In this paper, we examine the factors that influence the success of false data injection (FDI) attacks in the context of both cyber and physical styles of reinforcement. Many works consider the FDI attack in the context of the ability to change a measurement in a static system only. However, successful attacks will require first intrusion into a system followed by construction of an attack vector that can bypass bad data detection (BDD). In this way, we develop a full service framework for FDI risk assessment. The framework considers both the costs of system intrusion via a weighted graph assessment in combination with a physical, line overload-based vulnerability assessment. We present our simulations on a IEEE 14-bus system with an overla...
With the proliferation of smart devices and revolutions in communications, electrical distribution s...
abstract: The electric power system is monitored via an extensive network of sensors in tandem with ...
The rise of cyber-security concerns has brought significant attention to the analysis and design of ...
In this paper, we examine the factors that influence the success of false data injection (FDI) attac...
In this work, we examine how Moving Target Defences (MTDs) can be enhanced to circumvent intelligent...
With rapid advances in sensor, computer and communication networks, modern power systems have become...
abstract: Reliable operation of modern power systems is ensured by an intelligent cyber layer that m...
Understanding smart grid cyber attacks is key for developing appropriate protection and recovery mea...
Building an efficient, green, and multifunctional smart grid cyber-physical system (CPS) while maint...
In this paper, we investigate the process of detection of False Data Injection (FDI) in a Linear Par...
A cyber‐physical authentication strategy to protect power system infrastructure against false data i...
With the push for higher efficiency and reliability, an increasing number of intelligent electronic ...
Research Doctorate - Doctor of Philosophy (PhD)The integration of information and communication tech...
The accurately estimated state is of great importance for maintaining a stable running condition of ...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
With the proliferation of smart devices and revolutions in communications, electrical distribution s...
abstract: The electric power system is monitored via an extensive network of sensors in tandem with ...
The rise of cyber-security concerns has brought significant attention to the analysis and design of ...
In this paper, we examine the factors that influence the success of false data injection (FDI) attac...
In this work, we examine how Moving Target Defences (MTDs) can be enhanced to circumvent intelligent...
With rapid advances in sensor, computer and communication networks, modern power systems have become...
abstract: Reliable operation of modern power systems is ensured by an intelligent cyber layer that m...
Understanding smart grid cyber attacks is key for developing appropriate protection and recovery mea...
Building an efficient, green, and multifunctional smart grid cyber-physical system (CPS) while maint...
In this paper, we investigate the process of detection of False Data Injection (FDI) in a Linear Par...
A cyber‐physical authentication strategy to protect power system infrastructure against false data i...
With the push for higher efficiency and reliability, an increasing number of intelligent electronic ...
Research Doctorate - Doctor of Philosophy (PhD)The integration of information and communication tech...
The accurately estimated state is of great importance for maintaining a stable running condition of ...
The smart grid has become a cyber-physical system and the more cyber it becomes, the more prone it i...
With the proliferation of smart devices and revolutions in communications, electrical distribution s...
abstract: The electric power system is monitored via an extensive network of sensors in tandem with ...
The rise of cyber-security concerns has brought significant attention to the analysis and design of ...