Abstract — False data injection attacks are recently introduced as a class of cyber attacks against smart grid’s monitoring systems. They aim to compromise the readings of grid sensors and phasor measurement units. Recent studies have shown that if the operator uses the DC, i.e., linear, state estimation to determine the current states of the power system, the attacker can adjust the attack vector such that the attack remains undetected and successfully passes the commonly used residue-based bad data detection tests. However, in this paper, we examine the possibility of implementing a false data injection attack when the operator uses the more practical AC, i.e., nonlinear, state estimation. We characterize such attacks when the attacker ha...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
The secure operation of smart grids is closely linked to state estimates that accurately reflect the...
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acq...
Abstract—A power grid is a complex system connecting electric power generators to consumers through ...
A power grid is a complex system connecting electric power generators to consumers through power tra...
Abstract—False data injection attacks have recently been introduced as an important class of cyber a...
Abstract—This paper introduces new analytical techniques for performing vulnerability analysis of st...
"The problem of malicious false data injection in power grid state estimators has recently gained co...
The accurately estimated state is of great importance for maintaining a stable running condition of ...
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyb...
With rapid advances in sensor, computer and communication networks, modern power systems have become...
The electric smart grid, a critical national infrastructure and among the largest and most complex c...
LNCS v. 9722 entitled: Information Security and Privacy: 21st Australasian Conference, ACISP 2016, M...
Cyber-physical attacks are the most significant threat facing the utilisation and development of the...
It is critical that state estimators used in the power grid output accurate results even in the pres...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
The secure operation of smart grids is closely linked to state estimates that accurately reflect the...
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acq...
Abstract—A power grid is a complex system connecting electric power generators to consumers through ...
A power grid is a complex system connecting electric power generators to consumers through power tra...
Abstract—False data injection attacks have recently been introduced as an important class of cyber a...
Abstract—This paper introduces new analytical techniques for performing vulnerability analysis of st...
"The problem of malicious false data injection in power grid state estimators has recently gained co...
The accurately estimated state is of great importance for maintaining a stable running condition of ...
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyb...
With rapid advances in sensor, computer and communication networks, modern power systems have become...
The electric smart grid, a critical national infrastructure and among the largest and most complex c...
LNCS v. 9722 entitled: Information Security and Privacy: 21st Australasian Conference, ACISP 2016, M...
Cyber-physical attacks are the most significant threat facing the utilisation and development of the...
It is critical that state estimators used in the power grid output accurate results even in the pres...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
The secure operation of smart grids is closely linked to state estimates that accurately reflect the...
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acq...