In 2019, the Naval Facilities Engineering Command (NAVFAC) deployed its first smart grid infrastructure in Norfolk, VA, enabling shore commands to meet energy goals set by the secretary of the Navy. However, with increased functionality and control comes increased vulnerability to malicious cyber activity. This research aims to address anomaly detection using an autoencoder neural network as an intrusion detection mechanism on the NAVFAC smart grid. We built and experimented with multiple autoencoder structures to identify an optimal model that provides the best results in terms of precision, recall, and accuracy for the data sets used. We trained our autoencoder on NAVFAC-provided advanced metering infrastructure (AMI) data. We used the NA...
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to devastating con...
This paper looks at potential vulnerabilities of the Smart Grid energy infrastructure to data inject...
Anomalies in data often convey critical information that can be leveraged in a variety of applicatio...
In 2019, the Naval Facilities Engineering Command (NAVFAC) deployed the Navy smart grid across multi...
The U.S. Navy currently deploys a centralized smart grid that consists of several control systems to...
With the Navy's focus on efficient energy consumption, Naval Facilities Engineering Command deployed...
The research microgrid currently deployed at Marine Corps Air Station, Miramar, is leveraging Verizo...
State estimation is of considerable significance for the power system operation and control. However...
The security of energy supply in a power grid critically depends on the ability to accurately estima...
Supervisory control and data acquisition (SCADA) systems are industrial control systems that are use...
The Department of Defense requires a secure presence in the cyber domain to successfully execute its...
Computer networks are vulnerable to cyber attacks that can affect the confidentiality, integrity and...
Smart grids have the potential to create a revolution in the energy industry. Smart grids have multi...
Cyber-physical attacks are the most significant threat facing the utilisation and development of the...
Smart grid systems enhanced the capability of traditional power networks while being vulnerable to d...
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to devastating con...
This paper looks at potential vulnerabilities of the Smart Grid energy infrastructure to data inject...
Anomalies in data often convey critical information that can be leveraged in a variety of applicatio...
In 2019, the Naval Facilities Engineering Command (NAVFAC) deployed the Navy smart grid across multi...
The U.S. Navy currently deploys a centralized smart grid that consists of several control systems to...
With the Navy's focus on efficient energy consumption, Naval Facilities Engineering Command deployed...
The research microgrid currently deployed at Marine Corps Air Station, Miramar, is leveraging Verizo...
State estimation is of considerable significance for the power system operation and control. However...
The security of energy supply in a power grid critically depends on the ability to accurately estima...
Supervisory control and data acquisition (SCADA) systems are industrial control systems that are use...
The Department of Defense requires a secure presence in the cyber domain to successfully execute its...
Computer networks are vulnerable to cyber attacks that can affect the confidentiality, integrity and...
Smart grids have the potential to create a revolution in the energy industry. Smart grids have multi...
Cyber-physical attacks are the most significant threat facing the utilisation and development of the...
Smart grid systems enhanced the capability of traditional power networks while being vulnerable to d...
The advent of the Smart Grid (SG) raises severe cybersecurity risks that can lead to devastating con...
This paper looks at potential vulnerabilities of the Smart Grid energy infrastructure to data inject...
Anomalies in data often convey critical information that can be leveraged in a variety of applicatio...