Skip to main content
Top
Published in:

2023 | OriginalPaper | Chapter

A Comprehensive Review on Cyber-Attack Detection and Control of Microgrid Systems

Authors : Hamidreza Shafei, Li Li, Ricardo P. Aguilera

Published in: Power Systems Cybersecurity

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to the fast progress of Microgrid (MG) systems and the development of advanced computing technologies and communication networks—all of which enhance the efficiency and reliability of power networks—MGs are at the risk of various cyber-attacks which can eventually lead to different glitches in the power distribution networks. There are many different kinds of cyber-attacks, some of which are the False Data Injection Attack, Denial of Service, Stealth Attack, and Covert Attack. The common goals of these attacks are to cause power outage, economic loss, and even system instability. Cyber-attacks could infiltrate MGs through the communication links, local controllers, or master control channels. In this chapter, a thorough review of the types of cyber-attacks and the problems caused by them in MGs has been presented, and some methods of cyber-attack detection, resilient control system design, and countermeasures against such attacks have been discussed. Numerous research works have already investigated the subject of cyber-attacks on both the Direct-Current (DC) and Alternating-Current (AC) MG systems. These studies can be divided into two main categories: (a) detection and mitigation approaches, and (b) resilient control system designs. Several subclasses of each of these categories, along with their advantages and disadvantages has been thoroughly investigated in this chapter. In the first category, after detecting a compromised agent, an active or passive mitigation mechanism is activated to prevent the spread of the agent’s destructive effects to the whole system. This may impose some strict limitations on the MGs. In the second category, by developing the distributed attack-resilient control protocols, the resilience of a MG system against potential attacks/faults/noises is enhanced to the point where no detection and mitigation action will be required.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
North American Electric Reliability Corporation Critical Infrastructure Protection.
 
2
International Electrotechnical Commission Technical Committee.
 
3
National Institute of Standards and Technology.
 
4
International Society of Automation.
 
Literature
1.
go back to reference H.B. Eluri, M.G. Naik, Challenges of res with integration of power grids, control strategies, optimization techniques of microgrids: a review. Int. J. Renew. Energy Res. (IJRER) 11(1), 1–19 (2021) H.B. Eluri, M.G. Naik, Challenges of res with integration of power grids, control strategies, optimization techniques of microgrids: a review. Int. J. Renew. Energy Res. (IJRER) 11(1), 1–19 (2021)
2.
go back to reference M. Upasani, S. Patil, Grid connected solar photovoltaic system with battery storage for energy management, in 2018 2nd International Conference on Inventive Systems and Control (ICISC), (IEEE, 2018) M. Upasani, S. Patil, Grid connected solar photovoltaic system with battery storage for energy management, in 2018 2nd International Conference on Inventive Systems and Control (ICISC), (IEEE, 2018)
3.
go back to reference S. Grid, IEEE Vision for Smart Grid Controls: 2030 and Beyond S. Grid, IEEE Vision for Smart Grid Controls: 2030 and Beyond
4.
go back to reference K. Manandhar et al., Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014)MathSciNetMATHCrossRef K. Manandhar et al., Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 1(4), 370–379 (2014)MathSciNetMATHCrossRef
5.
go back to reference Y. Liu et al., An attack-resilient cooperative control strategy of multiple distributed generators in distribution networks. IEEE Trans. Smart Grid 7(6), 2923–2932 (2016)CrossRef Y. Liu et al., An attack-resilient cooperative control strategy of multiple distributed generators in distribution networks. IEEE Trans. Smart Grid 7(6), 2923–2932 (2016)CrossRef
6.
go back to reference H. Fawzi, P. Tabuada, S. Diggavi, Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)MathSciNetMATHCrossRef H. Fawzi, P. Tabuada, S. Diggavi, Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 59(6), 1454–1467 (2014)MathSciNetMATHCrossRef
7.
go back to reference N.M. Dehkordi et al., Distributed noise-resilient secondary voltage and frequency control for islanded microgrids. IEEE Trans. Smart Grid 10(4), 3780–3790 (2018)MathSciNetCrossRef N.M. Dehkordi et al., Distributed noise-resilient secondary voltage and frequency control for islanded microgrids. IEEE Trans. Smart Grid 10(4), 3780–3790 (2018)MathSciNetCrossRef
8.
go back to reference S. Zuo et al., Resilient networked AC microgrids under unbounded cyber attacks. IEEE Trans. Smart Grid 11(5), 3785–3794 (2020)CrossRef S. Zuo et al., Resilient networked AC microgrids under unbounded cyber attacks. IEEE Trans. Smart Grid 11(5), 3785–3794 (2020)CrossRef
9.
go back to reference A.M. Mohan, N. Meskin, H. Mehrjerdi, A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems. Energies 13(15), 3860 (2020)CrossRef A.M. Mohan, N. Meskin, H. Mehrjerdi, A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems. Energies 13(15), 3860 (2020)CrossRef
10.
go back to reference F. Nejabatkhah et al., Cyber-security of smart microgrids: a survey. Energies 14(1), 27 (2020)CrossRef F. Nejabatkhah et al., Cyber-security of smart microgrids: a survey. Energies 14(1), 27 (2020)CrossRef
11.
go back to reference Y. Xu, A review of cyber security risks of power systems: from static to dynamic false data attacks. Prot. Control Modern Power Syst. 5(1), 1–12 (2020)CrossRef Y. Xu, A review of cyber security risks of power systems: from static to dynamic false data attacks. Prot. Control Modern Power Syst. 5(1), 1–12 (2020)CrossRef
12.
go back to reference D. Bhamare, et al., Cybersecurity for industrial control systems: A survey. Comput. Secur. 89, 101677 (2020) D. Bhamare, et al., Cybersecurity for industrial control systems: A survey. Comput. Secur. 89, 101677 (2020)
13.
