A new formulation for detection of false data injection attacks in the smart grid is introduced. The attack detection problem is posed as a statistical learning problem in which the observed measurements are classified as being either attacked or secure. The proposed approach provides an attack detection framework that surmounts over the constraints arising due to the sparse structure of the problem and implicitly exploits any available prior knowledge about the system. Specifically, three supervised learning algorithms are presented. These procedures operate by first observing the power system in order to construct a training dataset which is later used to detect the attacks in new observations. In order to assess the validity of the propo...
Smart grids integrate advanced information and communication technologies (ICTs) into traditional po...
The paper investigates a novel sparse false data injection attack method in a smart grid (SG) with i...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
Attack detection problems in the smart grid are posed as statistical learning problems for different...
Cyber-physical attacks are the most significant threat facing the utilisation and development of the...
The secure operation of smart grids is closely linked to state estimates that accurately reflect the...
This paper discusses malicious false data injection attacks on the wide area measurement and monitor...
In a physical microgrid system, equipment failures, manual misbehavior of equipment, and power quali...
The advanced communication technology provides new monitoring and control strategies for smart grids...
The electric smart grid, a critical national infrastructure and among the largest and most complex c...
One of the most addressed attacks in power networks is false data injection (FDI) which affects moni...
Stealthy false data injection attacks target state estimation in energy management systems in smart ...
A smart grid is delay sensitive and requires the techniques that can identify and react on the abnor...
With the growing concern in security and privacy of smart grid, false data injection attack detectio...
This paper looks at potential vulnerabilities of the Smart Grid energy infrastructure to data inject...
Smart grids integrate advanced information and communication technologies (ICTs) into traditional po...
The paper investigates a novel sparse false data injection attack method in a smart grid (SG) with i...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
Attack detection problems in the smart grid are posed as statistical learning problems for different...
Cyber-physical attacks are the most significant threat facing the utilisation and development of the...
The secure operation of smart grids is closely linked to state estimates that accurately reflect the...
This paper discusses malicious false data injection attacks on the wide area measurement and monitor...
In a physical microgrid system, equipment failures, manual misbehavior of equipment, and power quali...
The advanced communication technology provides new monitoring and control strategies for smart grids...
The electric smart grid, a critical national infrastructure and among the largest and most complex c...
One of the most addressed attacks in power networks is false data injection (FDI) which affects moni...
Stealthy false data injection attacks target state estimation in energy management systems in smart ...
A smart grid is delay sensitive and requires the techniques that can identify and react on the abnor...
With the growing concern in security and privacy of smart grid, false data injection attack detectio...
This paper looks at potential vulnerabilities of the Smart Grid energy infrastructure to data inject...
Smart grids integrate advanced information and communication technologies (ICTs) into traditional po...
The paper investigates a novel sparse false data injection attack method in a smart grid (SG) with i...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...