Searched for: subject%3A%22cyber%255C-attacks%22
(1 - 2 of 2)
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Communication-based distributed secondary control is deemed necessary to restore the state of islanding AC microgrids to set points. As its limited global information, the microgrids become vulnerable to cyber-attacks, which by falsifying the communicating singles, like the angular frequency, can disturb the power dispatch in the microgrids...
journal article 2024
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Distributed secondary control is deemed necessary to restore the state of AC micro-grids to set points. However, for its limited global information, the power electronic system is vulnerable to cyber-attacks that aim to desynchronize converters or even cause a shutdown of micro-grids by unnecessarily triggering the protection schemes. To this...
conference paper 2022