go back to reference H.S. Sánchez et al., Bibliographical review on cyber attacks from a control oriented perspective. Annu. Rev. Control. 48, 103–128 (2019)MathSciNetCrossRef H.S. Sánchez et al., Bibliographical review on cyber attacks from a control oriented perspective. Annu. Rev. Control. 48, 103–128 (2019)MathSciNetCrossRef
14.
go back to reference M.S. Mahmoud, M.M. Hamdan, U.A. Baroudi, Modeling and control of cyber-physical systems subject to cyber attacks: a survey of recent advances and challenges. Neurocomputing 338, 101–115 (2019)CrossRef M.S. Mahmoud, M.M. Hamdan, U.A. Baroudi, Modeling and control of cyber-physical systems subject to cyber attacks: a survey of recent advances and challenges. Neurocomputing 338, 101–115 (2019)CrossRef
15.
go back to reference A. Villalonga, et al., Cloud-based industrial cyber–physical system for data-driven reasoning: A review and use case on an industry 4.0 pilot line. IEEE Trans. Ind. Inf. 16(9), 5975–5984 (2020) A. Villalonga, et al., Cloud-based industrial cyber–physical system for data-driven reasoning: A review and use case on an industry 4.0 pilot line. IEEE Trans. Ind. Inf. 16(9), 5975–5984 (2020)
16.
go back to reference S. Tan et al., New challenges in the design of microgrid systems: Communication networks, cyberattacks, and resilience. IEEE Electrif. Mag. 8(4), 98–106 (2020)CrossRef S. Tan et al., New challenges in the design of microgrid systems: Communication networks, cyberattacks, and resilience. IEEE Electrif. Mag. 8(4), 98–106 (2020)CrossRef
17.
go back to reference S. Madichetty, S. Mishra, Cyber attack detection and correction mechanisms in a distributed DC microgrid. IEEE Trans. Power Electron. 37(2), 1476–1485 (2021) S. Madichetty, S. Mishra, Cyber attack detection and correction mechanisms in a distributed DC microgrid. IEEE Trans. Power Electron. 37(2), 1476–1485 (2021)
18.
go back to reference L. Ortiz et al., A review on control and fault-tolerant control systems of AC/DC microgrids. Heliyon 6(8), e04799 (2020)CrossRef L. Ortiz et al., A review on control and fault-tolerant control systems of AC/DC microgrids. Heliyon 6(8), e04799 (2020)CrossRef
20.
go back to reference F. Martin-Martínez, A. Sánchez-Miralles, M. Rivier, A literature review of microgrids: a functional layer based classification. Renew. Sustain. Energy Rev. 62, 1133–1153 (2016)CrossRef F. Martin-Martínez, A. Sánchez-Miralles, M. Rivier, A literature review of microgrids: a functional layer based classification. Renew. Sustain. Energy Rev. 62, 1133–1153 (2016)CrossRef
21.
go back to reference R. Shirey, Internet security glossary. 2000, FYI 36, RFC 2828, May R. Shirey, Internet security glossary. 2000, FYI 36, RFC 2828, May
22.
go back to reference F. Pasqualetti, F. Dorfler, F. Bullo, Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Control Syst. Mag. 35(1), 110–127 (2015)MathSciNetMATHCrossRef F. Pasqualetti, F. Dorfler, F. Bullo, Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. IEEE Control Syst. Mag. 35(1), 110–127 (2015)MathSciNetMATHCrossRef
23.
go back to reference P.B. Hansen, Operating System Principles (Prentice-Hall, Inc., 1973) P.B. Hansen, Operating System Principles (Prentice-Hall, Inc., 1973)
24.
go back to reference B. Zhu, A. Joseph, S. Sastry, A taxonomy of cyber attacks on SCADA systems, in 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing. (IEEE, 2011) B. Zhu, A. Joseph, S. Sastry, A taxonomy of cyber attacks on SCADA systems, in 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing. (IEEE, 2011)
25.
go back to reference D. Liu, D. Ye, Cluster synchronization of complex networks under denial-of-service attacks with distributed adaptive strategies. IEEE Trans. Control of Netw. Syst. (2021) D. Liu, D. Ye, Cluster synchronization of complex networks under denial-of-service attacks with distributed adaptive strategies. IEEE Trans. Control of Netw. Syst. (2021)
26.
go back to reference X.-K. Liu et al., Resilient control and analysis for dc microgrid system under DoS and impulsive FDI attacks. IEEE Trans. Smart Grid 12(5), 3742–3754 (2021)CrossRef X.-K. Liu et al., Resilient control and analysis for dc microgrid system under DoS and impulsive FDI attacks. IEEE Trans. Smart Grid 12(5), 3742–3754 (2021)CrossRef
27.
go back to reference Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 1–33 (2011)CrossRef Y. Liu, P. Ning, M.K. Reiter, False data injection attacks against state estimation in electric power grids. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 1–33 (2011)CrossRef
28.
go back to reference S. Sahoo et al., A stealth cyber-attack detection strategy for DC microgrids. IEEE Trans. Power Electron. 34(8), 8162–8174 (2018)CrossRef S. Sahoo et al., A stealth cyber-attack detection strategy for DC microgrids. IEEE Trans. Power Electron. 34(8), 8162–8174 (2018)CrossRef
29.
go back to reference D. Li, et al., Deep learning based covert attack identification for industrial control systems, in 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA) (IEEE, 2020) D. Li, et al., Deep learning based covert attack identification for industrial control systems, in 2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA) (IEEE, 2020)
30.
go back to reference C. Wang et al., Impacts of cyber system on microgrid operational reliability. IEEE Trans. Smart Grid 10(1), 105–115 (2017)CrossRef C. Wang et al., Impacts of cyber system on microgrid operational reliability. IEEE Trans. Smart Grid 10(1), 105–115 (2017)CrossRef
31.
