Coordinated Risk Mitigation Strategy For Integrated Energy Systems Under Cyber-Attacks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Risk-Assessment Model for Cyber Attacks on Information Systems

Industrial process-plants are an integral part of a nation’s economy and critical infrastructure. The information systems used by automated industrial plants are enticing targets of cyber attacks. However, the financial damages resulting from these cyber attacks are difficult to estimate since the resultant losses are not as tangible as physical losses. In this paper, we propose a mathematical ...

متن کامل

An Integrated Research Infrastructure for Validating Cyber-Physical Energy Systems

Renewables are key enablers in the plight to reduce greenhouse gas emissions and cope with anthropogenic global warming. The intermittent nature and limited storage capabilities of renewables culminate in new challenges that power system operators have to deal with in order to regulate power quality and ensure security of supply. At the same time, the increased availability of advanced automati...

متن کامل

Secure State Estimation of Cyber-Physical Systems under Switching Attacks

This paper deals with secure state estimation against switching mode and signal attacks on cyber-physical systems, possibly affected by adversarial extra fake measurement injection. A stochastic Bayesian approach is undertaken by exploiting Bernoulli and Poisson random sets for modeling the attack existence and, respectively, fake measurements, as well as multiple models for handling the variou...

متن کامل

Identifying cyber attacks under local model information

This work considers the problem of detecting corrupted components as well as external attacks in a large scale decentralized system. The electric power system, the transportation system, and generally any computer or network system are examples of large scale systems for which cyberattacks have become an important threat. Despite the recent advances in the theory of detection and identification...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Power Systems

سال: 2020

ISSN: 0885-8950,1558-0679

DOI: 10.1109/tpwrs.2020.2986455