2021
DOI: 10.1109/tie.2020.2965497
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity of Plug-In Electric Vehicles: Cyberattack Detection During Charging

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(17 citation statements)
references
References 22 publications
0
17
0
Order By: Relevance
“…Under these circumstances, the candidate k + 1 item set generated by reduced frequent itemset L k ′ connection is less than the number of candidate elements generated by C k+1 ′ generated by L k ′ connection that has not been processed by reducing the number of C k+1 ′ . is can reduce the use of set X all k − 1 subsets, so that it can be judged that the set X is the nature of the infrequent itemset, and the infrequent itemset can also be filtered to determine, thus reducing the overhead in time [25].…”
Section: Apriori Algorithm Elaborationmentioning
confidence: 99%
“…Under these circumstances, the candidate k + 1 item set generated by reduced frequent itemset L k ′ connection is less than the number of candidate elements generated by C k+1 ′ generated by L k ′ connection that has not been processed by reducing the number of C k+1 ′ . is can reduce the use of set X all k − 1 subsets, so that it can be judged that the set X is the nature of the infrequent itemset, and the infrequent itemset can also be filtered to determine, thus reducing the overhead in time [25].…”
Section: Apriori Algorithm Elaborationmentioning
confidence: 99%
“…2, the harmful impacts might be even more severe. Fourth, many recent works have underlined the emerging challenges owing to the rapid integration of distributed energy resources [4]- [6], as their growing distributed capacity calls for the need of coordination to a certain extent, however, the sheer number creates difficulty for monitoring of cyberphysical threats. Fifth, the expanding datasets about an energy system may be eluding proprietary and security related data; advanced data mining approaches can recover safety-critical information ¡Error!…”
Section: Cyber-physical and Resilient Energy Systemsmentioning
confidence: 99%
“…In the second scheme, although no prior knowledge of attacks is utilized, the attack values in the dynamic system are often supposed to be state-dependent and bounded, hence in most cases, to guarantee robustness and stability, the designed resilient controllers expose some considerable conservatism. For cybersecurity of powertrain and power electronic systems in EVs, the above model-based literature provides fundamental methodologies, for instance, observer-based cyber-attack detection during charging for battery packs [150], in which a linear battery dynamics model is used. To improve the cyberphysical security of EVs with four motor drives, [151] proposed a coordinated detection methodology that combines state observer and performance-based evaluation metrics.…”
Section: Stealthy Attackmentioning
confidence: 99%