go back to reference M. Keshk et al., An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans. Sustain. Comput. 6(1), 66–79 (2019)CrossRef M. Keshk et al., An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems. IEEE Trans. Sustain. Comput. 6(1), 66–79 (2019)CrossRef
32.
go back to reference L. Yang, X. Cao, J. Li, A new cyber security risk evaluation method for oil and gas SCADA based on factor state space. Chaos, Solitons Fractals 89, 203–209 (2016)CrossRef L. Yang, X. Cao, J. Li, A new cyber security risk evaluation method for oil and gas SCADA based on factor state space. Chaos, Solitons Fractals 89, 203–209 (2016)CrossRef
33.
go back to reference S. Liu et al., Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber attacks. Neurocomputing 207, 708–716 (2016)CrossRef S. Liu et al., Extended Kalman filtering for stochastic nonlinear systems with randomly occurring cyber attacks. Neurocomputing 207, 708–716 (2016)CrossRef
34.
go back to reference W. Granzer, F. Praus, W. Kastner, Security in building automation systems. IEEE Trans. Ind. Electron. 57(11), 3622–3630 (2009)CrossRef W. Granzer, F. Praus, W. Kastner, Security in building automation systems. IEEE Trans. Ind. Electron. 57(11), 3622–3630 (2009)CrossRef
35.
go back to reference K. Hemme, Critical infrastructure protection: maintenance is national security. J. Strat. Secur. 8(3), 25–39 (2015)CrossRef K. Hemme, Critical infrastructure protection: maintenance is national security. J. Strat. Secur. 8(3), 25–39 (2015)CrossRef
36.
go back to reference F. Cleveland, IEC TC57 security standards for the power system’s information infrastructure–beyond simple encryption, in Transmission and Distribution Conference and Exhibition (2005) F. Cleveland, IEC TC57 security standards for the power system’s information infrastructure–beyond simple encryption, in Transmission and Distribution Conference and Exhibition (2005)
37.
go back to reference K. Stouffer, J. Falco, K. Scarfone, Guide to Industrial Control Systems (ICS) Security. (National Institute of Standards and Technology, 2008) K. Stouffer, J. Falco, K. Scarfone, Guide to Industrial Control Systems (ICS) Security. (National Institute of Standards and Technology, 2008)
38.
go back to reference A. Cardenas, et al., Challenges for securing cyber physical systems, in Workshop on Future Directions in Cyber-Physical Systems Security (Citeseer, 2009) A. Cardenas, et al., Challenges for securing cyber physical systems, in Workshop on Future Directions in Cyber-Physical Systems Security (Citeseer, 2009)
39.
go back to reference J.P. Farwell, R. Rohozinski, Stuxnet and the future of cyber war. Survival 53(1), 23–40 (2011)CrossRef J.P. Farwell, R. Rohozinski, Stuxnet and the future of cyber war. Survival 53(1), 23–40 (2011)CrossRef
40.
go back to reference X. Cao, et al., The geological disasters defense expert system of the massive pipeline network SCADA system based on FNN, in Asia-Pacific Web Conference (Springer, 2012) X. Cao, et al., The geological disasters defense expert system of the massive pipeline network SCADA system based on FNN, in Asia-Pacific Web Conference (Springer, 2012)
41.
go back to reference D.U. Case, Analysis of the Cyber Attack on the Ukrainian Power Grid. Electricity Information Sharing and Analysis Center (E-ISAC),vol. 388 (2016), pp. 1–29 D.U. Case, Analysis of the Cyber Attack on the Ukrainian Power Grid. Electricity Information Sharing and Analysis Center (E-ISAC),vol. 388 (2016), pp. 1–29
42.
go back to reference K.E. Hemsley, E. Fisher, History of Industrial Control System Cyber Incidents. Idaho National Lab.(INL), Idaho Falls, ID (United States, 2018) K.E. Hemsley, E. Fisher, History of Industrial Control System Cyber Incidents. Idaho National Lab.(INL), Idaho Falls, ID (United States, 2018)
43.
go back to reference C.F. Strategic, I. Studies, Significant Cyber Incidents Since 2006. Center for Strategic and International Studies, (2021) C.F. Strategic, I. Studies, Significant Cyber Incidents Since 2006. Center for Strategic and International Studies, (2021)
44.
go back to reference S. Tan et al., False data injection cyber-attacks detection for multiple DC microgrid clusters. Appl. Energy 310, 118425 (2022)CrossRef S. Tan et al., False data injection cyber-attacks detection for multiple DC microgrid clusters. Appl. Energy 310, 118425 (2022)CrossRef
45.
go back to reference Q. Zhou et al., A cyber-attack resilient distributed control strategy in islanded microgrids. IEEE Trans. Smart Grid 11(5), 3690–3701 (2020)CrossRef Q. Zhou et al., A cyber-attack resilient distributed control strategy in islanded microgrids. IEEE Trans. Smart Grid 11(5), 3690–3701 (2020)CrossRef
46.
go back to reference O.A. Beg et al., Signal temporal logic-based attack detection in DC microgrids. IEEE Trans. Smart Grid 10(4), 3585–3595 (2018)CrossRef O.A. Beg et al., Signal temporal logic-based attack detection in DC microgrids. IEEE Trans. Smart Grid 10(4), 3585–3595 (2018)CrossRef
47.
go back to reference S. Sahoo et al., On detection of false data in cooperative DC microgrids—a discordant element approach. IEEE Trans. Ind. Electron. 67(8), 6562–6571 (2019)CrossRef S. Sahoo et al., On detection of false data in cooperative DC microgrids—a discordant element approach. IEEE Trans. Ind. Electron. 67(8), 6562–6571 (2019)CrossRef
48.
go back to reference J. Zhao et al., Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Trans. Smart Grid 8(4), 1580–1590 (2015)CrossRef J. Zhao et al., Short-term state forecasting-aided method for detection of smart grid general false data injection attacks. IEEE Trans. Smart Grid 8(4), 1580–1590 (2015)CrossRef
49.
