[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kurt et al., 2018 - Google Patents

Online cyber-attack detection in smart grid: A reinforcement learning approach

Kurt et al., 2018

View PDF
Document ID
11813429438681018403
Author
Kurt M
Ogundijo O
Li C
Wang X
Publication year
Publication venue
IEEE Transactions on Smart Grid

External Links

Snippet

Early detection of cyber-attacks is crucial for a safe and reliable operation of the smart grid. In the literature, outlier detection schemes making sample-by-sample decisions and online detection schemes requiring perfect attack models have been proposed. In this paper, we …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0218Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
    • G05B23/0243Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults model based detection method, e.g. first-principles knowledge model
    • G05B23/0254Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults model based detection method, e.g. first-principles knowledge model based on a quantitative model, e.g. mathematical relationships between inputs and outputs; functions: observer, Kalman filter, residual calculation, Neural Networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • G06N3/0472Architectures, e.g. interconnection topology using probabilistic elements, e.g. p-rams, stochastic processors
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0218Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterised by the fault detection method dealing with either existing or incipient faults
    • G05B23/0224Process history based detection method, e.g. whereby history implies the availability of large amounts of data

Similar Documents

Publication Publication Date Title
Kurt et al. Online cyber-attack detection in smart grid: A reinforcement learning approach
An et al. Defending against data integrity attacks in smart grid: A deep reinforcement learning-based approach
Wang et al. Anomaly detection for industrial control system based on autoencoder neural network
Ntalampiras Detection of integrity attacks in cyber-physical critical infrastructures using ensemble modeling
Ashrafuzzaman et al. Detecting stealthy false data injection attacks in power grids using deep learning
US10817394B2 (en) Anomaly diagnosis method and anomaly diagnosis apparatus
Huang et al. Real-time detection of false data injection in smart grid networks: An adaptive CUSUM method and analysis
Zhou et al. Design and analysis of multimodel-based anomaly intrusion detection systems in industrial process automation
Higgins et al. Stealthy MTD against unsupervised learning-based blind FDI attacks in power systems
Zonouz et al. SOCCA: A security-oriented cyber-physical contingency analysis in power infrastructures
Chen et al. A novel online detection method of data injection attack against dynamic state estimation in smart grid
Ramaki et al. RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection
Huang et al. False data injection attack detection for industrial control systems based on both time-and frequency-domain analysis of sensor data
Liu et al. False data-injection attack detection in cyber–physical systems with unknown parameters: A deep reinforcement learning approach
Luo et al. Detection and isolation of false data injection attack via adaptive Kalman filter bank
Rao et al. Cyber security enhancement of smart grids via machine learning-a review
Krundyshev et al. Prevention of false data injections in smart infrastructures
Zhang et al. Optimal energy allocation based on SINR under DoS attack
Akbarian et al. Attack resilient cloud-based control systems for industry 4.0
Kazeminajafabadi et al. Optimal detection for Bayesian attack graphs under uncertainty in monitoring and reimaging
Chakrabarty et al. Unified detection of attacks involving injection of false control commands and measurements in transmission systems of smart grids
Zhang et al. Detection and localization of data forgery attacks in automatic generation control
Fu et al. SPC methods for nonstationary correlated count data with application to network surveillance
Umsonst et al. A game-theoretic approach for choosing a detector tuning under stealthy sensor data attacks
Feng et al. Stochastic games for power grid coordinated defence against coordinated attacks