2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) 2019
DOI: 10.1109/smartgridcomm.2019.8909800
|View full text |Cite
|
Sign up to set email alerts
|

PAVED: Perturbation Analysis for Verification of Energy Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
2
1

Relationship

3
0

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Hence, such solutions cannot detect cyber-induced stealth false data injection attacks. Several works on false data injection detection are based on machine learning [38]- [41] and deep learning [42]- [47] techniques. The authors in [48] address stealthy attacks using multi-dimensional data fusion by collecting information from the power consumption of physical devices, control operation and system states feed to the cascade detection algorithm to identify stealthy attacks using Long Short Term Memory.…”
Section: Data Fusion In Power Systemsmentioning
confidence: 99%
“…Hence, such solutions cannot detect cyber-induced stealth false data injection attacks. Several works on false data injection detection are based on machine learning [38]- [41] and deep learning [42]- [47] techniques. The authors in [48] address stealthy attacks using multi-dimensional data fusion by collecting information from the power consumption of physical devices, control operation and system states feed to the cascade detection algorithm to identify stealthy attacks using Long Short Term Memory.…”
Section: Data Fusion In Power Systemsmentioning
confidence: 99%
“…There has been a lot of work around detection of FDI attacks. Perturbation analysis is one good way to detect if SCADA data has been compromised [57,58,59,60]. This work could be extended from defending state estimation to defending against attacks specific to DER.…”
Section: Fdi Detectionmentioning
confidence: 99%
“…Hence, such solutions cannot detect cyber induced stealth false data injection attacks. Several works on false data injection detection are based on machine learning [23]- [26] and deep learning [27]- [32] techniques. The authors in [33] address stealthy attacks using multi-dimensional data fusion by collecting information from power consumption of physical devices, control operation and system states feed to the cascade detection algorithm to identify stealthy attack using Long Short Term Memory (LSTM).…”
Section: B Multi-sensor Fusion Applicationsmentioning
confidence: 99%