標(biāo)題: Titlebook: Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems; Beibei Li,Rongxing Lu,Gaoxi Xiao Book 2020 The Editor(s) ( [打印本頁(yè)] 作者: LEVEE 時(shí)間: 2025-3-21 16:40
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems影響因子(影響力)
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems影響因子(影響力)學(xué)科排名
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems網(wǎng)絡(luò)公開度
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems被引頻次
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems被引頻次學(xué)科排名
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems年度引用
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems年度引用學(xué)科排名
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems讀者反饋
書目名稱Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems讀者反饋學(xué)科排名
作者: 硬化 時(shí)間: 2025-3-21 23:19 作者: Brain-Waves 時(shí)間: 2025-3-22 00:45
Book 2020ques of false data injection attacks in smart grid cyber-physical systems;.?Reviews false data injections for either measurement data or command data;.?Analyzes passive and proactive approaches to smart grid cyber-physical systems..作者: 精密 時(shí)間: 2025-3-22 07:25 作者: 慷慨不好 時(shí)間: 2025-3-22 10:44 作者: subordinate 時(shí)間: 2025-3-22 15:38 作者: subordinate 時(shí)間: 2025-3-22 18:36
,SPNTA: Reliability Analysis Under Topology Attacks—A Stochastic Petri Net Approach, 14 node power system as an example, the establishment and parameterization of the model are described in detail. The advantage of using this analytical model is that the system reliability can be measured from both transient analysis and steady-state analysis. Lastly, a large number of experiments 作者: 宣稱 時(shí)間: 2025-3-22 21:42 作者: 警告 時(shí)間: 2025-3-23 04:27
PFDD: On Feasibility and Limitations of Detecting FmDI Attacks Using D-FACTS, each class of FmDI attacks are, respectively, evaluated. In addition, the limitations of this approach are also discussed, and it is strictly proved that PFDD is not able to detect FmDI attacks targeted on buses or super-buses with degrees equalling 1.作者: subordinate 時(shí)間: 2025-3-23 05:34
2366-1186 alse data injections for either measurement data or command .?This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two ca作者: CLAIM 時(shí)間: 2025-3-23 12:03 作者: Implicit 時(shí)間: 2025-3-23 15:39
https://doi.org/10.1007/978-3-662-07396-4operating observations. Then, an adaptive cyber threat detection algorithm along with a reputation incentive mechanism is designed to identify opportunistic attackers. Extensive experiments on the IEEE 39-bus power system with the PowerWorld simulator demonstrate the utility of our DDOA scheme.作者: FORGO 時(shí)間: 2025-3-23 19:50 作者: 歸功于 時(shí)間: 2025-3-24 00:46
https://doi.org/10.1007/978-3-658-15122-5few, are rapidly incorporated into the existing electric grid over the recent years. Due to lack of strong and diligent security measures in place, however, these newly introduced technologies—exposing a great number of access points to the public—have been opening up possibilities for malignant penetrations.作者: Pseudoephedrine 時(shí)間: 2025-3-24 04:44
Introduction,few, are rapidly incorporated into the existing electric grid over the recent years. Due to lack of strong and diligent security measures in place, however, these newly introduced technologies—exposing a great number of access points to the public—have been opening up possibilities for malignant penetrations.作者: HILAR 時(shí)間: 2025-3-24 09:07 作者: 詞根詞綴法 時(shí)間: 2025-3-24 12:47 作者: lethargy 時(shí)間: 2025-3-24 15:25 作者: 吞噬 時(shí)間: 2025-3-24 20:51 作者: Chipmunk 時(shí)間: 2025-3-25 01:04 作者: CODE 時(shí)間: 2025-3-25 07:24
https://doi.org/10.1007/978-3-658-15122-5bad data detection, as well as FmDI attacks against state estimation. In addition, the state-of-the-art literature reviews on existing intrusion detection systems (IDSs), FDI attacks detection, and insider threats detection will also be provided.作者: LUT 時(shí)間: 2025-3-25 08:52