go back to reference C.-H. Lo, N. Ansari, CONSUMER: a novel hybrid intrusion detection system for distribution networks in smart grid. IEEE Trans. Emerg. Top. Comput. 1(1), 33–44 (2013)CrossRef C.-H. Lo, N. Ansari, CONSUMER: a novel hybrid intrusion detection system for distribution networks in smart grid. IEEE Trans. Emerg. Top. Comput. 1(1), 33–44 (2013)CrossRef
50.
go back to reference E. Drayer, T. Routtenberg, Detection of false data injection attacks in smart grids based on graph signal processing. IEEE Syst. J. 14(2), 1886–1896 (2019)CrossRef E. Drayer, T. Routtenberg, Detection of false data injection attacks in smart grids based on graph signal processing. IEEE Syst. J. 14(2), 1886–1896 (2019)CrossRef
51.
go back to reference H. Tu et al., A hybrid cyber attack model for cyber-physical power systems. IEEE Access 8, 114876–114883 (2020)CrossRef H. Tu et al., A hybrid cyber attack model for cyber-physical power systems. IEEE Access 8, 114876–114883 (2020)CrossRef
52.
go back to reference Y. Hu et al., Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP J. Wirel. Commun. Netw. 2019(1), 1–14 (2019)CrossRef Y. Hu et al., Detecting stealthy attacks against industrial control systems based on residual skewness analysis. EURASIP J. Wirel. Commun. Netw. 2019(1), 1–14 (2019)CrossRef
53.
go back to reference Y. Liu, L. Cheng, Relentless false data injection attacks against Kalman filter based detection in smart grid. IEEE Trans. Control Netw. Syst. (2022) Y. Liu, L. Cheng, Relentless false data injection attacks against Kalman filter based detection in smart grid. IEEE Trans. Control Netw. Syst. (2022)
54.
go back to reference S. Soltani et al., Improved estimation for well-logging problems based on fusion of four types of Kalman filters. IEEE Trans. Geosci. Remote Sens. 56(2), 647–654 (2017)CrossRef S. Soltani et al., Improved estimation for well-logging problems based on fusion of four types of Kalman filters. IEEE Trans. Geosci. Remote Sens. 56(2), 647–654 (2017)CrossRef
55.
go back to reference B. Li et al., Detecting false data injection attacks against power system state estimation with fast go-decomposition approach. IEEE Trans. Ind. Inf. 15(5), 2892–2904 (2018)CrossRef B. Li et al., Detecting false data injection attacks against power system state estimation with fast go-decomposition approach. IEEE Trans. Ind. Inf. 15(5), 2892–2904 (2018)CrossRef
56.
go back to reference J. Yan, F. Guo, C. Wen, Attack detection and isolation for distributed load shedding algorithm in microgrid systems. IEEE J. Emerg. Select. Top. Ind. Electron. 1(1), 102–110 (2020)CrossRef J. Yan, F. Guo, C. Wen, Attack detection and isolation for distributed load shedding algorithm in microgrid systems. IEEE J. Emerg. Select. Top. Ind. Electron. 1(1), 102–110 (2020)CrossRef
57.
go back to reference A. Cecilia et al., On addressing the security and stability issues due to false data injection attacks in DC microgrids—an adaptive observer approach. IEEE Trans. Power Electron. 37(3), 2801–2814 (2021)CrossRef A. Cecilia et al., On addressing the security and stability issues due to false data injection attacks in DC microgrids—an adaptive observer approach. IEEE Trans. Power Electron. 37(3), 2801–2814 (2021)CrossRef
58.
go back to reference F. Pasqualetti, F. Dörfler, F. Bullo, Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetMATHCrossRef F. Pasqualetti, F. Dörfler, F. Bullo, Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 58(11), 2715–2729 (2013)MathSciNetMATHCrossRef
59.
go back to reference A. Paul, I. Kamwa, G. Joos, Centralized dynamic state estimation using a federation of extended Kalman filters with intermittent PMU data from generator terminals. IEEE Trans. Power Syst. 33(6), 6109–6119 (2018)CrossRef A. Paul, I. Kamwa, G. Joos, Centralized dynamic state estimation using a federation of extended Kalman filters with intermittent PMU data from generator terminals. IEEE Trans. Power Syst. 33(6), 6109–6119 (2018)CrossRef
60.
go back to reference J.M. Pak et al., Improving reliability of particle filter-based localization in wireless sensor networks via hybrid particle/FIR filtering. IEEE Trans. Ind. Inf. 11(5), 1089–1098 (2015)CrossRef J.M. Pak et al., Improving reliability of particle filter-based localization in wireless sensor networks via hybrid particle/FIR filtering. IEEE Trans. Ind. Inf. 11(5), 1089–1098 (2015)CrossRef
61.
go back to reference G. Anagnostou, B.C. Pal, Derivative-free Kalman filtering based approaches to dynamic state estimation for power systems with unknown inputs. IEEE Trans. Power Syst. 33(1), 116–130 (2017)CrossRef G. Anagnostou, B.C. Pal, Derivative-free Kalman filtering based approaches to dynamic state estimation for power systems with unknown inputs. IEEE Trans. Power Syst. 33(1), 116–130 (2017)CrossRef
62.
go back to reference Y. Li, Z. Li, L. Chen, Dynamic state estimation of generators under cyber attacks. IEEE Access 7, 125253–125267 (2019)CrossRef Y. Li, Z. Li, L. Chen, Dynamic state estimation of generators under cyber attacks. IEEE Access 7, 125253–125267 (2019)CrossRef
63.
go back to reference D.B. Rawat, C. Bajracharya, Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process. Lett. 22(10), 1652–1656 (2015)CrossRef D.B. Rawat, C. Bajracharya, Detection of false data injection attacks in smart grid communication systems. IEEE Signal Process. Lett. 22(10), 1652–1656 (2015)CrossRef
64.
