State of the art of cyber-physical systems security: An automatic control perspective
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Application of Newton-based load flow methods for determining steady-state condition of well and ill-conditioned power systems: A review
Load Flow (or power flow) is the most essential analysis for power system planning,
operation and control providing the initial conditions (equilibria) for power system analyses …
operation and control providing the initial conditions (equilibria) for power system analyses …
Deep learning-based interval state estimation of AC smart grids against sparse cyber attacks
Due to the aging of electric infrastructures, conventional power grid is being modernized
toward smart grid that enables two-way communications between consumer and utility, and …
toward smart grid that enables two-way communications between consumer and utility, and …
A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids
In this article, an accurate secured framework to detect and stop data integrity attacks in
wireless sensor networks in microgrids is proposed. An intelligent anomaly detection …
wireless sensor networks in microgrids is proposed. An intelligent anomaly detection …
Secure Internet of Things (IoT)-based smart-world critical infrastructures: Survey, case study and research opportunities
The widespread adoption of the Internet of Things (IoT) technologies has drastically
increased the breadth and depth of attack surfaces in networked systems, providing new …
increased the breadth and depth of attack surfaces in networked systems, providing new …
Data integrity attack in dynamic state estimation of smart grid: Attack model and countermeasures
A smart grid integrates advanced sensors, efficient measurement methods, progressive
control technologies, and other techniques and devices to achieve safe, efficient and …
control technologies, and other techniques and devices to achieve safe, efficient and …
Online generative adversary network based measurement recovery in false data injection attacks: A cyber-physical approach
Y Li, Y Wang, S Hu - IEEE Transactions on Industrial …, 2019 - ieeexplore.ieee.org
State estimation plays a critical role in maintaining operational stability of a power system,
which is however vulnerable to attacks. False data injection (FDI) attacks can manipulate the …
which is however vulnerable to attacks. False data injection (FDI) attacks can manipulate the …
Defending against data integrity attacks in smart grid: A deep reinforcement learning-based approach
State estimation plays a critical role in monitoring and managing operation of smart grid.
Nonetheless, recent research efforts demonstrate that data integrity attacks are able to …
Nonetheless, recent research efforts demonstrate that data integrity attacks are able to …
Zero-parameter-information data integrity attacks and countermeasures in IoT-based smart grid
Data integrity attack (DIA) is one class of threatening cyber attacks against the Internet-of-
Things (IoT)-based smart grid. With the assumption that the attacker is capable of obtaining …
Things (IoT)-based smart grid. With the assumption that the attacker is capable of obtaining …
Two time-scale resource management for green Internet of Things networks
D Zhang, Y Qiao, L She, R Shen… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
It is expected that billions of objects will be connected through sensors and embedded
devices for pervasive intelligence in the coming era of Internet of Things (IoT). However, the …
devices for pervasive intelligence in the coming era of Internet of Things (IoT). However, the …