Skip to main content
Erschienen in: Current Sustainable/Renewable Energy Reports 1/2018

25.01.2018 | Energy Markets (R Sioshansi and S Mousavian, Section Editors)

Cyber-Physical Resilience of Electrical Power Systems Against Malicious Attacks: a Review

verfasst von: Sarmad Mehrdad, Seyedamirabbas Mousavian, Golshan Madraki, Yury Dvorkin

Erschienen in: Current Sustainable/Renewable Energy Reports | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Purpose of Review

In this paper, we study the literature on cyber-physical security of electrical power systems. The paper is intended to address the security strengths and weaknesses of the electrical power systems against malicious attacks.

Recent Findings

The concept of holistic resilience cycle (HRC) is introduced to improve cyber-physical security of electrical power systems. HRC is a systematic view to the security of the power systems, characterized by its four stages as closely interconnected and explicable only by reference to the whole. HRC includes four stages of prevention and planning, detection, mitigation and response, and system recovery.

Summary

Power systems are evolving from traditional settings towards more autonomous and smart grids. Cyber-physical security is critical for the safe and secure operations of the power systems. To achieve a higher security level for power systems, the research community should follow a systematic approach and consider all stages of the holistic resilience cycle in addressing security problems of the power systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
5.
Zurück zum Zitat Donde V, Lopez V, Lesieutre B, Pinar A, Yang C, Meza J. Identification of severe multiple contingencies in electric power networks. In Proceedings of the 37th Annual North American Power Symposium, 2005. IEEE. 2005. Donde V, Lopez V, Lesieutre B, Pinar A, Yang C, Meza J. Identification of severe multiple contingencies in electric power networks. In Proceedings of the 37th Annual North American Power Symposium, 2005. IEEE. 2005.
9.
Zurück zum Zitat Yao Y, Edmunds T, Papageorgiou D, Alvarez R. Trilevel optimization in power network defense. IEEE Trans Syst Man Cybern Part C Appl Rev. 2007;37:712–8.CrossRef Yao Y, Edmunds T, Papageorgiou D, Alvarez R. Trilevel optimization in power network defense. IEEE Trans Syst Man Cybern Part C Appl Rev. 2007;37:712–8.CrossRef
14.
Zurück zum Zitat Ma CYT, Yau DK, Lou X, Rao NS. Markov game analysis for attack-defense of power networks under possible misinformation. IEEE Trans Power Syst. 2012;28(2):1676–86.CrossRef Ma CYT, Yau DK, Lou X, Rao NS. Markov game analysis for attack-defense of power networks under possible misinformation. IEEE Trans Power Syst. 2012;28(2):1676–86.CrossRef
15.
Zurück zum Zitat Donde V, Lopez V, Lesieutre B, Pinar A, Yang C, Meza J. Identification of severe multiple contingencies in electric power networks. In Proceedings of the IEEE 37th Annual North American Power Symposium. 2005. p. 59–66. Donde V, Lopez V, Lesieutre B, Pinar A, Yang C, Meza J. Identification of severe multiple contingencies in electric power networks. In Proceedings of the IEEE 37th Annual North American Power Symposium. 2005. p. 59–66.
16.
Zurück zum Zitat Pinar A, Reichert A, Lesieutre B. Computing criticality of lines in power systems. In IEEE International Symposium onCircuits and Systems. 2007. p. 65–68. Pinar A, Reichert A, Lesieutre B. Computing criticality of lines in power systems. In IEEE International Symposium onCircuits and Systems. 2007. p. 65–68.
18.
