Cyber–Physical System Security for the Electric Power Grid
Citations
1,430 citations
1,190 citations
Cites background from "Cyber–Physical System Security for ..."
...tified as an issue of primary concern, see [19], [29] and [10],...
[...]
...attention, such as power networks [15]–[19], linear networks...
[...]
839 citations
692 citations
658 citations
References
6,344 citations
"Cyber–Physical System Security for ..." refers background in this paper
...For example, in cases where the system generation is insufficient to match up to the load, automatic load shedding schemes could be employed to maintain system frequency within safe operating limits and protect the equipment connected to the system....
[...]
2,064 citations
1,628 citations
"Cyber–Physical System Security for ..." refers methods in this paper
...However, Phadke and Thorp [34] identify control applications that could be enhanced by using data Vol. 100, No. 1, January 2012 | Proceedings of the IEEE 215 provided by PMUs....
[...]
...However, Phadke and Thorp [34] identify control applications that could be enhanced by using data Sridhar et al....
[...]
1,592 citations
"Cyber–Physical System Security for ..." refers background in this paper
...false data injection attack discussed in [27] is the same as removing the attacked meters form the network....
[...]
...created a class of attacks, called false data injection attacks, that escape detection by existing bad measurement identification algorithms, provided they had knowledge of the system configuration [27]....
[...]
1,351 citations