Transient simulation is a critical task of validating the dynamic model of the power grid. We propose an off-line method for validating dynamic grid models and assessing the dynamic security of the grid in the presence of cyberattacks. Simulations are executed in PowerWorld and PSCAD/EMTDC to compare the impact on the grid of cyber-attacks. Generator set points in the IEEE 14-bus system have been modified to mimic modern power system operation. To get effective measurements for state estimation, SCADA polling model is reproduced in the electromagnetic transient (EMT) simulation by providing controlled sampling frequency. The results of a tripped line case and injecting false data to the loads caused by cyberattacks is presented and analyzed...
Supervisory Control and Data Acquisition (SCADA) systems control and monitor industrial and critical...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
© 2015 IEEE. With sufficient resources, attackers might be able to intrude into multiple substation-...
The traditional power systems are rapidly digitalized and automated for increased monitoring and con...
The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA)...
Smart Grids (SGs) are Critical Infrastructures (CI), which are responsible for controlling and main...
One of the main goals of this thesis is to expand upon a previously created simulation of a microgri...
Smart grid is a complex cyber physical system containing numerous and variety of sources, devices, c...
During the evolution of today's power grid to a Smart Grid it is expected that IP-based communicatio...
The electrical power network is a critical infrastructure in today’s society, so its safe and reliab...
As information and communication networks are highly interconnected with the power grid, cyber secur...
Abstract—To understand security vulnerabilities of communication protocols used in power systems, a ...
*Corresponding author Abstract: This paper describes a project that integrates real devices used in ...
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from ...
This paper analyses the impacts of credible contingency and an event of cyber attack on the dynamic ...
Supervisory Control and Data Acquisition (SCADA) systems control and monitor industrial and critical...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
© 2015 IEEE. With sufficient resources, attackers might be able to intrude into multiple substation-...
The traditional power systems are rapidly digitalized and automated for increased monitoring and con...
The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA)...
Smart Grids (SGs) are Critical Infrastructures (CI), which are responsible for controlling and main...
One of the main goals of this thesis is to expand upon a previously created simulation of a microgri...
Smart grid is a complex cyber physical system containing numerous and variety of sources, devices, c...
During the evolution of today's power grid to a Smart Grid it is expected that IP-based communicatio...
The electrical power network is a critical infrastructure in today’s society, so its safe and reliab...
As information and communication networks are highly interconnected with the power grid, cyber secur...
Abstract—To understand security vulnerabilities of communication protocols used in power systems, a ...
*Corresponding author Abstract: This paper describes a project that integrates real devices used in ...
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from ...
This paper analyses the impacts of credible contingency and an event of cyber attack on the dynamic ...
Supervisory Control and Data Acquisition (SCADA) systems control and monitor industrial and critical...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
© 2015 IEEE. With sufficient resources, attackers might be able to intrude into multiple substation-...