Zurück zum Zitat • Suo H, Wan J, Zou C, Liu J. Security in the internet of things: a review. In International Conference on Computer Science and Electronics Engineering, Hangzhou. 2012. p. 648–651. This review provides details on the state-of-the-art on cyber attack prevention technologies including encryption mechanisms, communication security, protecting sensor data, and cryptographic algorithms. • Suo H, Wan J, Zou C, Liu J. Security in the internet of things: a review. In International Conference on Computer Science and Electronics Engineering, Hangzhou. 2012. p. 648–651. This review provides details on the state-of-the-art on cyber attack prevention technologies including encryption mechanisms, communication security, protecting sensor data, and cryptographic algorithms.
19.
Zurück zum Zitat Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM conference on Computer and communications security. ACM. 2009. p. 21–32. Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. In Proceedings of the 16th ACM conference on Computer and communications security. ACM. 2009. p. 21–32.
22.
Zurück zum Zitat Moslemi R, Moslemi R, Velni JM. A fast, decentralized covariance selection-based approach to detect cyber attacks in smart grids. IEEE Trans Smart Grid, vol. PP. 2017; 1–1. Moslemi R, Moslemi R, Velni JM. A fast, decentralized covariance selection-based approach to detect cyber attacks in smart grids. IEEE Trans Smart Grid, vol. PP. 2017; 1–1.
24.
Zurück zum Zitat Khalid HM, Peng JC-H. Immunity toward data-injection attacks using multisensor track fusion-based model prediction. IEEE Trans Smart Grid. 2015;8:697–707. Khalid HM, Peng JC-H. Immunity toward data-injection attacks using multisensor track fusion-based model prediction. IEEE Trans Smart Grid. 2015;8:697–707.
29.
Zurück zum Zitat Deng R, Zhuang P, Liang H. Ccpa: coordinated cyberphysical attacks and countermeasures in smart grid. IEEE Trans Smart Grid. vol. PP. 2017; 1–1. Deng R, Zhuang P, Liang H. Ccpa: coordinated cyberphysical attacks and countermeasures in smart grid. IEEE Trans Smart Grid. vol. PP. 2017; 1–1.
31.
Zurück zum Zitat Waghmare S, Kazi F, Singh N. Data driven approach to attack detection in a cyber-physical smart grid system. In Indian Control Conference (ICC). IEEE. 2017. Waghmare S, Kazi F, Singh N. Data driven approach to attack detection in a cyber-physical smart grid system. In Indian Control Conference (ICC). IEEE. 2017.
33.
Zurück zum Zitat He Y, Mendis GJ, Wei J. Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Trans Smart Grid, vol. PP. 2017; 1–1. He Y, Mendis GJ, Wei J. Real-time detection of false data injection attacks in smart grid: A deep learning-based intelligent mechanism. IEEE Trans Smart Grid, vol. PP. 2017; 1–1.
35.
Zurück zum Zitat Ashok A, Govindarasu M, Ajjarapu V. Online detection of stealthy false data injection attacks in power system state estimation. Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation, vol. PP. 2016; 1–1. Ashok A, Govindarasu M, Ajjarapu V. Online detection of stealthy false data injection attacks in power system state estimation. Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation, vol. PP. 2016; 1–1.
37.
Zurück zum Zitat Yang W, Lei L, Yang C. Event-based distributed state estimation under deception attack. Neurocomputing, vol. PP. 2017; 1–1. Yang W, Lei L, Yang C. Event-based distributed state estimation under deception attack. Neurocomputing, vol. PP. 2017; 1–1.
38.
