2018
DOI: 10.1016/j.ijepes.2017.12.020
|View full text |Cite
|
Sign up to set email alerts
|

Cyber security of a power grid: State-of-the-art

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
165
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 370 publications
(168 citation statements)
references
References 48 publications
1
165
0
2
Order By: Relevance
“…• Instead of re-generating the adversarial examples at each iteration, the presented training only generates the adversarial examples once (before the first iteration). • To avoid the complex optimization process in (10) and (11), the adversarial examples are generated simply based on the attack models, e.g., (5)- (8). For instance, if the scaling attack is employed to generate adversarial examples, each input training data point is modified based on the attack parameters provided by (5).…”
Section: Accelerated Adversarial Trainingmentioning
confidence: 99%
“…• Instead of re-generating the adversarial examples at each iteration, the presented training only generates the adversarial examples once (before the first iteration). • To avoid the complex optimization process in (10) and (11), the adversarial examples are generated simply based on the attack models, e.g., (5)- (8). For instance, if the scaling attack is employed to generate adversarial examples, each input training data point is modified based on the attack parameters provided by (5).…”
Section: Accelerated Adversarial Trainingmentioning
confidence: 99%
“…Not all of the factors studied are essentially interconnected, but separate groups of input parameters. A transition is needed to a set of independent parameters containing the necessary information about the variation or dispersion of the initial set of factors of the process under study [15]. It is proposed to use:…”
Section: Feature Selectionmentioning
confidence: 99%
“…Thus, it can be concluded that the network attacks detection systems based on the use of artificial intelligence methods as a key element of ensuring cybersecurity of the critical infrastructure [13,14,15] of the APCS in the concept of the development of the digital economy are of relevance and need to be improved.…”
Section: Introductionmentioning
confidence: 99%
“…(). Specific attention has been paid in the literature to power systems (see, e.g., the papers by Ericsson, ; Fovino, Guidi, Masera, & Stefanini, ; Onyeji, Bazilian, & Bronk, ; Sun, Hahn, & Liu, ), industrial control systems (dealt with in the papers by Cherdantseva et al., ; Ralston, Graham, & Hieb, ), and nuclear plants (as in the papers by Park, Suh, & Park, ; Shin, Son, & Heo, ). Whatever the specific infrastructure, securing it requires an investment in cybersecurity tools and policies.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber risks represent a major source of concern for several utility and industrial infrastructures, due to both the risk arising in individual infrastructures and that deriving from the interconnections and interdependencies among them, as shown in the papers by Kröger (2008) and by Maglaras et al (2018). Specific attention has been paid in the literature to power systems (see, e.g., the papers by Ericsson, 2010;Fovino, Guidi, Masera, & Stefanini, 2011;Onyeji, Bazilian, & Bronk, 2014;Sun, Hahn, & Liu, 2018), industrial control systems (dealt with in the papers by Cherdantseva et al, 2016;Ralston, Graham, & Hieb, 2007), and nuclear plants (as in the papers by Park, Suh, & Park, 2016;Shin, Son, & Heo, 2017). Whatever the specific infrastructure, securing it requires an investment in cybersecurity tools and policies.…”
Section: Introductionmentioning
confidence: 99%