2017
DOI: 10.1109/tii.2016.2612645
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
69
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 119 publications
(69 citation statements)
references
References 21 publications
0
69
0
Order By: Relevance
“…In [33], the authors used behavior rules to specify the safe system state for medical Cyber Physical Systems (CPSs) and monitor deviation from these rules. Distributed invariant-based mechanisms for smart grids are presented in [34] and [35]. In [35], detection is based on observing the physical state of the shared system, detecting the power conservation invariants' violation and identifying the rogue component by the invariants' verification in its topological neighborhood.…”
Section: Related Workmentioning
confidence: 99%
“…In [33], the authors used behavior rules to specify the safe system state for medical Cyber Physical Systems (CPSs) and monitor deviation from these rules. Distributed invariant-based mechanisms for smart grids are presented in [34] and [35]. In [35], detection is based on observing the physical state of the shared system, detecting the power conservation invariants' violation and identifying the rogue component by the invariants' verification in its topological neighborhood.…”
Section: Related Workmentioning
confidence: 99%
“…One kind is the simulation method, such as Monte Carlo simulation [10][11][12][13][14], which is mainly utilized to get reliability indices through statistical analysis and stochastic sampling of the assumed probabilistic distribution, where this kind of method is intuitive [15]. The other kind is the analytic methods, such as Markov model analysis [16][17][18][19][20][21][22][23][24][25], neural networks [26][27][28][29][30][31][32], fault trees [33][34][35][36][37], etc., which are typically applied to develop a probabilistic model with the information of the construction, the function, or the logic relationship of the considered object and calculate the reliability indices by iteration. For these methods, the physical concept is clear and the accuracy is guaranteed, where, in some cases, the calculation burden increases rapidly with the increasing of the system scale.…”
Section: Introductionmentioning
confidence: 99%
“…In order to guarantee the security of a CPS, detecting the attacks in time and taking some protection measures properly are musts to maintain the integrity and reliability of the system. A distributed multiagent scheme of detecting and identifying cyber threats for a power grid system is presented . Palleti et al explored the subject of the online detections of cyber‐attacks by using conventional Kalman filter and cumulative sum test fault detection and isolation (FDI) methods.…”
Section: Introductionmentioning
confidence: 99%
“…A distributed multiagent scheme of detecting and identifying cyber threats for a power grid system is presented. 15 Palleti et al 16 explored the subject of the online detections of cyber-attacks by using conventional Kalman filter and cumulative sum test fault detection and isolation (FDI) methods. Huang et al 17 concerned with reliable control problems of cyber-physical systems against a class of frequency constrained sensor and actuator attacks.…”
Section: Introductionmentioning
confidence: 99%