Zurück zum Zitat • Mousavian S, Valenzuela J, Wang J. A probabilistic risk mitigation model for cyber-attacks to pmu networks. IEEE Trans Power Systems. 2015. The authors investigated a probabilistic risk mitigation response to cyber attacks to PMU networks after detection of the attack. The article is the first one in the literature that addressed how to respond to cyber attacks to power systems after detection of the attack;30(1):156–65. https://doi.org/10.1109/TPWRS.2014.2320230.CrossRef • Mousavian S, Valenzuela J, Wang J. A probabilistic risk mitigation model for cyber-attacks to pmu networks. IEEE Trans Power Systems. 2015. The authors investigated a probabilistic risk mitigation response to cyber attacks to PMU networks after detection of the attack. The article is the first one in the literature that addressed how to respond to cyber attacks to power systems after detection of the attack;30(1):156–65. https://​doi.​org/​10.​1109/​TPWRS.​2014.​2320230.CrossRef
39.
Zurück zum Zitat Mousavian S, Erol-Kantarci M, Ortmeyer T. Cyber attack protection for a resilient electric vehicle infrastructure. San Diego: IEEE Globecom Workshops (GC Wkshps); 2015. p. 1–6. Mousavian S, Erol-Kantarci M, Ortmeyer T. Cyber attack protection for a resilient electric vehicle infrastructure. San Diego: IEEE Globecom Workshops (GC Wkshps); 2015. p. 1–6.
40.
Zurück zum Zitat Mousavian S, Erol-Kantarci M, Wu L, Ortmeyer T. A riskbased optimization model for electric vehicle infrastructure response to cyber attacks. IEEE Trans Smart Grid. PP(99); s1–1. Mousavian S, Erol-Kantarci M, Wu L, Ortmeyer T. A riskbased optimization model for electric vehicle infrastructure response to cyber attacks. IEEE Trans Smart Grid. PP(99); s1–1.
41.
Zurück zum Zitat Lin H, Chen C, Wang J, Qi J, Jin D, Kalbarczyk Z, Iyer RK. Self-healing attack-resilient pmu network for power system operation. IEEE Transactions on Smart Grid, vol. PP. 2016; 1–1. Lin H, Chen C, Wang J, Qi J, Jin D, Kalbarczyk Z, Iyer RK. Self-healing attack-resilient pmu network for power system operation. IEEE Transactions on Smart Grid, vol. PP. 2016; 1–1.
45.
Zurück zum Zitat Xiang Y, Wang L. A game-theoretic approach to optimal defense strategy against load redistribution attack. In IEEE Power & Energy Society General Meeting. IEEE. 2015. Xiang Y, Wang L. A game-theoretic approach to optimal defense strategy against load redistribution attack. In IEEE Power & Energy Society General Meeting. IEEE. 2015.
46.
Zurück zum Zitat Xiang Y, Ding Z, Zhang Y, Wang L. Power system reliability evaluation considering load redistribution attacks. IEEE Transactions on Smart Grid. 2017;8:889–901. Xiang Y, Ding Z, Zhang Y, Wang L. Power system reliability evaluation considering load redistribution attacks. IEEE Transactions on Smart Grid. 2017;8:889–901.
48.
Zurück zum Zitat Diovu RC, Agee JT. A cloud-based openflow firewall for mitigation against ddos attacks in smart grid ami networks. In PowerAfrica, 2017 I.E. PES. IEEE. 2017. Diovu RC, Agee JT. A cloud-based openflow firewall for mitigation against ddos attacks in smart grid ami networks. In PowerAfrica, 2017 I.E. PES. IEEE. 2017.
51.
Zurück zum Zitat Srikantha P, Kundur D. Denial of service attacks and mitigation for stability in cyber-enabled power grid. In 2015 I.E. Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE. 2015. Srikantha P, Kundur D. Denial of service attacks and mitigation for stability in cyber-enabled power grid. In 2015 I.E. Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE. 2015.
52.
Zurück zum Zitat Liu H, Chen Y, Chuah MC, Yang J, Poor HV. Enabling self-healing smart grid through jamming resilient local controller switching. IEEE Transactions on Dependable and Secure Computing. 2015;14:377–91.CrossRef Liu H, Chen Y, Chuah MC, Yang J, Poor HV. Enabling self-healing smart grid through jamming resilient local controller switching. IEEE Transactions on Dependable and Secure Computing. 2015;14:377–91.CrossRef
53.
Zurück zum Zitat Chlela M, Mascarella D, Joos G, Kassouf M. Fallback control for isochronous energy storage systems in autonomous microgrids under denial-of-service cyber-attacks. IEEE Trans Smart Grid, vol. PP. 2017; 1–1. Chlela M, Mascarella D, Joos G, Kassouf M. Fallback control for isochronous energy storage systems in autonomous microgrids under denial-of-service cyber-attacks. IEEE Trans Smart Grid, vol. PP. 2017; 1–1.
