期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
EPASAD:ellipsoid decision boundary based Process-Aware Stealthy Attack Detector
1
作者 Vikas Maurya Rachit Agarwal +1 位作者 Saurabh Kumar Sandeep Shukla 《Cybersecurity》 EI CSCD 2024年第3期32-48,共17页
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber attackers.These critical infrastructures are usually Cyber-Physical Systems such as power grids,... Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber attackers.These critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and sewage treatment facilities,oil and gas pipelines,etc.In recent times,these systems have suffered from cyber attacks numer-ous times.Researchers have been developing cyber security solutions for Cls to avoid lasting damages.According to standard frameworks,cyber security based on identification,protection,detection,response,and recovery are at the core of these research.Detection of an ongoing attack that escapes standard protection such as firewall,anti-virus,and host/network intrusion detection has gained importance as such attacks eventually affect the physical dynamics of the system.Therefore,anomaly detection in physical dynamics proves an effective means to implement defense-in-depth.PASAD is one example of anomaly detection in the sensor/actuator data,representing such systems physical dynamics.We present EPASAD,which improves the detection technique used in PASAD to detect these micro-stealthy attacks,as our experiments show that PASAD's spherical boundary-based detection fails to detect.Our method EPASAD overcomes this by using Ellipsoid boundaries,thereby tightening the boundaries in various dimen-sions,whereas a spherical boundary treats all dimensions equally.We validate EPASAD using the dataset produced by the TE-process simulator and the C-town datasets.The results show that EPASAD improves PASAD's average recall by 5.8%and 9.5%for the two datasets,respectively. 展开更多
关键词 Intrusion detection system critical infrastructure security Industrial control system Machine learning
原文传递
Centralized multi-agent implementation for securing critical loads in PV based microgrid 被引量:10
2
作者 A.SUJIL Saurabh Kumar AGARWAL Rajesh KUMAR 《Journal of Modern Power Systems and Clean Energy》 SCIE EI 2014年第1期77-86,共10页
The promotion of recent critical load securing of power system research has been directed towards centralized commands and control functions.This paper presents a multi-agent based critical load securing in a PV based... The promotion of recent critical load securing of power system research has been directed towards centralized commands and control functions.This paper presents a multi-agent based critical load securing in a PV based microgrid.For the trustworthy operation of critical buildings,the reliability,efficiency and security of the power system should be guaranteed.At present,to increase the security and reliability of electricity supply there is a need to design a distributed and autonomous subset of a larger grid or a microgrid.This work also clearly discusses the modelling and simulation of specialized microgrid called an Intelligent Distributed Autonomous Power Systems(IDAPS).The IDAPS microgrid plays a crucial role in constructing power grid that facilitate use of renewable energy technologies.IDAPS microgrid comprising of solar photovoltaic as distributed energy resources,different loads and their control algorithms,has been developed.Several case studies have been simulated to evaluate the operation of the IDAPS microgrid during parallel,islanded mode operation and securing critical loads during emergency. 展开更多
关键词 MICROGRID Multi-agent system(MAS) critical load securing Distributed energy resources
原文传递
Orbiting Optimization Model for Tracking Voltage Security Region Boundary in Bulk Power Grids 被引量:1
3
作者 Xue Li Tao Jiang +4 位作者 Linquan Bai Xiao Kou Fangxing Li Houhe Chen Guoqing Li 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2022年第2期476-487,共12页
A voltage security region(VSR)is a powerful tool for monitoring the voltage security in bulk power grids with high penetration of renewables.It can prevent cascading failures in wind power integration areas caused by ... A voltage security region(VSR)is a powerful tool for monitoring the voltage security in bulk power grids with high penetration of renewables.It can prevent cascading failures in wind power integration areas caused by serious over or low voltage problems.The bottlenecks of a VSR for practical applications are computational efficiency and accuracy.To bridge these gaps,a general optimization model for tracking a voltage security region boundary(VSRB)in bulk power grids is developed in this paper in accordance with the topological characteristics of the VSRB.First,the initial VSRB point on the VSRB is examined with the traditional OPF by using the base case parameters as initial values.Then,the rest of the VSRB points on the VSRB are tracked one after another,with the proposed optimization model,by using the parameters of the tracked VSRB point as the initial value to explore its adjacent VSRB point.The proposed approach can significantly improve the computational efficiency of the VSRB tracking over the existing algorithms,and case studies,in the WECC 9-bus and the Polish 2736-bus test systems,demonstrate the high accuracy and efficiency of the proposed approach on exploring the VSRB. 展开更多
关键词 Optimal power flow(OPF) stress direction voltage security critical point voltage security region voltage security region boundary
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部