Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

false data injection cyber-attacks

biblio

Visible to the public Evaluating power system vulnerability to false data injection attacks via scalable optimization

Submitted by el_wehby on Mon, 05/14/2018 - 4:07pm
  • physical power flow maximization
  • worst-case attack consequences
  • vulnerability assessments
  • upper bounds
  • Upper bound
  • state estimation
  • Smart Grids
  • security of data
  • scalable optimization
  • power system vulnerability evaluation
  • power system security
  • Polish system
  • Algorithm design and analysis
  • optimization
  • mixed-integer linear program
  • lower bounds
  • Load flow
  • Linear programming
  • integer programming
  • IEEE 118-bus system
  • Generators
  • false data injection cyber-attacks
  • bi-level optimization problem
  • 1449080
biblio

Visible to the public Evaluating power system vulnerability to false data injection attacks via scalable optimization

Submitted by grigby1 on Mon, 11/27/2017 - 12:24pm
  • Polish system
  • worst-case attack consequences
  • vulnerability assessments
  • upper bounds
  • Upper bound
  • state estimation
  • Smart Grids
  • security of data
  • scalable optimization
  • Resiliency
  • pubcrawl
  • power system vulnerability evaluation
  • power system security
  • power grid vulnerability analysis
  • Algorithm design and analysis
  • physical power flow maximization
  • optimization
  • mixed-integer linear program
  • Metrics
  • lower bounds
  • Load flow
  • Linear programming
  • integer programming
  • IEEE 118-bus system
  • Generators
  • false data injection cyber-attacks
  • composability
  • bi-level optimization problem

Terms of Use  |  ©2023. CPS-VO