2019 Resilience Week (RWS) 2019
DOI: 10.1109/rws47064.2019.8971996
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Physical Emulation and Optimization of Worst-Case Cyber Attacks on the Power Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…The grid operator then responds through generator redispatch and load shed to minimize unmet demand. This attacker-defender model is adapted for a cyber attacker in [23], though still without modeling the cyber network explicitly.…”
Section: A Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The grid operator then responds through generator redispatch and load shed to minimize unmet demand. This attacker-defender model is adapted for a cyber attacker in [23], though still without modeling the cyber network explicitly.…”
Section: A Literature Reviewmentioning
confidence: 99%
“…Constraint (22) enforces the attacker's budget. Constraint (23) requires that the attacker can only access enclaves which are controlled by already-accessed enclaves. That is, with respect to the graphs in Fig.…”
Section: Trilevel Formulationmentioning
confidence: 99%
“…Additionally, this bilevel problem could be a subproblem in long-term planning problems such as physical and cyber network design problems seeking to minimize the risk of cyber attacks. The model we solve was originally presented in Castillo et al (2019). We will refer to it as the worst-case relay attack problem.…”
Section: Introductionmentioning
confidence: 99%