56.
Zurück zum Zitat Pasdar A, Mirzakuchaki S. A solution to remote detecting of illegal electricity usage based on smart metering. In 2nd International Workshop on Soft Computing Applications, 2007. SOFA. IEEE. 2007. Pasdar A, Mirzakuchaki S. A solution to remote detecting of illegal electricity usage based on smart metering. In 2nd International Workshop on Soft Computing Applications, 2007. SOFA. IEEE. 2007.
57.
Zurück zum Zitat Deb S, Bhowmik PK, Paul A. Remote detection of illegal electricity usage employing smart energy meter—a current based technique. In IEEE PES Innovative Smart Grid Technologies—India (ISGT India). IEEEx. 2011. Deb S, Bhowmik PK, Paul A. Remote detection of illegal electricity usage employing smart energy meter—a current based technique. In IEEE PES Innovative Smart Grid Technologies—India (ISGT India). IEEEx. 2011.
59.
Zurück zum Zitat McLaughlin S, Holbert B, Zonouz S, Berthier R. Amids: a multi-sensor energy theft detection framework for advanced metering infrastructures. In Third International Conference on Third International Conference on, 2012. McLaughlin S, Holbert B, Zonouz S, Berthier R. Amids: a multi-sensor energy theft detection framework for advanced metering infrastructures. In Third International Conference on Third International Conference on, 2012.
60.
Zurück zum Zitat Jokar P, Arianpoo N, Leung VCM. Electricity theft detection in ami using customers consumption patterns. IEEE Transactions on Smart Grid. 2016;7:2016–226.CrossRef Jokar P, Arianpoo N, Leung VCM. Electricity theft detection in ami using customers consumption patterns. IEEE Transactions on Smart Grid. 2016;7:2016–226.CrossRef
62.
Zurück zum Zitat Nagi J, Yap KS, Tiong SK, Ahmed SK, Mohammad AM. Detection of abnormalities and electricity theft using genetic support vector machines. In IEEE Region 10 Conference TENCON 2008. IEEE. 2008. Nagi J, Yap KS, Tiong SK, Ahmed SK, Mohammad AM. Detection of abnormalities and electricity theft using genetic support vector machines. In IEEE Region 10 Conference TENCON 2008. IEEE. 2008.
63.
Zurück zum Zitat Depuru SSSR, Wang L, Devabhaktuni V. Support vector machine based data classification for detection of electricity theft. In IEEE/PES Power Systems Conference and Exposition (PSCE). IEEE. 2011. Depuru SSSR, Wang L, Devabhaktuni V. Support vector machine based data classification for detection of electricity theft. In IEEE/PES Power Systems Conference and Exposition (PSCE). IEEE. 2011.
64.
Zurück zum Zitat Depuru SSSR, Wang L, Devabhaktuni V, Nelapati P. A hybrid neural network model and encoding technique for enhanced classification of energy consumption data. In IEEE Power and Energy Society General Meeting. IEEE. 2011. Depuru SSSR, Wang L, Devabhaktuni V, Nelapati P. A hybrid neural network model and encoding technique for enhanced classification of energy consumption data. In IEEE Power and Energy Society General Meeting. IEEE. 2011.
66.
Zurück zum Zitat Glauner P, Boechat A, Dolberg L, State R, Bettinger F, Rangoni Y, Duarte D. Large-scale detection of non-technical losses in imbalanced data sets. In IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE. 2016. Glauner P, Boechat A, Dolberg L, State R, Bettinger F, Rangoni Y, Duarte D. Large-scale detection of non-technical losses in imbalanced data sets. In IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE. 2016.
67.
