Searched for: subject%3A%22cyber%255C-attacks%22
(1 - 20 of 26)

Pages

document
Serracino Inglott, P. (author)
Do the deviant acts carried out by the collective known as Anonymous qualify as vigilante activity, and if so, can they be justified? Addressing this question helps expose the difficulties of morally evaluating technologically enabled deviance. Anonymous is a complex, fluid actor but not as mysterious as popularly portrayed. Under a definition...
journal article 2013
document
Zhu, Y. (author)
Cyber attack nowadays is increasingly being reported. Defenders need a good understanding of attacker’s perspective in order to accurately anticipate threats and effectively mitigate attacks. This understanding can be obtained through sharing attack pattern. However, in the existing researches the consideration about information sharing is not...
master thesis 2015
document
Tzanakou, Eleni (author)
Nowadays, by using the new ICT technologies the functional efficiency of the Smart Grid is increased but at the same time leads to a more vulnerable system and makes the Smart Grid a potential target for cyber-attacks. In fact, cyber-attacks are becoming one of the most serious threats in critical infrastructures. More than 80% of energy...
master thesis 2017
document
Jahanshahi, N. (author), Ferrari, Riccardo M.G. (author)
Platoons of autonomous vehicles are currently being investigated by academic and industrial researchers as a way to increase road capacity and fuel efficiency. In order to fully reach such goals, a platoon must be endowed with cooperative capabilities, such as Cooperative Adaptive Cruise Control (CACC). This technique is based on the vehicles’...
journal article 2018
document
Charalambous, Georgia (author)
The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted bank asking users to enter extra personal information (e.g., the...
master thesis 2018
document
Pan, K. (author), Gusain, D. (author), Palensky, P. (author)
The evolved smart grid has become a cyber physical energy system that could be exposed to a massive amount of cyber threats. Vulnerabilities within the cyber part can be used to launch multiple types of attacks that corrupt the physical system. The complexity of cyber physical energy system, the existing of different kinds of attacks, require...
conference paper 2019
document
Bijmans, Hugo (author)
Cryptojacking, a phenomenon also known as drive-by cryptomining, involves stealing computing power from others to be used in illicit cryptomining. While first observed as host-based infections with low activity, the release of an efficient browser-based cryptomining application -- as introduced by Coinhive in 2017 -- has skyrocketed...
master thesis 2019
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Palensky, P. (author)
Power systems automation and communication standards are crucial for the transition of the conventional power system towards a smart grid. The IEC 61850 standard is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation devices. IEC 61850 serves as the...
conference paper 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Presekal, A. (author), Palensky, P. (author)
Power system automation and communication standards are spearheading the power system transition towards a smart grid. IEC 61850 is one such standard, which is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation and protection devices within digital...
conference paper 2020
document
van der Knaap, Paul (author)
The Internet has grown from a few interconnections of trusted parties to an incredibly large network with many different use cases. While the Internet grew, threats emerged as well. Although there are many different threats on the Internet, Distributed Denial of Service (DDoS) attacks are a threat that keeps rising in the threat landscape. The...
master thesis 2020
document
Patel, Abhilash (author), Roy, Spandan (author), Baldi, S. (author)
By increasingly relying on network-based operation for control, monitoring, and protection functionalities, modern wide-area power systems have also become vulnerable to cyber-attacks aiming to damage system performance and/or stability. Resilience in state-of-the-art methods mostly relies on known characteristics of the attacks and static...
journal article 2021
document
Semertzis, Ioannis (author)
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. These traditionally segregated systems are now being integrated with general-purpose Information and Communication Technologies (ICTs). The coupling of the physical power system and its communications infrastructure forms a complex, interdependent...
master thesis 2021
document
Chen, Jie (author), Gallo, A.J. (author), Yan, Shuo (author), Parisini, Thomas (author), Yuen Ron Hui, Shu (author)
With increasing installations of grid-connected power electronic converters in the distribution network, there is a new trend of using distributed control in a cyber layer to coordinate the operations of these power converters for improving power system stability. However, cyber-attacks remain a threat to such distributed control. This paper...
journal article 2022
document
Subramaniam Rajkumar, Vetrivel (author), Musunuri, Shyam (author), Stefanov, Alexandru (author), Bruijns, Siem (author), de Wit, J.J. (author), Klaar, Danny (author), Louh, Amadou (author), Thoen, Arnaud (author), Palensky, P. (author)
Paper ID – 0348
conference paper 2022
document
Mohammadpourfard, Mostafa (author), Weng, Yang (author), Khalili, Abdullah (author), Genc, Istemihan (author), Shefaei, A. (author), Mohammadi-Ivatloo, Behnam (author)
The expansion of power systems over large geographical areas renders centralized processing inefficient. Therefore, the distributed operation is increasingly adopted. This work introduces a new type of attack against distributed state estimation of power systems, which operates on inter-area boundary buses. We show that the developed attack...
journal article 2022
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Smart grid steady control relies heavily on the communication infrastructure among sensors, actuators, and control systems, which makes it vulnerable to cyber-attacks. Accurate acquisition of dynamic state information is deemed vital for efficient detection of these cyber-attacks on a smart grid. However, several popular state estimation...
conference paper 2022
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
Distributed secondary control is deemed necessary to restore the state of AC micro-grids to set points. However, for its limited global information, the power electronic system is vulnerable to cyber-attacks that aim to desynchronize converters or even cause a shutdown of micro-grids by unnecessarily triggering the protection schemes. To this...
conference paper 2022
document
Semertzis, I. (author), Subramaniam Rajkumar, Vetrivel (author), Stefanov, Alexandru (author), Fransen, Frank (author), Palensky, P. (author)
Over the past decade, the number of cyber attack incidents targeting critical infrastructures such as the electrical power system has increased. To assess the risk of cyber attacks on the cyber-physical system, a holistic approach is needed that considers both system layers. However, the existing risk assessment methods are either qualitative in...
conference paper 2022
document
Keijzer, T. (author), Ferrari, Riccardo M.G. (author), Sandberg, Henrik (author)
Interconnections in modern systems make them vulnerable to adversarial attackers both by corrupting communication channels and compromising entire subsystems. The field of secure state estimation (SSE) aims to provide correct state estimation even when an unknown part of the measurement signals is corrupted. In this letter, we propose a...
journal article 2023
document
Xiao, J. (author), Wang, L. (author), Qin, Z. (author), Bauer, P. (author)
In multi-inverter parallel connected islanded micro-grids, reactive power sharing is challenged by the differences in feeder impedance and various controller parameters. In order to address this issue, a virtual impedance reshaping strategy based on the consensus algorithm is proposed in this paper. The proposed method facilitates adaptive...
conference paper 2023
Searched for: subject%3A%22cyber%255C-attacks%22
(1 - 20 of 26)

Pages