Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …
society, and wireless services become increasingly important as the applications of wireless …
Cyber security threats and vulnerabilities: a systematic map** study
There has been a tremendous increase in research in the area of cyber security to support
cyber applications and to avoid key security threats faced by these applications. The goal of …
cyber applications and to avoid key security threats faced by these applications. The goal of …
Power system dynamic state estimation: Motivations, definitions, methodologies, and future work
This paper summarizes the technical activities of the Task Force on Power System Dynamic
State and Parameter Estimation. This Task Force was established by the IEEE Working …
State and Parameter Estimation. This Task Force was established by the IEEE Working …
Application of big data and machine learning in smart grid, and associated security concerns: A review
This paper conducts a comprehensive study on the application of big data and machine
learning in the electrical power grid introduced through the emergence of the next …
learning in the electrical power grid introduced through the emergence of the next …
Cyber-physical attack-resilient wide-area monitoring, protection, and control for the power grid
Cybersecurity and resiliency of wide-area monitoring, protection, and control (WAMPAC)
applications is critically important to ensure secure, reliable, and economical operation of …
applications is critically important to ensure secure, reliable, and economical operation of …
State of the art of cyber-physical systems security: An automatic control perspective
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Attack detection and identification for automatic generation control systems
Integrating today's power systems with communication infrastructure makes them vulnerable
to cyber-attacks, which can disrupt their normal operation undetectable. Automatic …
to cyber-attacks, which can disrupt their normal operation undetectable. Automatic …
Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
Q Su, H Wang, C Sun, B Li, J Li - Applied Mathematics and Computation, 2022 - Elsevier
In modern power systems, the connection between cyber part and physical part is more and
more close and deeply coupled, while cyber-physical power systems (CPPS) can exactly …
more close and deeply coupled, while cyber-physical power systems (CPPS) can exactly …
Cybersecurity for distributed energy resources and smart inverters
The increased penetration of distributed energy resources (DER) will significantly increase
the number of devices that are owned and controlled by consumers and third‐parties. These …
the number of devices that are owned and controlled by consumers and third‐parties. These …
Dynamic state estimation for multi-machine power system by unscented Kalman filter with enhanced numerical stability
In this paper, in order to enhance the numerical stability of the unscented Kalman filter (UKF)
used for power system dynamic state estimation, a new UKF with guaranteed positive …
used for power system dynamic state estimation, a new UKF with guaranteed positive …