- document
-
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)Smart grid steady control relies heavily on the communication infrastructure among sensors, actuators, and control systems, which makes it vulnerable to cyber-attacks. Accurate acquisition of dynamic state information is deemed vital for efficient detection of these cyber-attacks on a smart grid. However, several popular state estimation...conference paper 2022
- document
-
Zhang, J. (author), Gallo, A.J. (author), Ferrari, Riccardo M.G. (author)Multiplicative watermarking (MWM) is an active diagnosis technique for the detection of highly sophisticated attacks, but is vulnerable to malicious agents that use eaves-dropped data to identify and then remove or replicate the watermark. In this work, we propose a scheme to protect the parameters of MWM, by proposing a design strategy based...conference paper 2023
- document
-
Towards Cyber-secure Intelligent Electrical Power Grids: Vulnerability Analysis and Attack DetectionPan, K. (author)The digital transformation of power systems has introduced a new challenge for robustness: cyber security threats. Motivated by the feasibility of a potent attack (e.g., the Stuxnet worm attack and the one in the hacker-caused Ukraine blackout) that it can be equipped with extensive system knowledge, vast attack resources to manipulate multiple...doctoral thesis 2020
- document
-
Chen, Jie (author), Gallo, A.J. (author), Yan, Shuo (author), Parisini, Thomas (author), Yuen Ron Hui, Shu (author)With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system stability. However, cyber-attacks remain a threat to such distributed control. This paper...journal article 2022
- document
-
Hofman, Daan (author)With the ever-increasing digitalisation of society and the explosion of internet-enabled devices with the Internet of Things (IoT), keeping services and devices secure is becoming more important. Logs play a critical role in sustaining system reliability. Manual analysis of logs has become increasingly difficult, accelerating the development of...master thesis 2023
- document
-
ZHANG, JIAXUAN (author)Cyber-physical systems are vulnerable to malicious attacks, which can lead to severe consequences. Active detection methods have emerged as a promising approach for identifying such attacks. However, existing active detection methods are susceptible to malicious parameter identification attacks, where attackers exploit eavesdropped data to...master thesis 2023
- document
-
Mooren, Maurits (author)With the increasing amount of information sent in control systems, data is more often communicated through a communication network. These networked control systems use the network to exchange control and feedback signals among the system’s components. Data sent over a network attracts adversaries that try to read and modify this data. These...master thesis 2019