2015 IEEE International Conference on Smart Grid Communications (SmartGridComm) 2015
DOI: 10.1109/smartgridcomm.2015.7436288
|View full text |Cite
|
Sign up to set email alerts
|

Sequential cyber-attack detection in the large-scale smart grid system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…We assume that observations { X n ; n = 1, 2, ...} are independent and identically distributed with prechange N 0 σ 2 and postchange N θ σ 2 distributions, respectively, so that L X n = exp θ σ 2 X n θ 2 2 σ 2 and F ∞ in Equation 4 is the LogNormal CDF with parameters θ 2 2 σ 2 θ 2 σ 2 . Notice that the Gaussian assumption is rather standard model for plants and CPS. This is not only due to its mathematical tractability, but is also motivated by the fact that the processes under surveillance are often physical variables subject to measurement noise (for which the Gaussian is the leading model) or are anyway the result of several independent contributions so again the central limit theorem suggests, in absence of more reliable models or contradicting evidence, the Gaussian assumption.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…We assume that observations { X n ; n = 1, 2, ...} are independent and identically distributed with prechange N 0 σ 2 and postchange N θ σ 2 distributions, respectively, so that L X n = exp θ σ 2 X n θ 2 2 σ 2 and F ∞ in Equation 4 is the LogNormal CDF with parameters θ 2 2 σ 2 θ 2 σ 2 . Notice that the Gaussian assumption is rather standard model for plants and CPS. This is not only due to its mathematical tractability, but is also motivated by the fact that the processes under surveillance are often physical variables subject to measurement noise (for which the Gaussian is the leading model) or are anyway the result of several independent contributions so again the central limit theorem suggests, in absence of more reliable models or contradicting evidence, the Gaussian assumption.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…The CUSUM has been largely used for monitoring and quickly detecting changes in industrial plants, and more recently for securing CPS. In the latter case, examples of monitored variables are power flows in smart grids, or pressure in water treatment plants . Such signals can be deceived by different types of attacks, thus affecting in turn the correct functioning of the system .…”
Section: Quickest Change‐detection Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…One area in particular that can take advantage of machine learning is cyber-physical security of the SG. Besides all of the benefits that come with the transition to the SG, the increasing reliance on communication, automation and information technology systems adds vulnerability to cyber-security threats [1][2][3][4][5][6][7]. Cyber-attacks have already been successfully executed with major consequences.…”
Section: Introductionmentioning
confidence: 99%