2022
DOI: 10.1109/jsyst.2021.3093494
|View full text |Cite
|
Sign up to set email alerts
|

Denial-of-Service Attacks Pre-Emptive and Detection Framework for Synchrophasor Based Wide Area Protection Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…So, a robust Anomaly-based IDS is required to detect anomalies with higher accuracy, low false negatives (missing rate), and low false positives (false alarms) with decreased response times. In the mission-critical infrastructure of a smart grid, even a few instances of misclassification might have fatal consequences regarding the power system's stability and reliability, which necessitates thorough investigation [21]. Our proposed SAML-Triple approach is an alternative solution to the existing Specification-based IDS (state estimation approach) and Signature-based IDS.…”
Section: Introductionmentioning
confidence: 99%
“…So, a robust Anomaly-based IDS is required to detect anomalies with higher accuracy, low false negatives (missing rate), and low false positives (false alarms) with decreased response times. In the mission-critical infrastructure of a smart grid, even a few instances of misclassification might have fatal consequences regarding the power system's stability and reliability, which necessitates thorough investigation [21]. Our proposed SAML-Triple approach is an alternative solution to the existing Specification-based IDS (state estimation approach) and Signature-based IDS.…”
Section: Introductionmentioning
confidence: 99%
“…developed a detection and isolation method against Dos by considering the attack impact on the communication channels. In [13], the attack feature of Dos on the power system is analyzed. Based on the invasion pathway of the FDIA, Cao et al.…”
Section: Introductionmentioning
confidence: 99%
“…The current security research on FDIA can be mainly divided into two aspects, such as detection-based and defense-based safety mechanism [9]. In the detectionbased safety mechanism, scholars have developed different attack characteristics-based attack detection algorithms [10][11][12][13][14][15]. Considering several cases of severe data-injections with high probabilities of information loss, a Bayesian-based approximated filter (BAF) was proposed to improve the immunity of the monitoring applications against data-injection attacks [10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The responses of animal species to habitat degradation, including habitat fragmentation and adaptation of small-scale animal populations to anthropogenic disturbance, as well as mechanisms of adaptation at a larger scale (e.g. climate change) will be studied [1,2]. Habitat loss and fragmentation is a cumulative process that changes over time.…”
Section: Introductionmentioning
confidence: 99%