Qingyu Yang, Liguo Chang and Wei Yu On false data injection attacks against Kalman filtering in power system dynamic state estimation Security and Communication Networks
This figure illustrates detailed steps of maximum magnitude-based attack. Through bypassing anomaly detection, this investigated attack approach can make the power system state at time obtained through the received (adversary or malicious) measurements. If the adversary wants to continue the attack, the above process repeats over times.
Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf