Rapid advances in smart devices tremendously facilitate our day-to-day lives. However, these can be exploited remotely via existing cyber vulnerabilities to cause disruption at the physical infrastructure level. In this paper, we discover a novel distributed and stealthy attack that uses malicious actuation of a large number of small-scale loads residing within a distribution network (DN). This attack is capable of cumulatively violating the underlying operational system limits, leading to widespread and prolonged disruptions. A key element of this attack is the efficient use of attack resources, planned via Stackelberg games. To mitigate this type of an attack, we propose a countermeasure strategy which adaptively suppresses adverse effect...
Random attacks that jointly minimize the amount of information acquired by the operator about the st...
Internet-connected devices will represent an increasing proportion of the load served by electric po...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
Doctor of PhilosophyDepartment of Electrical and Computer EngineeringHongyu WuRecent advances in the...
In the smart grid, bidirectional information exchange among customers, operators, and control device...
Active power distribution networks require sophisticated monitoring and control strategies for effic...
Smart grids have been witnessing continuous and rapid radical developments in the recent years. With...
Abstract—With the increase in use of information technology in advanced demand side management and g...
With the development of distributed networks, the remote controllability of the distributed energy o...
In the smart grid, bidirectional information exchange among customers, operators, and control device...
This paper considers the problem of designing a resilient distributed voltage control algorithm for ...
Abstract—Monitoring and actuation represent critical tasks for electric power utilities to maintain ...
For economic reasons, modern power systems are commonly operated close to their secure limits so tha...
Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples ...
The increased penetration of distributed energy resources (DER) will significantly increase the numb...
Random attacks that jointly minimize the amount of information acquired by the operator about the st...
Internet-connected devices will represent an increasing proportion of the load served by electric po...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...
Doctor of PhilosophyDepartment of Electrical and Computer EngineeringHongyu WuRecent advances in the...
In the smart grid, bidirectional information exchange among customers, operators, and control device...
Active power distribution networks require sophisticated monitoring and control strategies for effic...
Smart grids have been witnessing continuous and rapid radical developments in the recent years. With...
Abstract—With the increase in use of information technology in advanced demand side management and g...
With the development of distributed networks, the remote controllability of the distributed energy o...
In the smart grid, bidirectional information exchange among customers, operators, and control device...
This paper considers the problem of designing a resilient distributed voltage control algorithm for ...
Abstract—Monitoring and actuation represent critical tasks for electric power utilities to maintain ...
For economic reasons, modern power systems are commonly operated close to their secure limits so tha...
Cyber-Physical Systems (CPS) are present in many settings addressing a myriad of purposes. Examples ...
The increased penetration of distributed energy resources (DER) will significantly increase the numb...
Random attacks that jointly minimize the amount of information acquired by the operator about the st...
Internet-connected devices will represent an increasing proportion of the load served by electric po...
The paper considers the problem of detecting cyber-attacks occurring in communication networks typic...