go back to reference K. Miao, W.A. Zhang, X. Qiu, An adaptive unscented Kalman filter approach to secure state estimation for wireless sensor networks. Asian J. Control (2022) K. Miao, W.A. Zhang, X. Qiu, An adaptive unscented Kalman filter approach to secure state estimation for wireless sensor networks. Asian J. Control (2022)
65.
go back to reference A. Sargolzaei et al., Detection and mitigation of false data injection attacks in networked control systems. IEEE Trans. Ind. Inf. 16(6), 4281–4292 (2019)CrossRef A. Sargolzaei et al., Detection and mitigation of false data injection attacks in networked control systems. IEEE Trans. Ind. Inf. 16(6), 4281–4292 (2019)CrossRef
66.
go back to reference A. Abbaspour et al., Resilient control design for load frequency control system under false data injection attacks. IEEE Trans. Ind. Electron. 67(9), 7951–7962 (2019)CrossRef A. Abbaspour et al., Resilient control design for load frequency control system under false data injection attacks. IEEE Trans. Ind. Electron. 67(9), 7951–7962 (2019)CrossRef
67.
go back to reference A. Chattopadhyay, U. Mitra, Security against false data-injection attack in cyber-physical systems. IEEE Trans. Control Netw. Syst. 7(2), 1015–1027 (2019)MathSciNetMATHCrossRef A. Chattopadhyay, U. Mitra, Security against false data-injection attack in cyber-physical systems. IEEE Trans. Control Netw. Syst. 7(2), 1015–1027 (2019)MathSciNetMATHCrossRef
68.
go back to reference J. Qi, A.F. Taha, J. Wang, Comparing Kalman filters and observers for power system dynamic state estimation with model uncertainty and malicious cyber attacks. IEEE Access 6, 77155–77168 (2018)CrossRef J. Qi, A.F. Taha, J. Wang, Comparing Kalman filters and observers for power system dynamic state estimation with model uncertainty and malicious cyber attacks. IEEE Access 6, 77155–77168 (2018)CrossRef
69.
go back to reference M. Adeli, et al., Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks (2021) M. Adeli, et al., Distributed trust-based unscented Kalman filter for non-linear state estimation under cyber-attacks: The application of manoeuvring target tracking over wireless sensor networks (2021)
70.
go back to reference J. Lu et al., Unscented Kalman filtering for nonlinear systems with sensor saturation and randomly occurring false data injection attacks. Asian J. Control 23(2), 871–881 (2021)MathSciNetCrossRef J. Lu et al., Unscented Kalman filtering for nonlinear systems with sensor saturation and randomly occurring false data injection attacks. Asian J. Control 23(2), 871–881 (2021)MathSciNetCrossRef
71.
go back to reference X. Liu, Y. Mo, E. Garone, Local decomposition of Kalman filters and its application for secure state estimation. IEEE Trans. Autom. Control 66(10), 5037–5044 (2020)MathSciNetMATHCrossRef X. Liu, Y. Mo, E. Garone, Local decomposition of Kalman filters and its application for secure state estimation. IEEE Trans. Autom. Control 66(10), 5037–5044 (2020)MathSciNetMATHCrossRef
72.
go back to reference J. Kim et al., Detection of sensor attack and resilient state estimation for uniformly observable nonlinear systems having redundant sensors. IEEE Trans. Autom. Control 64(3), 1162–1169 (2018)MathSciNetMATHCrossRef J. Kim et al., Detection of sensor attack and resilient state estimation for uniformly observable nonlinear systems having redundant sensors. IEEE Trans. Autom. Control 64(3), 1162–1169 (2018)MathSciNetMATHCrossRef
73.
go back to reference Y. Mao et al., Novel stealthy attack and defense strategies for networked control systems. IEEE Trans. Autom. Control 65(9), 3847–3862 (2020)MathSciNetMATHCrossRef Y. Mao et al., Novel stealthy attack and defense strategies for networked control systems. IEEE Trans. Autom. Control 65(9), 3847–3862 (2020)MathSciNetMATHCrossRef
74.
go back to reference Y. Yamamoto, N. Kuze, T. Ushio, Attack detection and defense system using an unknown input observer for cooperative adaptive cruise control systems. IEEE Access 9, 148810–148820 (2021)CrossRef Y. Yamamoto, N. Kuze, T. Ushio, Attack detection and defense system using an unknown input observer for cooperative adaptive cruise control systems. IEEE Access 9, 148810–148820 (2021)CrossRef
75.
go back to reference A. Mustafa et al., Detection and mitigation of data manipulation attacks in AC microgrids. IEEE Trans. Smart Grid 11(3), 2588–2603 (2019)CrossRef A. Mustafa et al., Detection and mitigation of data manipulation attacks in AC microgrids. IEEE Trans. Smart Grid 11(3), 2588–2603 (2019)CrossRef
76.
go back to reference G. Chaojun, P. Jirutitijaroen, M. Motani, Detecting false data injection attacks in AC state estimation. IEEE Trans. Smart Grid 6(5), 2476–2483 (2015)CrossRef G. Chaojun, P. Jirutitijaroen, M. Motani, Detecting false data injection attacks in AC state estimation. IEEE Trans. Smart Grid 6(5), 2476–2483 (2015)CrossRef
77.
go back to reference B.P. Poudel et al., Detection and mitigation of cyber-threats in the DC microgrid distributed control system. Int. J. Electr. Power Energy Syst. 120, 105968 (2020)CrossRef B.P. Poudel et al., Detection and mitigation of cyber-threats in the DC microgrid distributed control system. Int. J. Electr. Power Energy Syst. 120, 105968 (2020)CrossRef
78.
