2018
DOI: 10.1109/tbdata.2016.2616146
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Analysis-Based Security Situational Awareness for Smart Grid

Abstract: Advanced communications and data processing technologies bring great benefits to the smart grid. However, cybersecurity threats also extend from the information system to the smart grid. The existing security works for smart grid focus on traditional protection and detection methods. However, a lot of threats occur in a very short time and overlooked by exiting security components. These threats usually have huge impacts on smart gird and disturb its normal operation. Moreover, it is too late to take action to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 120 publications
(62 citation statements)
references
References 22 publications
0
54
0
Order By: Relevance
“…The algorithm is that a × self-invertible matrix is generated as the key matrix of this algorithm, then dividing the original image into × block image. The th pixels of each image block will be grouped together and make up a temporary × image block, it is convenient for future encryption operation [20][21][22][23]. The temporary image matrix is encrypted with the key matrix , transposing the encryption image matrix and double-layer encrypting the matrix and putting the obtained matrix into the th position of the final encryption matrix.…”
Section: Resultsmentioning
confidence: 99%
“…The algorithm is that a × self-invertible matrix is generated as the key matrix of this algorithm, then dividing the original image into × block image. The th pixels of each image block will be grouped together and make up a temporary × image block, it is convenient for future encryption operation [20][21][22][23]. The temporary image matrix is encrypted with the key matrix , transposing the encryption image matrix and double-layer encrypting the matrix and putting the obtained matrix into the th position of the final encryption matrix.…”
Section: Resultsmentioning
confidence: 99%
“…For security threats that occur in short time, a security situational awareness technique was proposed in [299], which uses fuzzy cluster analysis based on game theory and reinforcement learning to enhance security in smart grids. A big data computing architecture for smart grids was proposed [239], [240], [241] [262], [263], [264], [242] Minimizing number of relay transmissions…”
Section: A Smart Gridsmentioning
confidence: 99%
“…The proposed algorithms can be applied in many practical applications [36,37,38,39,40,41,42]. In this section, we conduct some typical applications about sparse image recovery and medical imaging to extend the applications of L1/2 and L2/3 regularizations and illustrate the excellent robustness and adaptation of the proposed SAITA-Lp, (p{1/2, 2/3}) algorithm.…”
Section: Practical Experimentsmentioning
confidence: 99%