2020
DOI: 10.1109/tsg.2019.2930241
|View full text |Cite
|
Sign up to set email alerts
|

CP-SAM: Cyber-Physical Security Assessment Metric for Monitoring Microgrid Resiliency

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(38 citation statements)
references
References 26 publications
0
30
0
Order By: Relevance
“…The physical systems measurements mainly consist of analog data and status data: the status data comprises the smart grid components; the analog data represent the system dynamics measurements. Basically, in the measurements, operators determine the optimum control strategies as well as produce the control commands for coordinating the actuators in the physical systems [85].…”
Section: Cp Viewpoint Of Networked Smart Grid Security a Smart Gmentioning
confidence: 99%
“…The physical systems measurements mainly consist of analog data and status data: the status data comprises the smart grid components; the analog data represent the system dynamics measurements. Basically, in the measurements, operators determine the optimum control strategies as well as produce the control commands for coordinating the actuators in the physical systems [85].…”
Section: Cp Viewpoint Of Networked Smart Grid Security a Smart Gmentioning
confidence: 99%
“…Some studies have been done on the cyber-physical system approach for smart power system design, modelling, simulation, and verification of cyber-physical systems, real-time requirements in cyber-physical systems, etc. [18][19][20][21]. It should be mentioned that cyberphysical system is not a new concept, and it has been used in a variety of domains, including thermal management [22], gaming and social network [23,24], cloud computing [25], and air-traffic management [26].…”
Section: Cyber-physical Systemmentioning
confidence: 99%
“…From (21), the jth olumn of R * is defined as r * j ∈ R m×1 , which represents the state variable j relationship with meter measurements from 1 to m. Considering the R * matrix, to successfully attack the state variable x j without being detected, the attack cost would be as follows:…”
Section: Attack Strategy Formulationmentioning
confidence: 99%
“…Across e-commerce platforms, for example, fake online reviews from ostensible customers have caused significant damage on business [5], [6]. Security against cyber attacks has been a key issue in cyber-physical systems [7]. To uphold the performance of network, distributed algorithms have been designed to cope with the compromise of a group of malicious individuals and guarantee consensus of the opinions or states of normal individuals based on nearestneighbor rules.…”
Section: Introductionmentioning
confidence: 99%