Detection of false data injection attacks against state estimation in smart grids based on a mixture Gaussian distribution learning method

SA Foroutan, FR Salmasi - IET Cyber‐Physical Systems …, 2017 - Wiley Online Library
One of the most addressed attacks in power networks is false data injection (FDI) which
affects monitoring, fault detection, and state estimation integrity by tampering measurement …

The convergence of machine learning and communications

W Samek, S Stanczak, T Wiegand - arXiv preprint arXiv:1708.08299, 2017 - arxiv.org
The areas of machine learning and communication technology are converging. Today's
communications systems generate a huge amount of traffic data, which can help to …

[图书][B] Wireless multimedia communication systems: design, analysis, and implementation

KR Rao, ZS Bojkovic, BM Bakmaz - 2017 - books.google.com
Rapid progress in software, hardware, mobile networks, and the potential of interactive
media poses many questions for researchers, manufacturers, and operators of wireless …

Multi-step prediction with missing smart sensor data using multi-task Gaussian processes

P Karunaratne, M Moshtaghi… - … Conference on Big …, 2017 - ieeexplore.ieee.org
With the proliferation of sensors and the increased connectivity of citizens, many global cities
are increasingly adopting Smart City initiatives. Such initiatives provide real-time monitoring …

Study of monitoring false data injection attacks based on machine-learning in electric systems

B Wang, Y Zhao, S Zhang, B Li - Journal of Electronics and …, 2017 - clausiuspress.com
False data injected by hackers can interfere with power system state estimation and pose a
great threat to the safe and reliable operation of modern power systems (FDIA). The …

Multi-aspect DDOS detection system for securing cloud network

P Shamsolmoali, M Zareapoor… - … of research on end-to-end …, 2017 - igi-global.com
Abstract Distributed Denial of Service (DDoS) attacks have become a serious attack for
internet security and Cloud Computing environment. This kind of attacks is the most complex …

Privacy-preserving meter reading transmission in smart grid

L Zhu, Z Zhang, C Xu, L Zhu, Z Zhang, C Xu - Secure and privacy …, 2017 - Springer
In this chapter, the area of smart grid and privacy preservation schemes are discussed and
compared in detail. Existing power grids generally carry energy from central locations to a …

[PDF][PDF] Efficient Energy Maximizing and Clone Detection using Wireless Sensor Network

SRT Saravanan - researchgate.net
Compromised node and denial of service are two key attacks in wireless sensor networks
(WSNs). Wireless sensors have been widely deployed for a variety of applications, ranging …

Systematic Block Qc-ldpc Untuk Sistem Komunikasi Berlatensi Rendah Dan Reliable

Y Julian, RP Astuti, K Anwar - eProceedings …, 2017 - … .telkomuniversity.ac.id
Teknologi telekomunikasi generasi kelima (5G) mensyaratkan bahwa beberapa aplikasi
jaringan masa depan harus memenuhi garansi latensi t ≤ 1 ms serta ultra reliable. Tugas …

[PDF][PDF] By using ERCD protocol Energy and Memory Efficient Clone Detection in Wireless Sensor Networks

NN Kumar, MS Kumar - scholar.archive.org
A power-efficient location-conscious clone detection protocol is proposed in densely
deployed WSNs that could assure hit clone assault detection and preserve exceptional …