Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities.
Michael TuttleBraden WickerMajid PoshtanJoseph CallenesPublished in: ISGT (2019)
Keyphrases
- algorithmic approaches
- cyber attacks
- power flow
- countermeasures
- power system
- cyber security
- smart grid
- differential evolution
- information security
- security issues
- security mechanisms
- mathematical model
- attack detection
- optimal location
- critical infrastructure
- intrusion detection
- ieee bus
- harmony search algorithm
- voltage stability
- computer systems
- security policies
- game tree search
- intrusion detection system
- real time
- network security
- multi objective
- particle swarm optimization
- evolutionary algorithm
- computational intelligence
- security requirements
- optimization algorithm