2021
DOI: 10.1016/j.jfranklin.2021.02.008
|View full text |Cite
|
Sign up to set email alerts
|

Observer-based detection and reconstruction of dynamic load altering attack in smart grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 38 publications
(46 citation statements)
references
References 19 publications
0
44
0
Order By: Relevance
“…Remark 9: An appropriate threshold of tampering rate of image attacks for double-layer detector is the key to judge the validity of images. Most of the existing threshold selection methods generally include theoretical derivation [47], statistical analysis [48] and machine learning [49], etc. According to the statistical results of real-world experiments, the thresh-olds of image attack tampering rate are determined.…”
Section: ) Threshold Selection Of Attack Detectionmentioning
confidence: 99%
“…Remark 9: An appropriate threshold of tampering rate of image attacks for double-layer detector is the key to judge the validity of images. Most of the existing threshold selection methods generally include theoretical derivation [47], statistical analysis [48] and machine learning [49], etc. According to the statistical results of real-world experiments, the thresh-olds of image attack tampering rate are determined.…”
Section: ) Threshold Selection Of Attack Detectionmentioning
confidence: 99%
“…To illustrate the superiority of the proposed method, we constructed the comparative simulations. Compared with the resilient consensus scheme of attack estimation method proposed in Su et al, 30 the superiority of the proposed scheme is analyzed.…”
Section: Simulation Examplesmentioning
confidence: 99%
“…Application of detection logic to detect state attacks and sensor attack detection by comparing the threshold with the estimated attack. [74] Dynamic load altering attacks (D-LAA) on cyber-physical systems (CPS)…”
Section: Use a Process Based On Nestedmentioning
confidence: 99%