Power flow cyber attacks and perturbation-based defense.
Katherine R. DavisKate L. MorrowRakesh BobbaErich HeinePublished in: SmartGridComm (2012)
Keyphrases
- cyber attacks
- power flow
- cyber defense
- power system
- cyber security
- smart grid
- intrusion detection
- differential evolution
- mathematical model
- critical infrastructure
- countermeasures
- security policies
- network security
- intrusion detection system
- optimal location
- ieee bus
- harmony search algorithm
- evolutionary algorithm
- voltage stability
- dos attacks
- computational intelligence
- privacy issues
- neural network
- algebraic equations
- communication networks
- ddos attacks
- transmission line
- computer systems
- distributed systems
- computer networks
- third party
- network traffic
- information sharing
- anomaly detection
- information systems
- artificial intelligence
- machine learning