2020
DOI: 10.1109/tsg.2020.3008515
|View full text |Cite
|
Sign up to set email alerts
|

Pre-Overload-Graph-Based Vulnerable Correlation Identification Under Load Redistribution Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(5 citation statements)
references
References 26 publications
0
4
0
Order By: Relevance
“…STEP2. Establish the energy coupling characteristics model, according to Equation ( 9) and Equations ( 14) to (16), STEP7. Control the constraint conditions of dual coupling characteristics, and calculate the source load loss to quantify the dual coupling characteristic.…”
Section: Etcps Vulnerability Assessment Processmentioning
confidence: 99%
See 1 more Smart Citation
“…STEP2. Establish the energy coupling characteristics model, according to Equation ( 9) and Equations ( 14) to (16), STEP7. Control the constraint conditions of dual coupling characteristics, and calculate the source load loss to quantify the dual coupling characteristic.…”
Section: Etcps Vulnerability Assessment Processmentioning
confidence: 99%
“…Moreover, studies on the vulnerability of a single type of cyber physical system are mainly carried out from the perspective of the electrical system at present. The impact of different types of load redistribution attacks on power cyber physical system is studied in [15,16], and vulnerability assessments are conducted. In [17], the vulnerability index of the power grid is given from four aspects.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, weaknesses in communication protocols and schemes and network vulnerabilities can also be exploited by attackers to intrude into SCADA system to tamper with the data transformed between the units and the control center, and attackers can also employ man-in-the-middle attacks to deflect the data from their original values [19], [28]. Based on the above analysis and research [29], an attack mechanism schematic diagram of FDI attacks can be drawn as Fig. 1.…”
Section: A Overview Of Security Issues Under Fdi Attackmentioning
confidence: 99%
“…In other words, these actions are designed to prevent attackers from being able to launch cyber-attacks against power systems. The authors in [17]- [23] proposed various protection techniques, such as a blockchain-based framework to decentralize the data managing systems, stochastic game theory models to find the optimal way of protecting critical elements, and greedy algorithms to find protection strategies, which minimize the systems' vulnerabilities.…”
Section: B Countermeasures Against Cyber-attacksmentioning
confidence: 99%