2018 North American Power Symposium (NAPS) 2018
DOI: 10.1109/naps.2018.8600639
|View full text |Cite
|
Sign up to set email alerts
|

Cyber physical security analytics for transactive energy systems using ensemble machine learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Furthermore, intend to examine and analyze the impact of additional attacks, such as DoS and replay attacks, on the microgrid's peer-to-peer markets, as well as deploy detection schemes in the microgrid considered for future work. In [61], researchers have presented an ensemble decision tree approach based on the bagging technique to find possible anomalies in the electricity market and physical measurements within the Transactive Energy System (TES), which can reduce the impact of outliers. In addition, the presented approach may be tested on advanced use scenarios to depict a few realistic TES behaviors.…”
Section: Review On Cyber-attacks In Power Distribution Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, intend to examine and analyze the impact of additional attacks, such as DoS and replay attacks, on the microgrid's peer-to-peer markets, as well as deploy detection schemes in the microgrid considered for future work. In [61], researchers have presented an ensemble decision tree approach based on the bagging technique to find possible anomalies in the electricity market and physical measurements within the Transactive Energy System (TES), which can reduce the impact of outliers. In addition, the presented approach may be tested on advanced use scenarios to depict a few realistic TES behaviors.…”
Section: Review On Cyber-attacks In Power Distribution Systemmentioning
confidence: 99%
“…Many researchers published various analysis methods, detection, and protection techniques in the literature to control the communication attacks. In [89], researchers reviewed about cyber systems and cyber physical systems, as [65] Western Electric Co-ordinating Council 240 -Bus model [35] High Fidelity Simulation Test -Bed [36] NPCC 140 -Bus System [62] TESP & IEEE 9 -Bus System [66] TESP & IEEE 9 -Bus System [67] TESP & IEEE 9 -Bus System [61] TESP & IEEE 9 -Bus System [84] OPNET Simulator [85] SUMO & OMNET ++ [86] Speed Goat Real-Time Digital Simulator [? ]…”
Section: Attacks Through Communication Channelsmentioning
confidence: 99%
“…In particular, the consensus mechanism is of interest as we also propose an unsupervised ensemble method. Arman et al [ 32 ] present an ensemble OD method where multiple decision trees are trained on a subset of the data set to differentiate outliers in simulated data of a CPS network. For consensus, each tree is weighted with a certain confidence level, and the vote multiplied by the confidence level is averaged per class and vote.…”
Section: Related Workmentioning
confidence: 99%
“…The thresholds are compared with the new data to detect anomalous behaviours. An ensemble learning model that combines the results from multiple decision tress was proposed in [23] for a Transactive Energy Systems (TES). TES is an essential part of the smart grid that monitors the information transactions between various stakeholders in the grid to make decisions on energy consumption and demand response.…”
Section: Literature Survey On Machine Learning (Ml) Approaches For Anomaly Detection In Smart Gridmentioning
confidence: 99%