Graph Theory Applications to Deregulated Power SystemsCyber Physical Systems Security for the Smart Grid
Graph Theory Applications to Deregulated Power Systems: Cyber Physical Systems Security for the...
Moreno Chuquen, Ricardo; Chamorro, Harold R.
2020-10-27 00:00:00
[The integration of Information Technology (IT) systems (computations and communication—the cyber world) with sensor and actuation data (the physical world), can introduce new, and fundamentally different approaches to security research in the growing field of Cyber-Physical Systems (CPS), when compared to other purely-cyber systems
[1]. Earlier work
[2–5] have shown that because of the automation and real-time requirements of many control actions, traditional security mechanism are not enough for protecting CPS, and we require resilient control and estimation algorithms for true CPS defense-in-depth
[6]. In this chapter we outline how attacks and resilient mechanisms can affect and defend power grid operations.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/graph-theory-applications-to-deregulated-power-systems-cyber-physical-rhW0oBptKu
Graph Theory Applications to Deregulated Power SystemsCyber Physical Systems Security for the Smart Grid
[The integration of Information Technology (IT) systems (computations and communication—the cyber world) with sensor and actuation data (the physical world), can introduce new, and fundamentally different approaches to security research in the growing field of Cyber-Physical Systems (CPS), when compared to other purely-cyber systems
[1]. Earlier work
[2–5] have shown that because of the automation and real-time requirements of many control actions, traditional security mechanism are not enough for protecting CPS, and we require resilient control and estimation algorithms for true CPS defense-in-depth
[6]. In this chapter we outline how attacks and resilient mechanisms can affect and defend power grid operations.]
Published: Oct 27, 2020
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.