2021
DOI: 10.48550/arxiv.2110.00301
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cyber-physical risk modeling with imperfect cyber-attackers

Abstract: We model the risk posed by a malicious cyberattacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base its decision strategy on imperfect information. More specifically, we introduce a novel formulation for the cyber-attacker's decision-making problem and analyze the distribution of decisions taken with randomly inaccurate data on the grid branch admittances or capacities, and the distribution of their respective i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Stability (v) is also achieved since efficiency (i) holds and the individual rationality condition is met by definition of the cost allocation and weak duality. From (47), dummy player (ii), and additivity (iv) hold. However, symmetry (iii) and anonymity (vi) do not hold in general.…”
Section: Lagrangian Based Allocation (L)mentioning
confidence: 99%
“…Stability (v) is also achieved since efficiency (i) holds and the individual rationality condition is met by definition of the cost allocation and weak duality. From (47), dummy player (ii), and additivity (iv) hold. However, symmetry (iii) and anonymity (vi) do not hold in general.…”
Section: Lagrangian Based Allocation (L)mentioning
confidence: 99%