2018
DOI: 10.1109/tii.2017.2769106
|View full text |Cite
|
Sign up to set email alerts
|

Reservoir Computing Meets Smart Grids: Attack Detection Using Delayed Feedback Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
45
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 110 publications
(45 citation statements)
references
References 41 publications
0
45
0
Order By: Relevance
“…As a result, the energy may be transferred to devices having intense communication demands, which strikes a balance between energy flows and data packet flows in the spatial-domain [19]- [23]. Hybrid sources relying on both the renewable energy harvesters and the conventional power grid [24] may also be invoked for the sake of supplying energy for communication infrastructure [25]- [29]. But in order to reduce maintenance costs, we have to minimise the usage of the power grid.…”
Section: B Harvesting Energy From the Ambient Environmentmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, the energy may be transferred to devices having intense communication demands, which strikes a balance between energy flows and data packet flows in the spatial-domain [19]- [23]. Hybrid sources relying on both the renewable energy harvesters and the conventional power grid [24] may also be invoked for the sake of supplying energy for communication infrastructure [25]- [29]. But in order to reduce maintenance costs, we have to minimise the usage of the power grid.…”
Section: B Harvesting Energy From the Ambient Environmentmentioning
confidence: 99%
“…The design of efficient power splitters at the circuit level has attracted enormous interest from the electronics engineering community. For example, Lee 24. Time switching based receiver architecture.…”
Section: ) Power Splitting Based Receivermentioning
confidence: 99%
“…Evaluations on the well-known NSL-KDD dataset [499] demonstrate that their model achieves remarkable accuracy in identifying denial of service, probing, remote to user and user to root attacks, outperforming traditional ML methods by 0.18 in terms of F1 score. Hamedani et al employ MLPs to detect malicious attacks in delayed feedback networks [411]. The proposal achieves more than 99% accuracy over 10,000 simulations.…”
Section: Infrastructure Level Securitymentioning
confidence: 99%
“…Recently, electric vehicles (EVs) and plug-in hybrid EVs have been considered as natural components of future electricity power systems, due to their efficient integration, cost savings, and environmental advantages. This is challenging the design of power systems in: scheduling energy charging plans for connected EVs, guaranteeing energy demands of EVs during peak hours, and exchanging information among EVs and the grid (or aggregators [246].…”
Section: Other Scenariosmentioning
confidence: 99%