Cyber-physical systems are pervasive in every walk of life. The safety performances of these systems are threatened by external malicious attacks and unforeseen failures. In terms of grid structural characteristics and graph theory, this study proposes a new framework to solve the problem of structural vulnerability which is caused by undetectable attacks in power grids. Based on the linear continuous-time descriptor system model, the digraph associated with structural matrix model for power grid is introduced in detail. To analyse the attack detectability in digraph, a series of basic properties are proposed about digraphs of structural power grids. Then an algorithm is proposed for obtaining the positions of the detection outputs to ensur...
Power grids have been studied as a typical example of real-world complex networks. Different from pr...
Complex network theory has brought novel concepts and methodology to the study of power network vuln...
Power grids have been studied as a typical example of real-world complex networks. Different from pr...
Abstract A key focus recently has been in assessing the risk of a coordinated cyber-physical attack ...
This work is concerned with the security of a power network against components failure and external ...
We study the vulnerability of electrical networks through structural analysis from a graph theory po...
Recent events demonstrated the vulnerability of power grids to cyber attacks and to physical attacks...
Natural disasters like hurricanes, floods or earthquakes can damage power grid devices and create ca...
This paper describes way how to use graph theory in security analysis. As an environment is used net...
The digital transformation of power systems has introduced a new challenge for robustness: cyber sec...
In this paper, we present a comprehensive study of smart grid security against cyber-physical attack...
Electrical grids have been developed over a century, which are considered as one of the most importa...
Future power networks will be characterized by safe and reliable functionality against physical malf...
Abstract — Future power networks will be characterized by safe and reliable functionality against ph...
Abstract This paper addresses a set-theoretic method for the detection of data corruption cyber-atta...
Power grids have been studied as a typical example of real-world complex networks. Different from pr...
Complex network theory has brought novel concepts and methodology to the study of power network vuln...
Power grids have been studied as a typical example of real-world complex networks. Different from pr...
Abstract A key focus recently has been in assessing the risk of a coordinated cyber-physical attack ...
This work is concerned with the security of a power network against components failure and external ...
We study the vulnerability of electrical networks through structural analysis from a graph theory po...
Recent events demonstrated the vulnerability of power grids to cyber attacks and to physical attacks...
Natural disasters like hurricanes, floods or earthquakes can damage power grid devices and create ca...
This paper describes way how to use graph theory in security analysis. As an environment is used net...
The digital transformation of power systems has introduced a new challenge for robustness: cyber sec...
In this paper, we present a comprehensive study of smart grid security against cyber-physical attack...
Electrical grids have been developed over a century, which are considered as one of the most importa...
Future power networks will be characterized by safe and reliable functionality against physical malf...
Abstract — Future power networks will be characterized by safe and reliable functionality against ph...
Abstract This paper addresses a set-theoretic method for the detection of data corruption cyber-atta...
Power grids have been studied as a typical example of real-world complex networks. Different from pr...
Complex network theory has brought novel concepts and methodology to the study of power network vuln...
Power grids have been studied as a typical example of real-world complex networks. Different from pr...