go back to reference Y. Zhu, W.X. Zheng, Observer-based control for cyber-physical systems with periodic DoS attacks via a cyclic switching strategy. IEEE Trans. Autom. Control 65(8), 3714–3721 (2019)MathSciNetMATHCrossRef Y. Zhu, W.X. Zheng, Observer-based control for cyber-physical systems with periodic DoS attacks via a cyclic switching strategy. IEEE Trans. Autom. Control 65(8), 3714–3721 (2019)MathSciNetMATHCrossRef
79.
go back to reference S. Nateghi, Y. Shtessel, C. Edwards, Cyber-attacks and faults reconstruction using finite time convergent observation algorithms: electric power network application. J. Franklin Inst. 357(1), 179–205 (2020)MathSciNetMATHCrossRef S. Nateghi, Y. Shtessel, C. Edwards, Cyber-attacks and faults reconstruction using finite time convergent observation algorithms: electric power network application. J. Franklin Inst. 357(1), 179–205 (2020)MathSciNetMATHCrossRef
80.
go back to reference X. Wang et al., Detection and isolation of false data injection attacks in smart grid via unknown input interval observer. IEEE Internet Things J. 7(4), 3214–3229 (2020)CrossRef X. Wang et al., Detection and isolation of false data injection attacks in smart grid via unknown input interval observer. IEEE Internet Things J. 7(4), 3214–3229 (2020)CrossRef
81.
go back to reference Y. Li, H. Fang, J. Chen, Anomaly detection and identification for multiagent systems subjected to physical faults and cyberattacks. IEEE Trans. Ind. Electron. 67(11), 9724–9733 (2019)CrossRef Y. Li, H. Fang, J. Chen, Anomaly detection and identification for multiagent systems subjected to physical faults and cyberattacks. IEEE Trans. Ind. Electron. 67(11), 9724–9733 (2019)CrossRef
82.
go back to reference A. Barboni et al., Detection of covert cyber-attacks in interconnected systems: A distributed model-based approach. IEEE Trans. Autom. Control 65(9), 3728–3741 (2020)MathSciNetMATHCrossRef A. Barboni et al., Detection of covert cyber-attacks in interconnected systems: A distributed model-based approach. IEEE Trans. Autom. Control 65(9), 3728–3741 (2020)MathSciNetMATHCrossRef
83.
go back to reference C. Schellenberger, P. Zhang, Detection of covert attacks on cyber-physical systems by extending the system dynamics with an auxiliary system, in 2017 IEEE 56th Annual Conference on Decision and Control (CDC) (IEEE, 2017) C. Schellenberger, P. Zhang, Detection of covert attacks on cyber-physical systems by extending the system dynamics with an auxiliary system, in 2017 IEEE 56th Annual Conference on Decision and Control (CDC) (IEEE, 2017)
84.
go back to reference D. Das et al., Luenberger observer based current estimated boost converter for PV maximum power extraction—A current sensorless approach. IEEE J. Photovolt. 9(1), 278–286 (2018)CrossRef D. Das et al., Luenberger observer based current estimated boost converter for PV maximum power extraction—A current sensorless approach. IEEE J. Photovolt. 9(1), 278–286 (2018)CrossRef
85.
go back to reference R. Gao et al., K-filter-based adaptive output feedback control for high-order nonlinear systems subject to actuator and sensor attacks. Int. J. Robust Nonlinear Control 32(6), 3469–3484 (2022)MathSciNetCrossRef R. Gao et al., K-filter-based adaptive output feedback control for high-order nonlinear systems subject to actuator and sensor attacks. Int. J. Robust Nonlinear Control 32(6), 3469–3484 (2022)MathSciNetCrossRef
86.
go back to reference J. Yan, G.-H. Yang, Y. Wang, Dynamic reduced-order observer-based detection of false data injection attacks with application to smart grid systems. IEEE Trans. Ind. Inf. (2022) J. Yan, G.-H. Yang, Y. Wang, Dynamic reduced-order observer-based detection of false data injection attacks with application to smart grid systems. IEEE Trans. Ind. Inf. (2022)
87.
go back to reference X. Wang et al., Detection and localization of biased load attacks in smart grids via interval observer. Inf. Sci. 552, 291–309 (2021)MathSciNetCrossRef X. Wang et al., Detection and localization of biased load attacks in smart grids via interval observer. Inf. Sci. 552, 291–309 (2021)MathSciNetCrossRef
88.
go back to reference H.A.H. Alhelou, P. Cuffe, A dynamic state estimator based tolerance control method against cyberattack and erroneous measured data for power systems. IEEE Trans. Ind. Inf. (2021) H.A.H. Alhelou, P. Cuffe, A dynamic state estimator based tolerance control method against cyberattack and erroneous measured data for power systems. IEEE Trans. Ind. Inf. (2021)
89.
go back to reference X. Wang et al., Detection and location of bias load injection attack in smart grid via robust adaptive observer. IEEE Syst. J. 14(3), 4454–4465 (2020)CrossRef X. Wang et al., Detection and location of bias load injection attack in smart grid via robust adaptive observer. IEEE Syst. J. 14(3), 4454–4465 (2020)CrossRef
90.
go back to reference L. An, G.-H. Yang, Supervisory nonlinear state observers for adversarial sparse attacks. IEEE Trans. Cybern. (2020) L. An, G.-H. Yang, Supervisory nonlinear state observers for adversarial sparse attacks. IEEE Trans. Cybern. (2020)
91.
go back to reference J. Yang, W.-A. Zhang, F. Guo, Adaptive distributed Kalman-like filter for power system with cyber attacks. Automatica 137, 110091 (2022)MathSciNetMATHCrossRef J. Yang, W.-A. Zhang, F. Guo, Adaptive distributed Kalman-like filter for power system with cyber attacks. Automatica 137, 110091 (2022)MathSciNetMATHCrossRef
92.
