2021
DOI: 10.1016/j.ress.2021.107479
|View full text |Cite
|
Sign up to set email alerts
|

Survivability evaluation and importance analysis for cyber–physical smart grids

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Woodard et al [110] began a useful exploration on survivability, leaning towards graceful degradation as the ultimate manifestation of such phenomenon. Graphically, it is seen immediately after a disruption surprises the system, which fluctuates downwards without touching a breaking point.…”
Section: Breaking Point and Resurgence Featuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Woodard et al [110] began a useful exploration on survivability, leaning towards graceful degradation as the ultimate manifestation of such phenomenon. Graphically, it is seen immediately after a disruption surprises the system, which fluctuates downwards without touching a breaking point.…”
Section: Breaking Point and Resurgence Featuresmentioning
confidence: 99%
“…"Failure" dependent on(7) how fast and (8) how much value or net benefit the system can deliver to its stakeholders Ellison et al[36]; Knight et al[40]; Yaghlane et al[41] Mead et al[103]; Yaghlane et al[41] (9) "Failure" as a threat that affects value delivery Faturechi and Miller-Hooks[29]; Lipson and Fisher[38]; Yaghlane et al[41] Ellison et al[101]; Levitin et al[111]; Mead et al[103]; Woodard et al[110] …”
mentioning
confidence: 99%
“…Type of Attack [36], [48], [49], [52][53][54][55][56][57][58], [62] False data injection (FDI) attacks [59], [60], [62], [75] [65] Denial-of-service attacks (DoS) [73], [75] Distributed Denial of Service attack [68] Man-in-the-middle attack [44], [66], [67] Malware Attack [36], [60], [71] Code injection [73] Dynamic load altering attacks (D-LAA) [34], [37], [38], [75] unauthorized access to systems [45], [62] State Estimation attack [65] Eavesdropping, Phishing attacks & kill Disk attacks. [59], [63] Misrepresentation of values and Price manipulation attack [66], [70] Coordinated attacks Below, we discuss these major cyber incidents identified in Table 3 and their related Countermeasures.…”
Section: Author/authorsmentioning
confidence: 99%
“…Thompson-Hedge algorithm can resolve the problem; superior performance of the proposed algorithm in terms of the convergence rate of regret function. [71] Fault injection on IEEE 14-, 30-, and 57bus Simulation-based on fault injection to evaluate survivability from corrupted data.…”
Section: Use a Process Based On Nestedmentioning
confidence: 99%
“…Currently, there are a significant number of technologies used to create new, and to develop existing, power grids. A considerable amount of research is devoted to determining the effectiveness of a smart grid's technologies or components [45][46][47]. It affects the approaches to evaluating their effectiveness.…”
Section: Introductionmentioning
confidence: 99%