Articles with "cyber attack" as a keyword



Photo by nampoh from unsplash

Cyber-attack detection via non-linear prediction of IP addresses: an innovative big data analytics approach

Sign Up to like & get
recommendations!
Published in 2021 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-021-11390-1

Abstract: Computer network systems are often subject to several types of attacks. For example, an excessive traffic load sent to a web server for making it unusable is the main technique introduced by the Distributed Denial… read more here.

Keywords: cyber attack; address; attack detection; non linear ... See more keywords
Photo from wikipedia

Mitigation of Frequency and Voltage Disruptions in Smart Grid During Cyber-Attack

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Control, Automation and Electrical Systems"

DOI: 10.1007/s40313-020-00574-z

Abstract: In this paper, impacts of cyber-attack on proportional integral derivative controlled automatic generation control unit and automatic voltage regulator have been analyzed individually. A controlled switching unit has been proposed for ensuring frequency stability during… read more here.

Keywords: cyber attack; voltage; frequency voltage; voltage disruptions ... See more keywords
Photo from wikipedia

Adaptive bounded neural network control for coordinated path-following of networked underactuated autonomous surface vehicles under time-varying state-dependent cyber-attack.

Sign Up to like & get
recommendations!
Published in 2019 at "ISA transactions"

DOI: 10.1016/j.isatra.2018.12.051

Abstract: This paper is concerned with the problem of coordinated path-following for networked underactuated autonomous surface vehicles in the presence of time-varying state-dependent cyber-attack. An adaptive bounded neural network controller is proposed to mitigate the malicious… read more here.

Keywords: cyber attack; path following; state; path ... See more keywords
Photo from wikipedia

A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2920326

Abstract: Smart grid technology increases reliability, security, and efficiency of the electrical grids. However, its strong dependencies on digital communication technology bring up new vulnerabilities that need to be considered for efficient and reliable power distribution.… read more here.

Keywords: cyber attack; smart grids; large scale; scale smart ... See more keywords
Photo by acfb5071 from unsplash

Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3029765

Abstract: As electric power became an essential part of daily life, resiliency and reliability of operation became important. A distribution management system (DMS) enables real-time monitoring and dynamic controls of the power distribution networks. As such,… read more here.

Keywords: system; power distribution; multi agent; power ... See more keywords
Photo from wikipedia

Cyber-Attack Detection and Countermeasure for Distributed Electric Springs for Smart Grid Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3145015

Abstract: With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving… read more here.

Keywords: countermeasure distributed; attack detection; cyber attack;
Photo by edhoradic from unsplash

Cyber-Attack Resilient Design of Wide-Area PSS Considering Practical Communication Constraints

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2019.2935092

Abstract: This article presents cyber-attack resilient design of wide-area power system stabilizers (WAPSSs) for damping low-frequency oscillations considering practical communication constraints. The measurements estimated by phasor measurement units (PMUs) are inherent to communication constraints such as… read more here.

Keywords: design wide; resilient design; communication; attack resilient ... See more keywords
Photo from wikipedia

A Novel Cyber Attack Detection Method in Networked Control Systems

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Cybernetics"

DOI: 10.1109/tcyb.2018.2843358

Abstract: This paper is concerned with cyber attack detection in a networked control system. A novel cyber attack detection method, which consists of two steps: 1) a prediction step and 2) a measurement update step, is… read more here.

Keywords: cyber attack; attack detection; networked control; method ... See more keywords
Photo from wikipedia

Data-Driven Cyber-Attack Detection of Intelligent Attacks in Islanded DC Microgrids

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Electronics"

DOI: 10.1109/tie.2022.3176301

Abstract: In this letter, a data-driven cyber-attack detection method for islanded dc microgrids is proposed. Data are collected by monitoring the behavior of an intelligent attacker who is able to bypass the conventional cyber-attack detection algorithms… read more here.

Keywords: cyber attack; islanded microgrids; detection; data driven ... See more keywords
Photo by nampoh from unsplash

A Self-Tuning Cyber-Attacks’ Location Identification Approach for Critical Infrastructures

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3133361

Abstract: The integration of the communications network and the Internet of Things in today’s critical infrastructures facilitates intelligent and online monitoring of these systems. However, although critical infrastructure’s digitalization brings tremendous advantages and opportunities for remote… read more here.

Keywords: location identification; cyber attack; attack; critical infrastructures ... See more keywords
Photo from wikipedia

Data-Driven Cyber-Attack Detection for PV Farms via Time-Frequency Domain Features

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2021.3136559

Abstract: The internetworking of grid-connected power electronics converters (PECs) in photovoltaic (PV) farms has inevitably expanded the cyber-attack surfaces. This paper presents a comprehensive study on cyber-attack detection and diagnosis for PEC-enabled PV farms via single… read more here.

Keywords: frequency domain; time; cyber attack; farms via ... See more keywords