go back to reference S. Saha et al., Sensor fault and cyber attack resilient operation of DC microgrids. Int. J. Electr. Power Energy Syst. 99, 540–554 (2018)CrossRef S. Saha et al., Sensor fault and cyber attack resilient operation of DC microgrids. Int. J. Electr. Power Energy Syst. 99, 540–554 (2018)CrossRef
93.
go back to reference H. Yan et al., A novel sliding mode estimation for microgrid control with communication time delays. IEEE Trans. Smart Grid 10(2), 1509–1520 (2017)CrossRef H. Yan et al., A novel sliding mode estimation for microgrid control with communication time delays. IEEE Trans. Smart Grid 10(2), 1509–1520 (2017)CrossRef
94.
go back to reference W. Ao, Y. Song, C. Wen, Adaptive cyber-physical system attack detection and reconstruction with application to power systems. IET Control Theory Appl. 10(12), 1458–1468 (2016)MathSciNetCrossRef W. Ao, Y. Song, C. Wen, Adaptive cyber-physical system attack detection and reconstruction with application to power systems. IET Control Theory Appl. 10(12), 1458–1468 (2016)MathSciNetCrossRef
95.
go back to reference G. Rinaldi et al., Adaptive dual-layer super-twisting sliding mode observers to reconstruct and mitigate disturbances and communication attacks in power networks. Automatica 129, 109656 (2021)MathSciNetMATHCrossRef G. Rinaldi et al., Adaptive dual-layer super-twisting sliding mode observers to reconstruct and mitigate disturbances and communication attacks in power networks. Automatica 129, 109656 (2021)MathSciNetMATHCrossRef
96.
go back to reference Z. Zhang, Y. Niu, J. Song, Input-to-state stabilization of interval type-2 fuzzy systems subject to cyberattacks: an observer-based adaptive sliding mode approach. IEEE Trans. Fuzzy Syst. 28(1), 190–203 (2019)CrossRef Z. Zhang, Y. Niu, J. Song, Input-to-state stabilization of interval type-2 fuzzy systems subject to cyberattacks: an observer-based adaptive sliding mode approach. IEEE Trans. Fuzzy Syst. 28(1), 190–203 (2019)CrossRef
97.
go back to reference Q. Su et al., Observer-based detection and reconstruction of dynamic load altering attack in smart grid. J. Franklin Inst. 358(7), 4013–4027 (2021)MathSciNetMATHCrossRef Q. Su et al., Observer-based detection and reconstruction of dynamic load altering attack in smart grid. J. Franklin Inst. 358(7), 4013–4027 (2021)MathSciNetMATHCrossRef
98.
go back to reference C. Wu et al., Secure estimation for cyber-physical systems via sliding mode. IEEE Trans. Cybern. 48(12), 3420–3431 (2018)CrossRef C. Wu et al., Secure estimation for cyber-physical systems via sliding mode. IEEE Trans. Cybern. 48(12), 3420–3431 (2018)CrossRef
99.
go back to reference L. Ye, F. Zhu, J. Zhang, Sensor attack detection and isolation based on sliding mode observer for cyber-physical systems. Int. J. Adapt. Control Signal Process. 34(4), 469–483 (2020)MathSciNetMATHCrossRef L. Ye, F. Zhu, J. Zhang, Sensor attack detection and isolation based on sliding mode observer for cyber-physical systems. Int. J. Adapt. Control Signal Process. 34(4), 469–483 (2020)MathSciNetMATHCrossRef
100.
go back to reference V. Utkin, J. Guldner, J. Shi, Sliding Mode Control in Electro-Mechanical Systems (CRC Press, 2017) V. Utkin, J. Guldner, J. Shi, Sliding Mode Control in Electro-Mechanical Systems (CRC Press, 2017)
101.
go back to reference G. Chen, Y. Song, Y. Guan, Terminal sliding mode-based consensus tracking control for networked uncertain mechanical systems on digraphs. IEEE Trans. Neural Netw. Learn. Syst. 29(3), 749–756 (2016)MathSciNetCrossRef G. Chen, Y. Song, Y. Guan, Terminal sliding mode-based consensus tracking control for networked uncertain mechanical systems on digraphs. IEEE Trans. Neural Netw. Learn. Syst. 29(3), 749–756 (2016)MathSciNetCrossRef
102.
go back to reference A. Cecilia et al., Detection and mitigation of false data in cooperative dc microgrids with unknown constant power loads. IEEE Trans. Power Electron. 36(8), 9565–9577 (2021)CrossRef A. Cecilia et al., Detection and mitigation of false data in cooperative dc microgrids with unknown constant power loads. IEEE Trans. Power Electron. 36(8), 9565–9577 (2021)CrossRef
103.
go back to reference M. Lv, et al., An integral sliding mode observer for CPS cyber security attack detection. Chaos Interdiscip. J. Nonlinear Sci. 29(4), 043120 (2019) M. Lv, et al., An integral sliding mode observer for CPS cyber security attack detection. Chaos Interdiscip. J. Nonlinear Sci. 29(4), 043120 (2019)
104.
go back to reference M. Ahmadizadeh, A. Shafei, M. Fooladi, A recursive algorithm for dynamics of multiple frictionless impact-contacts in open-loop robotic mechanisms. Mech. Mach. Theory 146, 103745 (2020)CrossRef M. Ahmadizadeh, A. Shafei, M. Fooladi, A recursive algorithm for dynamics of multiple frictionless impact-contacts in open-loop robotic mechanisms. Mech. Mach. Theory 146, 103745 (2020)CrossRef
105.
go back to reference A. Shafei, H. Shafei, Considering link flexibility in the dynamic synthesis of closed-loop mechanisms: a general approach. J. Vib. Acoust. 142(2) (2020) A. Shafei, H. Shafei, Considering link flexibility in the dynamic synthesis of closed-loop mechanisms: a general approach. J. Vib. Acoust. 142(2) (2020)
106.
