2016
DOI: 10.1007/978-3-319-31664-2_18
|View full text |Cite
|
Sign up to set email alerts
|

Calculation of Cyber Security Index in the Problem of Power System State Estimation Based on SCADA and WAMS Measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…To assess the ability of a complex engineering system to withstand cyberattacks, the concept of system vulnerability level is introduced, the numerical rating of which is a vulnerability index. In [36,37], the concept of the vulnerability index of the state estimation was introduced, with the latter characterizing the degree of exposure of its results to possible errors in measuring information when cyberattacks are directed at the SCADA system. A set of indicators descriptive of the accuracy of state estimation results was used to determine the vulnerability index.…”
Section: Application Of Statistical Methods Of Information Processingmentioning
confidence: 99%
“…To assess the ability of a complex engineering system to withstand cyberattacks, the concept of system vulnerability level is introduced, the numerical rating of which is a vulnerability index. In [36,37], the concept of the vulnerability index of the state estimation was introduced, with the latter characterizing the degree of exposure of its results to possible errors in measuring information when cyberattacks are directed at the SCADA system. A set of indicators descriptive of the accuracy of state estimation results was used to determine the vulnerability index.…”
Section: Application Of Statistical Methods Of Information Processingmentioning
confidence: 99%
“…In the third case, we can determine at which node a cyberattack occurred by the value and the components of objective function (1). To eliminate the consequences of these attacks, we propose duplicating the data with WAMS measurements in real time to obtain redundant measurements [9].…”
Section: Case Studymentioning
confidence: 99%