Title | ||
---|---|---|
Effects of Switching Network Topologies on Stealthy False Data Injection Attacks Against State Estimation in Power Networks. |
Abstract | ||
---|---|---|
The stealthy attack, as a strategically designed false data injection attack against the power system state estimation mechanism, is able to let the corrupted measurements bypass residue-based bad data detectors with the same probability as that of uncorrupted measurements and is able to fool the system operator with the deviated estimates. While most of the existing articles assume the network to... |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/JSYST.2015.2494521 | IEEE Systems Journal |
Keywords | Field | DocType |
Network topology,Transmission line measurements,Power transmission lines,Security,Switches | Injection attacks,Computer science,Computer network,Electric power system,Real-time computing,Electric power transmission,Network topology,Operator (computer programming),Detector | Journal |
Volume | Issue | ISSN |
11 | 4 | 1932-8184 |
Citations | PageRank | References |
0 | 0.34 | 10 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shao-Cheng Wang | 1 | 43 | 5.63 |
Wei Ren | 2 | 5238 | 250.63 |
Ubaid M. Al-Saggaf | 3 | 37 | 9.76 |