The transformation of traditional energy networks to smart grids can assist in revolutionizing the energy industry in terms of reliability, performance and manageability. However, increased connectivity of power grid assets for bidirectional communications presents severe security vulnerabilities. In this letter, we investigate Chi-square detector and cosine similarity matching approaches for attack detection in smart grids where Kalman filter estimation is used to measure any deviation from actual measurements. The cosine similarity matching approach is found to be robust for detecting false data injection attacks as well as other attacks in the smart grids. Once the attack is detected, system can take preventive action and alarm the manag...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Building an efficient, green, and multifunctional smart grid cyber-physical system (CPS) while maint...
A smart grid is delay sensitive and requires the techniques that can identify and react on the abnor...
Abstract—By exploiting the communication infrastructure among the sensors, actuators, and control sy...
State estimation plays a vital role to ensure safe and reliable operations in smart grid. Intelligen...
Cyber-physical attacks are the most significant threat facing the utilisation and development of the...
A new formulation for detection of false data injection attacks in the smart grid is introduced. The...
The secure operation of smart grids is closely linked to state estimates that accurately reflect the...
The distribution denial of service (DDoS) attack, fault data injection attack (FDIA) and random atta...
The smart grid accessibility over the Internet of Things (IoT) is becoming attractive to electrical ...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Robust control and maintenance of the grid relies on accurate data. Both PMUs and state estimators a...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Building an efficient, green, and multifunctional smart grid cyber-physical system (CPS) while maint...
A smart grid is delay sensitive and requires the techniques that can identify and react on the abnor...
Abstract—By exploiting the communication infrastructure among the sensors, actuators, and control sy...
State estimation plays a vital role to ensure safe and reliable operations in smart grid. Intelligen...
Cyber-physical attacks are the most significant threat facing the utilisation and development of the...
A new formulation for detection of false data injection attacks in the smart grid is introduced. The...
The secure operation of smart grids is closely linked to state estimates that accurately reflect the...
The distribution denial of service (DDoS) attack, fault data injection attack (FDIA) and random atta...
The smart grid accessibility over the Internet of Things (IoT) is becoming attractive to electrical ...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Robust control and maintenance of the grid relies on accurate data. Both PMUs and state estimators a...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Kalman Filtering and statistical decision making criteria are used to develop a systematic method fo...
Building an efficient, green, and multifunctional smart grid cyber-physical system (CPS) while maint...
A smart grid is delay sensitive and requires the techniques that can identify and react on the abnor...