Searched for: subject%3A%22attack%255C+detection%22
(1 - 7 of 7)
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Smart grid steady control relies heavily on the communication infrastructure among sensors, actuators, and control systems, which makes it vulnerable to cyber-attacks. Accurate acquisition of dynamic state information is deemed vital for efficient detection of these cyber-attacks on a smart grid. However, several popular state estimation...
conference paper 2022
document
Zhang, J. (author), Gallo, A.J. (author), Ferrari, Riccardo M.G. (author)
Multiplicative watermarking (MWM) is an active diagnosis technique for the detection of highly sophisticated attacks, but is vulnerable to malicious agents that use eaves-dropped data to identify and then remove or replicate the watermark. In this work, we propose a scheme to protect the parameters of MWM, by proposing a design strategy based...
conference paper 2023
document
Pan, K. (author)
The digital transformation of power systems has introduced a new challenge for robustness: cyber security threats. Motivated by the feasibility of a potent attack (e.g., the Stuxnet worm attack and the one in the hacker-caused Ukraine blackout) that it can be equipped with extensive system knowledge, vast attack resources to manipulate multiple...
doctoral thesis 2020
document
Chen, Jie (author), Gallo, A.J. (author), Yan, Shuo (author), Parisini, Thomas (author), Yuen Ron Hui, Shu (author)
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system stability. However, cyber-attacks remain a threat to such distributed control. This paper...
journal article 2022
document
Hofman, Daan (author)
With the ever-increasing digitalisation of society and the explosion of internet-enabled devices with the Internet of Things (IoT), keeping services and devices secure is becoming more important. Logs play a critical role in sustaining system reliability. Manual analysis of logs has become increasingly difficult, accelerating the development of...
master thesis 2023
document
ZHANG, JIAXUAN (author)
Cyber-physical systems are vulnerable to malicious attacks, which can lead to severe consequences. Active detection methods have emerged as a promising approach for identifying such attacks. However, existing active detection methods are susceptible to malicious parameter identification attacks, where attackers exploit eavesdropped data to...
master thesis 2023
document
Mooren, Maurits (author)
With the increasing amount of information sent in control systems, data is more often communicated through a communication network. These networked control systems use the network to exchange control and feedback signals among the system’s components. Data sent over a network attracts adversaries that try to read and modify this data. These...
master thesis 2019
Searched for: subject%3A%22attack%255C+detection%22
(1 - 7 of 7)