2020
DOI: 10.1049/iet-gtd.2019.1790
|View full text |Cite
|
Sign up to set email alerts
|

Early anomaly detection and localisation in distribution network: a data‐driven approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Fortunately, the advent of advanced monitoring technologies, such as D-PMU and AMI, provides new possibilities for refined parameter estimation in distribution networks. Indeed, the D-PMUs have been employed for event detection [5], state estimation [6], topology detection [7], and islanding detection [8] in the distribution networks. Likewise, the extensive deployment of smart meters in the distribution networks offers intelligent monitoring and control for various applications, such as observability enhancement [9], energy management [10], line outage identification [11], topology and parameter estimation [12,13], and distribution system state estimation [14,15].…”
Section: Motivation and Incitementmentioning
confidence: 99%
“…Fortunately, the advent of advanced monitoring technologies, such as D-PMU and AMI, provides new possibilities for refined parameter estimation in distribution networks. Indeed, the D-PMUs have been employed for event detection [5], state estimation [6], topology detection [7], and islanding detection [8] in the distribution networks. Likewise, the extensive deployment of smart meters in the distribution networks offers intelligent monitoring and control for various applications, such as observability enhancement [9], energy management [10], line outage identification [11], topology and parameter estimation [12,13], and distribution system state estimation [14,15].…”
Section: Motivation and Incitementmentioning
confidence: 99%
“…First, the character vectors in attack features are transformed into numeric vectors [23]. For continuous numerical features, the measurement methods of each feature are different, so the features are normalized in Equation (7) to avoid the impact on attack detection due to the difference of feature measurements.…”
Section: A Pso-bpnn Attack Detection Model In the Cyber Layermentioning
confidence: 99%
“…Cyber-attack has become a factor threatening the safe operation of the DCPS [6,7]. For instance, a substation in Ukrainian was attacked by the BalckEnergy3 in 2015 [8] and European industrial manufacturing systems were attacked by the Havex Trojan in 2014 [9].…”
Section: Introductionmentioning
confidence: 99%
“…In [13], an ensemblebased unsupervised approach is proposed to identify outliers based on the anomaly score detected by three different base detectors (Chebyshev-based, DBSCAN-based, and Regressionbased detectors). Other techniques such as dynamic time warping classifier [14], multi-class SVM [15,16], Bayesian Network [17], and random matrix theory [18][19][20] are also used to address the anomaly detection problem.…”
Section: Introductionmentioning
confidence: 99%