E-mail a Wiley Online Library Link

Qingyu Yang, Liguo Chang and Wei Yu On false data injection attacks against Kalman filtering in power system dynamic state estimation Security and Communication Networks

Article first published online: 27 AUG 2013 | DOI: 10.1002/sec.835

Thumbnail image of graphical abstract

This figure illustrates detailed steps of maximum magnitude-based attack. Through bypassing anomaly detection, this investigated attack approach can make the power system state at time obtained through the received (adversary or malicious) measurements. If the adversary wants to continue the attack, the above process repeats over times.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

Choose captcha format: Image or Audio. Click here if you need help.