module. Influential reference [7] prompted an increased interest in detection of FDIAs [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20], [21].…”
Section: Introductionmentioning
confidence: 99%
“…Survey [26] classifies the FDIA detection algorithms into two categories: model-based methods [12], [13], [14], [15], [16] and data-driven methods [17], [18], [19], [20], [21]. In general, model-based algorithms require first to build a system model and estimate its parameters to detect FDIAs.…”
Section: Introductionmentioning
confidence: 99%