2016
DOI: 10.1631/fitee.1500446
|View full text |Cite
|
Sign up to set email alerts
|

On modeling of electrical cyber-physical systems considering cyber security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(17 citation statements)
references
References 21 publications
0
16
0
1
Order By: Relevance
“…A graph consists of a set of vertices ( ) and edges ( ). Based on the principle of graph theory technique the physical components are considered as vertices and the transmission line connecting the physical components are considered as an edges which form the directed sparsely connected graph, = ( , ) [67][68][69]. Similarly, the cyber components like routers, servers, computing clusters in cyber systems are considered as vertices and the wireless/wired communication between the cyber components is considered as an edges which form the directed sparsely connected graph = ( , ) [70][71].…”
Section: (I) Graph Theory-based Modelmentioning
confidence: 99%
“…A graph consists of a set of vertices ( ) and edges ( ). Based on the principle of graph theory technique the physical components are considered as vertices and the transmission line connecting the physical components are considered as an edges which form the directed sparsely connected graph, = ( , ) [67][68][69]. Similarly, the cyber components like routers, servers, computing clusters in cyber systems are considered as vertices and the wireless/wired communication between the cyber components is considered as an edges which form the directed sparsely connected graph = ( , ) [70][71].…”
Section: (I) Graph Theory-based Modelmentioning
confidence: 99%
“…As we have introduced in Reference [13], the proposed framework compressively considers the characteristics of the power grids, communication facilities, and their interdependent relationships.…”
Section: Framework Of Ecpssmentioning
confidence: 99%
“…For this purpose, we have developed our study from three aspects in Figure 1: model, platform, and assessment. The model approach is suitable for large-scale systems (as shown in References [13,38]). In this paper, we will first go on with the study of the simulation platform with advantages of easy programming, fast calculation, and no damage to systems, and secondly, propose a convincing and comprehensive vulnerability assessment from five aspects.…”
Section: Introductionmentioning
confidence: 99%
“…Complex network theory provides a powerful tool in modelling the different CPS layers and their interactions, e.g., they can be used to analyze the effects of cyberattacks or how cascading failures progress from the cyber to the physical layer and vice versa [8,19]. Cyberattacks result in compromised measurement signals from sensors or control signals from actuators, e.g., via communication package losses, creating the need for attack-resilient power systems through the development of novel cybersecurity methods and technologies [20,21]. The control and measurement signals close the loop between the cyber and the physical layers, thus representing the key technologies for achieving a stable, reliable, and resilient CPS-based power system architecture [22,23].…”
Section: Introductionmentioning
confidence: 99%