- document
-
Chen, Jie (author), Gallo, A.J. (author), Yan, Shuo (author), Parisini, Thomas (author), Yuen Ron Hui, Shu (author)With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system stability. However, cyber-attacks remain a threat to such distributed control. This paper...journal article 2022
- document
-
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)Smart grid steady control relies heavily on the communication infrastructure among sensors, actuators, and control systems, which makes it vulnerable to cyber-attacks. Accurate acquisition of dynamic state information is deemed vital for efficient detection of these cyber-attacks on a smart grid. However, several popular state estimation...conference paper 2022
- document
-
ZHANG, JIAXUAN (author)Cyber-physical systems are vulnerable to malicious attacks, which can lead to severe consequences. Active detection methods have emerged as a promising approach for identifying such attacks. However, existing active detection methods are susceptible to malicious parameter identification attacks, where attackers exploit eavesdropped data to...master thesis 2023
- document
-
Hofman, Daan (author)With the ever-increasing digitalisation of society and the explosion of internet-enabled devices with the Internet of Things (IoT), keeping services and devices secure is becoming more important. Logs play a critical role in sustaining system reliability. Manual analysis of logs has become increasingly difficult, accelerating the development of...master thesis 2023