The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smart grids are vulnerable to cyber attacks because of the inevitable coupling between cyber and physical operations. Diagnosing such malicious false data attack has significant importance to ensure reliable operations of power grids. This task is challenging, however, when attackers inject bad data into power systems that are able to circumvent the traditional maximum residual detection method. By...
In modern smart grid networks, the traditional power grid is empowered by technological advances in sensing, measurement, and control devices with two-way communications between the suppliers and consumers. The smart grid integration helps the power grid networks to be smarter, but it also increases the risk of attacks because of the existing obsolete cyber-infrastructure. In this article, we focus...
In a smart grid, the strong coupling between cyber and physical operations makes power systems vulnerable to cyber attacks. Changing the traditional structure of power systems and integrating communication devices are beneficial for better monitoring and decisionmaking by System Operators but increases the chance of being maliciously attacked. The communication links can be hacked so that the attacker...
In smart grid, the strong coupling between cyber and physical operations makes power systems vulnerable to cyber attacks. In this paper, stealth false data attacks are investigated where the attackers without prior knowledge of the power grid topology, try to make inferences through phasor observations. We show that when the system dynamics are small and can be approximated linearly, linear independent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.