M Xia, Z Wang, M Lu, L Pan - Electric Power Systems Research, 2022 - Elsevier
In the parameter identification of power transmission system, deep learning methods stand out because of its effectiveness and robustness. However, deep learning methods usually …
This paper provides a survey of measurable factors affecting the adoption of cybersecurity enhancement strategies in the smart grid. From power systems operators' point of view, it is …
This paper investigates the problem of automatic detection of cyber-attacks in cyber-physical systems (CPSs), where some of the state variables are corrupted by an attacker. An attack …
A Khaleghi, MS Ghazizadeh… - … on Power Systems, 2023 - ieeexplore.ieee.org
In the realm of power systems, load redistribution attacks (LRAs) involve the manipulation of measurements by attackers, leading operators to make decisions based on falsified …
VS Tabar, S Ghassemzadeh, S Tohidi… - International Journal of …, 2022 - Elsevier
Renewable energies are extensively utilized in smart grids. Due to the widespread use of information and communication technologies in such networks, their security has become a …
J Le, H Lang, J Wang, W Wang, G Luo - Electronics, 2024 - mdpi.com
With the large scale and high proportion of distributed generation connected to the power grid, the distributed economic dispatch system has attracted more attention because of its …
H Wang, Y Ouyang - IEEE Transactions on Instrumentation and …, 2022 - ieeexplore.ieee.org
During the measurement and transmission in power systems, the noise will interfere the data to varying degrees, and the accuracy of transient stability assessment (TSA) may be …
A Barshan, SMA Mohammadi, F Abdollahi… - International Journal of …, 2024 - Elsevier
This work proposes an approach based on critical dynamic modes to detect four types of phasor measurement unit (PMU) data anomalies in smart power grids. Smart power grids as …
Smart grid cyber-security has come to the forefront of national security priorities due to the emergence of new cyber threats such as the False Data Injection (FDI) attack. This specific …