Demonstration of Man in the Middle Attack on a Feeder Power Factor Correction Unit
暂无分享,去创建一个
Michail Maniatakos | Maria K. Michael | Lenos Hadjidemetriou | Marios Sazos | Georgios Tertytchny | Hazem Karbouj | Charalambos Charalambous | Maria K. Michael | Marios Sazos | M. Maniatakos | C. Charalambous | Hazem Karbouj | Georgios Tertytchny | L. Hadjidemetriou
[1] Chen-Ching Liu,et al. Cyber Security Risk Assessment of Solar PV Units with Reactive Power Capability , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.
[2] Chen-Ching Liu,et al. Intruders in the Grid , 2012, IEEE Power and Energy Magazine.
[3] Hao Liang,et al. False Data Injection Attacks Against State Estimation in Power Distribution Systems , 2019, IEEE Transactions on Smart Grid.
[4] Elias Kyriakides,et al. Diversifying the role of distributed generation grid side converters for improving the power quality of distribution networks using advanced control techniques , 2017, 2017 IEEE Energy Conversion Congress and Exposition (ECCE).
[5] Isao Ono,et al. Detection of Cyber Attacks Against Voltage Control in Distribution Power Grids With PVs , 2016, IEEE Transactions on Smart Grid.
[6] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[7] Chau Yuen,et al. Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid , 2018, IEEE Transactions on Smart Grid.
[8] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[9] Arindam Ghosh,et al. Operation of a DSTATCOM in voltage control mode , 2002 .
[10] Pravat Kumar Ray,et al. Power Quality Improvement Using Photovoltaic Fed DSTATCOM Based on JAYA Optimization , 2016, IEEE Transactions on Sustainable Energy.
[11] Dae-Hyun Choi,et al. OLTC-Induced False Data Injection Attack on Volt/VAR Optimization in Distribution Systems , 2019, IEEE Access.
[12] Abdelrahman Ayad,et al. Cyber-Physical Security of Power Distribution Systems , 2019 .
[13] M. S. Dahiya,et al. Cyber Reconnaissance: An Alarm before Cyber Attack , 2013 .
[14] Igor Nai Fovino,et al. Design and Implementation of a Secure Modbus Protocol , 2009, Critical Infrastructure Protection.
[15] Fadi A. Aloul,et al. Smart Grid Security: Threats, Vulnerabilities and Solutions , 2012 .
[16] Jamie B. Coble,et al. Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data , 2019, IEEE Transactions on Industrial Informatics.
[17] Quanyan Zhu,et al. A hierarchical security architecture for smart grid , 2010 .
[18] Dimitrios Tzovaras,et al. Phase Balancing and Reactive Power Support Services for Microgrids , 2019, Applied Sciences.
[19] Hazem Karbouj,et al. On using TCBR against cyber switching attacks on smart grids , 2016, 2016 IEEE Innovative Smart Grid Technologies - Asia (ISGT-Asia).
[20] Ahmed Serhrouchni,et al. Taxonomy of attacks on industrial control protocols , 2015, 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS).
[21] Brian Waldron,et al. All About Eve: Comparing DNP3 Secure Authentication With Standard Security Technologies for SCADA Communications , 2019 .
[22] Bikash C. Pal,et al. Centralized Volt–Var Optimization Strategy Considering Malicious Attack on Distributed Energy Resources Control , 2018, IEEE Transactions on Sustainable Energy.
[23] Michail Maniatakos,et al. FLEP-SGS2: a Flexible and Low-cost Evaluation Platform for Smart Grid Systems Security , 2019, 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).