2019 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES) 2019
DOI: 10.1109/mscpes.2019.8738789
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Platform Comparison of Standard Power System Components used in Real Time Simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…In real-time simulation, the model accuracy between different manufacturers is not a significant concern [184]. Instead, the features and compatibility are major key points for comparison between brands, whereas, in a brand's lineup, researchers need to consider price-performance trade-off when choosing a solution.…”
Section: ) Assessment and Recommendationmentioning
confidence: 99%
“…In real-time simulation, the model accuracy between different manufacturers is not a significant concern [184]. Instead, the features and compatibility are major key points for comparison between brands, whereas, in a brand's lineup, researchers need to consider price-performance trade-off when choosing a solution.…”
Section: ) Assessment and Recommendationmentioning
confidence: 99%
“…Testbed efforts in [12,20,[26][27][28][29][30][31] implement cyber intrusions such as MiTM. MiTM attacks can be performed in different ways such as address resolution protocol (ARP) cache poisoning, Internet protocol (IP) spoofing, or hypertext transfer protocol (HTTP) session hijacking, but this is not always presented.…”
Section: Testbeds and Platformsmentioning
confidence: 99%
“…Existing testbeds often lack strong demonstrations of cyber intrusions. Several existing testbeds [23,32,33,34,35,12,36,37] mention implementation of cyber intrusions in their platforms but do not clearly demonstrate specific use cases including how the intrusions are performed. Some testbeds that use MiTM attacks [25,7,26,6,8] do not show how those attacks are incorporated.…”
Section: Constraints On Use Casesmentioning
confidence: 99%