https://doi.org/10.1007/978-3-658-15122-5smission, distribution, and consumption is of prime concern in the twenty-first century. Unfortunately, the massive blackout in northeastern North America in 2003 uncovered the ease with which the electric grids could be taken down. It is, indeed, not the end of the story for the security and reliab作者: Watemelon 時(shí)間: 2025-3-25 14:38
https://doi.org/10.1007/978-3-658-15122-5bad data detection, as well as FmDI attacks against state estimation. In addition, the state-of-the-art literature reviews on existing intrusion detection systems (IDSs), FDI attacks detection, and insider threats detection will also be provided.作者: 翻動(dòng) 時(shí)間: 2025-3-25 19:25
Situierung und theoretischer Rahmenvolving network threat environment. The increasing complexity of the grid in the network and physical areas also exacerbates the challenges. In this chapter, we develop an analysis model based on stochastic Petri net (SPN) to evaluate and analyze the reliability of smart grid, especially for topolog作者: 藝術(shù) 時(shí)間: 2025-3-25 23:52 作者: Flustered 時(shí)間: 2025-3-26 01:32 作者: PRISE 時(shí)間: 2025-3-26 05:18
Hartmut Heuermann,Matthias Kuzinaon smart grids, which we term as the PFDD approach. However, few literature has focused on the systematic analysis of the feasibility and limitations of this approach. To meet this gap, in this chapter we pioneer to investigate the feasibility and limitations by employing PFDD to contain FmDI attack作者: 不持續(xù)就爆 時(shí)間: 2025-3-26 12:10
https://doi.org/10.1007/978-3-030-58672-0Smart grid security; power system security; cybersecurity; cyber-physical systems; false data injection 作者: 沒收 時(shí)間: 2025-3-26 12:37
978-3-030-58674-4The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerl作者: ROOF 時(shí)間: 2025-3-26 19:39 作者: white-matter 時(shí)間: 2025-3-26 23:58 作者: LUCY 時(shí)間: 2025-3-27 04:26
Fundamentals and Related Literature,bad data detection, as well as FmDI attacks against state estimation. In addition, the state-of-the-art literature reviews on existing intrusion detection systems (IDSs), FDI attacks detection, and insider threats detection will also be provided.作者: 喃喃而言 時(shí)間: 2025-3-27 09:15
,SPNTA: Reliability Analysis Under Topology Attacks—A Stochastic Petri Net Approach,volving network threat environment. The increasing complexity of the grid in the network and physical areas also exacerbates the challenges. In this chapter, we develop an analysis model based on stochastic Petri net (SPN) to evaluate and analyze the reliability of smart grid, especially for topolog作者: cliche 時(shí)間: 2025-3-27 12:57
DHCD: Distributed Host-Based Collaborative Detection for FmDI Attacks,allenging to counter FmDI attacks in smart grid CPS. Although many solutions for FmDI attacks have been proposed, most of them are based on state estimation with the help of the highly centralized control center; therefore, computationally expensive. Moreover, high-level security assurance generally作者: Chemotherapy 時(shí)間: 2025-3-27 15:02
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks,s) may potentially be compromised by opportunistic attackers with a purpose of manipulating the real-time electricity prices and then gaining illicit financial profits. In this chapter, we propose a Dirichlet-based detection scheme (DDOA) to contain such FcDI cyberattacks. Specifically, we build a D作者: 晚來的提名 時(shí)間: 2025-3-27 18:58
PFDD: On Feasibility and Limitations of Detecting FmDI Attacks Using D-FACTS,on smart grids, which we term as the PFDD approach. However, few literature has focused on the systematic analysis of the feasibility and limitations of this approach. To meet this gap, in this chapter we pioneer to investigate the feasibility and limitations by employing PFDD to contain FmDI attack作者: 頂點(diǎn) 時(shí)間: 2025-3-28 01:03