Future power networks will be characterized by safe and reliable functionality against physical malfunctions and cyber attacks. This paper proposes a unified framework and advanced monitoring procedures to detect and identify network components malfunction or measurements corruption caused by an omniscient adversary. We model a power system under cyber-physical attack as a linear time-invariant descriptor system with unknown inputs. Our attack model generalizes the prototypical stealth, (dynamic) false-data injection and replay attacks. We characterize the fundamental limitations of both static and dynamic procedures for attack detection and identification. Additionally, we design provably-correct (dynamic) detection and identification proc...
This paper presents an anomaly-based methodology for reliable detection of integrity attacks in cybe...
This paper presents an anomaly-based methodology for reliable detection of integrity attacks in cybe...
peer reviewedIn the present paper, the problem of attacks on cyber-physical systems via networked co...
Abstract — Future power networks will be characterized by safe and reliable functionality against ph...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
Abstract — Future power grids will be required to operate safely and reliably against cyber-physical...
Cyber-physical systems are ubiquitous in power systems, transportation networks, industrial processe...
Abstract This paper addresses a set-theoretic method for the detection of data corruption cyber-atta...
Abstract — Cyber-physical systems are ubiquitous in power systems, transportation networks, industri...
Anomalies in the form of natural faults or malicious attacks can affect the dynamics of power system...
Anomalies in the form of natural faults or malicious attacks can affect the dynamics of power system...
The digital transformation of power systems has introduced a new challenge for robustness: cyber sec...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
The threat of malicious network attacks has become significant ever since networking became pervasiv...
In the present paper, the problem of attacks on cyber-physical systems via networked control system ...
This paper presents an anomaly-based methodology for reliable detection of integrity attacks in cybe...
This paper presents an anomaly-based methodology for reliable detection of integrity attacks in cybe...
peer reviewedIn the present paper, the problem of attacks on cyber-physical systems via networked co...
Abstract — Future power networks will be characterized by safe and reliable functionality against ph...
Abstract—Cyber-physical systems integrate computation, com-munication, and physical capabilities to ...
Abstract — Future power grids will be required to operate safely and reliably against cyber-physical...
Cyber-physical systems are ubiquitous in power systems, transportation networks, industrial processe...
Abstract This paper addresses a set-theoretic method for the detection of data corruption cyber-atta...
Abstract — Cyber-physical systems are ubiquitous in power systems, transportation networks, industri...
Anomalies in the form of natural faults or malicious attacks can affect the dynamics of power system...
Anomalies in the form of natural faults or malicious attacks can affect the dynamics of power system...
The digital transformation of power systems has introduced a new challenge for robustness: cyber sec...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
The threat of malicious network attacks has become significant ever since networking became pervasiv...
In the present paper, the problem of attacks on cyber-physical systems via networked control system ...
This paper presents an anomaly-based methodology for reliable detection of integrity attacks in cybe...
This paper presents an anomaly-based methodology for reliable detection of integrity attacks in cybe...
peer reviewedIn the present paper, the problem of attacks on cyber-physical systems via networked co...