Zurück zum Zitat Ghanbari M, Kinsner W, Ferens K. Anomaly detection in a smart grid using wavelet transform, variance fractal dimension and an artificial neural network. In IEEE Electrical Power and Energy Conference (EPEC). IEEE. 2016. Ghanbari M, Kinsner W, Ferens K. Anomaly detection in a smart grid using wavelet transform, variance fractal dimension and an artificial neural network. In IEEE Electrical Power and Energy Conference (EPEC). IEEE. 2016.
68.
Zurück zum Zitat Sargolzaei A, Yen K, Abdelghani M. Delayed inputs attack on load frequency control in smart grid. In IEEE PES Innovative Smart Grid Technologies Conference (ISGT). 2014. Sargolzaei A, Yen K, Abdelghani M. Delayed inputs attack on load frequency control in smart grid. In IEEE PES Innovative Smart Grid Technologies Conference (ISGT). 2014.
69.
Zurück zum Zitat Sargolzaei A, Yen KK, Abdelghani MN. Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Transactions on Smart Grid. 2016;7:1176–85. Sargolzaei A, Yen KK, Abdelghani MN. Preventing time-delay switch attack on load frequency control in distributed power systems. IEEE Transactions on Smart Grid. 2016;7:1176–85.
70.
Zurück zum Zitat Shafique M, Iqbal N. Load frequency resilient control of power system against delayed input cyber attack. In Symposium on Recent Advances in Electrical Engineering (RAEE). IEEE. 2015. Shafique M, Iqbal N. Load frequency resilient control of power system against delayed input cyber attack. In Symposium on Recent Advances in Electrical Engineering (RAEE). IEEE. 2015.
71.
Zurück zum Zitat Sargolzaei A, Yen KK, Abdelghani M, Sargolzaei S, Car-bunar B. Resilient design of networked control systems under time delay switch attacks, application in smart grid. IEEE Access, vol. PP. 2017; 1–1. Sargolzaei A, Yen KK, Abdelghani M, Sargolzaei S, Car-bunar B. Resilient design of networked control systems under time delay switch attacks, application in smart grid. IEEE Access, vol. PP. 2017; 1–1.
72.
Zurück zum Zitat Piro C, Shields C, Levine BN. Detecting the sybil attack in mobile ad hoc networks. In Securecomm and Workshops. IEEE. 2006. Piro C, Shields C, Levine BN. Detecting the sybil attack in mobile ad hoc networks. In Securecomm and Workshops. IEEE. 2006.
73.
Zurück zum Zitat Lv S, Wang X, Zhao X, Zhou X. Detecting the sybil attack cooperatively in wireless sensor networks. In International Conference on Computational Intelligence and Security, 2008. CIS ‘08. IEEE. 2008. Lv S, Wang X, Zhao X, Zhou X. Detecting the sybil attack cooperatively in wireless sensor networks. In International Conference on Computational Intelligence and Security, 2008. CIS ‘08. IEEE. 2008.
74.
Zurück zum Zitat Rabieh K, Mahmoud MMEA, Guo TN, Younis M. Cross-layer scheme for detecting large-scale colluding sybil attack in vanets. In IEEE International Conference on Communications (ICC). IEEE. 2015. Rabieh K, Mahmoud MMEA, Guo TN, Younis M. Cross-layer scheme for detecting large-scale colluding sybil attack in vanets. In IEEE International Conference on Communications (ICC). IEEE. 2015.
75.
Zurück zum Zitat Sharma AK, Saroj SK, Chauhan SK, Saini SK. Sybil attack prevention and detection in vehicular ad hoc network. In International Conference on Computing, Communication and Automation (ICCCA). IEEE. 2016. Sharma AK, Saroj SK, Chauhan SK, Saini SK. Sybil attack prevention and detection in vehicular ad hoc network. In International Conference on Computing, Communication and Automation (ICCCA). IEEE. 2016.
77.
Zurück zum Zitat Hoehn A, Zhang P. Detection of replay attacks in cyberphysical systems. In American Control Conference (ACC). IEEE. 2016. Hoehn A, Zhang P. Detection of replay attacks in cyberphysical systems. In American Control Conference (ACC). IEEE. 2016.
78.
