of malware agents. These agents automate the intrusion process and actively search for relevant synchrophasor information. Moreover, it is important to highlight that the IEEE C37.118 and IEC 61850-90-5 are widely recognized as two of the most popular PMU communication frameworks. The vulnerabilitie...
Figure 5. Frequency of peer-reviewed papers in the search results. The remainder of this section discusses the applications of AI techniques to (1) load forecasting, which is further divided into short-term load forecasting, mid-term load forecasting, and long-term load forecasting; (2) power...
The Opinion Dynamics method proposes to aggregate the coverage of multiple detection systems strategically deployed on the infrastructure under a common distributed framework, which permanently correlates all detected malicious patterns and anomalies and learns from them. The study and modeling of opinion ...
These particles then fly and move towards the optimal solution in the entire search space. Their flight of movement can be affected by local and global best positions. 𝑙𝑏𝑒𝑠𝑡(𝑎,𝑡)=𝑎𝑟𝑔𝑡∈ℋ𝑚𝑖𝑛[𝑓𝑎(𝑡)],∀𝑎∈{1,2,3,…,𝑀},lbest(a,t...
Therefore, a risk assessment method is proposed to investigate the stability of the cyber physcial microgrid system under IDoS attacks. Lastly, the proposed methodology is verified by simulation results. Keywords: cyber physical microgrid system; intermittent denial-of-service attack; duration stages; ...