Zurück zum Zitat Misra S, Tayeen ASM, Xu W. Sybilexposer: an effective scheme to detect sybil communities in online social networks. In IEEE International Conference on Communications (ICC). IEEE. 2016. Misra S, Tayeen ASM, Xu W. Sybilexposer: an effective scheme to detect sybil communities in online social networks. In IEEE International Conference on Communications (ICC). IEEE. 2016.
79.
Zurück zum Zitat Gu P, Khatoun R, Begriche Y, Serhrouchni A. Vehicle driving pattern based sybil attack detection. In IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE. 2016. Gu P, Khatoun R, Begriche Y, Serhrouchni A. Vehicle driving pattern based sybil attack detection. In IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE. 2016.
80.
Zurück zum Zitat Irita T, Namerikawa T. Detection of replay attack on smart grid with code signal and bargaining game. In 2017 American Control Conference (ACC). IEEE. 2017. Irita T, Namerikawa T. Detection of replay attack on smart grid with code signal and bargaining game. In 2017 American Control Conference (ACC). IEEE. 2017.
81.
Zurück zum Zitat •• Mohsenian-Rad A-H, Leon-Garcia A. Distributed internet-based load altering attacks against smart power grids. IEEE Transactions on Smart Grid. 2011. The article introduces indirect cyber attacks to power systems taking advantage of the mutual dependency of smart grids and IoT;2(4):667–74. https://doi.org/10.1109/TSG.2011.2160297.CrossRef •• Mohsenian-Rad A-H, Leon-Garcia A. Distributed internet-based load altering attacks against smart power grids. IEEE Transactions on Smart Grid. 2011. The article introduces indirect cyber attacks to power systems taking advantage of the mutual dependency of smart grids and IoT;2(4):667–74. https://​doi.​org/​10.​1109/​TSG.​2011.​2160297.CrossRef
82.
Zurück zum Zitat Dvorkin Y, Garg S. Iot-enabled distributed cyber-attacks on transmission and distribution grids. In Proceedings of the 49th North American Power Symposium (NAPS). 2017. Dvorkin Y, Garg S. Iot-enabled distributed cyber-attacks on transmission and distribution grids. In Proceedings of the 49th North American Power Symposium (NAPS). 2017.
83.
Zurück zum Zitat Amini S, Mohsenian-Rad H, Pasqualetti F. Dynamic load altering attacks in smart grid. In 2015 I.E. Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE. 2015. Amini S, Mohsenian-Rad H, Pasqualetti F. Dynamic load altering attacks in smart grid. In 2015 I.E. Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE. 2015.
86.
Zurück zum Zitat Baer WS, Hassell S, Vollaar BA. Electricity requirements for a digital society. Santa Monica, Tech. Rep.: RAND Corporation; 2002. Baer WS, Hassell S, Vollaar BA. Electricity requirements for a digital society. Santa Monica, Tech. Rep.: RAND Corporation; 2002.
87.
Zurück zum Zitat Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M. Above the clouds: a berkeley view of cloud computing. University of California, Berkeley, Tech. Rep. 2009. Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, Lee G, Patterson DA, Rabkin A, Stoica I, Zaharia M. Above the clouds: a berkeley view of cloud computing. University of California, Berkeley, Tech. Rep. 2009.
Metadaten
Titel
Cyber-Physical Resilience of Electrical Power Systems Against Malicious Attacks: a Review
verfasst von
Sarmad Mehrdad
Seyedamirabbas Mousavian
Golshan Madraki
Yury Dvorkin
Publikationsdatum
25.01.2018
Verlag
Springer International Publishing
Erschienen in
Current Sustainable/Renewable Energy Reports / Ausgabe 1/2018
Elektronische ISSN: 2196-3010
DOI
https://doi.org/10.1007/s40518-018-0094-8

Weitere Artikel der Ausgabe 1/2018

Current Sustainable/Renewable Energy Reports 1/2018 Zur Ausgabe

End-Use Efficiency (Y Wang, Section Editor)

Overview of State Policies for Energy Efficiency in Buildings

Energy Markets (R Sioshansi and S Mousavian, Section Editors)

Coordination of Interdependent Electricity Grid and Natural Gas Network—a Review