go back to reference L. Xu et al., A continuous terminal sliding-mode observer-based anomaly detection approach for industrial communication networks. Symmetry 14(1), 124 (2022)CrossRef L. Xu et al., A continuous terminal sliding-mode observer-based anomaly detection approach for industrial communication networks. Symmetry 14(1), 124 (2022)CrossRef
107.
go back to reference H. Wang, et al., High-order observer-based sliding mode control for the isolated microgrid with cyber attacks and physical uncertainties. Complexity 2020 (2020) H. Wang, et al., High-order observer-based sliding mode control for the isolated microgrid with cyber attacks and physical uncertainties. Complexity 2020 (2020)
108.
go back to reference H.R. Shafei, M. Bahrami, H.A. Talebi, Disturbance observer-based two-Layer control strategy design to deal with both matched and mismatched uncertainties. Int. J. Robust Nonlinear Control 31(5), 1640–1656 (2021)MathSciNetCrossRef H.R. Shafei, M. Bahrami, H.A. Talebi, Disturbance observer-based two-Layer control strategy design to deal with both matched and mismatched uncertainties. Int. J. Robust Nonlinear Control 31(5), 1640–1656 (2021)MathSciNetCrossRef
109.
go back to reference H. Yang, et al., Sparse actuator and sensor attacks reconstruction for linear cyber-physical systems with sliding mode observer. IEEE Trans. Ind. Inf. (2021) H. Yang, et al., Sparse actuator and sensor attacks reconstruction for linear cyber-physical systems with sliding mode observer. IEEE Trans. Ind. Inf. (2021)
110.
go back to reference M. Li et al., Adaptive sliding-mode tracking control of networked control systems with false data injection attacks. Inf. Sci. 585, 194–208 (2022)CrossRef M. Li et al., Adaptive sliding-mode tracking control of networked control systems with false data injection attacks. Inf. Sci. 585, 194–208 (2022)CrossRef
111.
go back to reference L. Chen, C. Edwards, H. Alwi, Sensor fault estimation using LPV sliding mode observers with erroneous scheduling parameters. Automatica 101, 66–77 (2019)MathSciNetMATHCrossRef L. Chen, C. Edwards, H. Alwi, Sensor fault estimation using LPV sliding mode observers with erroneous scheduling parameters. Automatica 101, 66–77 (2019)MathSciNetMATHCrossRef
112.
go back to reference S. Cui et al., Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions. IEEE Signal Process. Mag. 29(5), 106–115 (2012)MathSciNetCrossRef S. Cui et al., Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions. IEEE Signal Process. Mag. 29(5), 106–115 (2012)MathSciNetCrossRef
113.
go back to reference A.J. Abianeh et al., Cyber-resilient sliding-mode consensus secondary control scheme for Islanded AC microgrids. IEEE Trans. Power Electron. 37(5), 6074–6089 (2021)CrossRef A.J. Abianeh et al., Cyber-resilient sliding-mode consensus secondary control scheme for Islanded AC microgrids. IEEE Trans. Power Electron. 37(5), 6074–6089 (2021)CrossRef
114.
go back to reference M. Shi et al., Observer-based resilient integrated distributed control against cyberattacks on sensors and actuators in islanded AC microgrids. IEEE Trans. Smart Grid 12(3), 1953–1963 (2021)CrossRef M. Shi et al., Observer-based resilient integrated distributed control against cyberattacks on sensors and actuators in islanded AC microgrids. IEEE Trans. Smart Grid 12(3), 1953–1963 (2021)CrossRef
115.
go back to reference X. Li, Q. Xu, F. Blaabjerg, Adaptive resilient secondary control for islanded AC microgrids with sensor faults. IEEE J. Emerg. Select. Top. Power Electron. 9(5), 5239–5248 (2020)CrossRef X. Li, Q. Xu, F. Blaabjerg, Adaptive resilient secondary control for islanded AC microgrids with sensor faults. IEEE J. Emerg. Select. Top. Power Electron. 9(5), 5239–5248 (2020)CrossRef
116.
go back to reference S. Sahoo, Y. Yang, F. Blaabjerg, Resilient synchronization strategy for AC microgrids under cyber attacks. IEEE Trans. Power Electron. 36(1), 73–77 (2020)CrossRef S. Sahoo, Y. Yang, F. Blaabjerg, Resilient synchronization strategy for AC microgrids under cyber attacks. IEEE Trans. Power Electron. 36(1), 73–77 (2020)CrossRef
117.
go back to reference A. Afshari et al., Resilient synchronization of voltage/frequency in AC microgrids under deception attacks. IEEE Syst. J. 15(2), 2125–2136 (2020)CrossRef A. Afshari et al., Resilient synchronization of voltage/frequency in AC microgrids under deception attacks. IEEE Syst. J. 15(2), 2125–2136 (2020)CrossRef
118.
go back to reference M. Ozay et al., Machine learning methods for attack detection in the smart grid. IEEE Trans. Neural Netw. Learn. Syst. 27(8), 1773–1786 (2015)MathSciNetCrossRef M. Ozay et al., Machine learning methods for attack detection in the smart grid. IEEE Trans. Neural Netw. Learn. Syst. 27(8), 1773–1786 (2015)MathSciNetCrossRef
119.
go back to reference M.R. Habibi et al., Detection of false data injection cyber-attacks in DC microgrids based on recurrent neural networks. IEEE J. Emerg. Select. Top. Power Electron. 9(5), 5294–5310 (2020)CrossRef M.R. Habibi et al., Detection of false data injection cyber-attacks in DC microgrids based on recurrent neural networks. IEEE J. Emerg. Select. Top. Power Electron. 9(5), 5294–5310 (2020)CrossRef
120.
go back to reference M.R. Habibi, et al., Secure MPC/ANN-based false data injection cyber-attack detection and mitigation in DC microgrids. IEEE Syst. J. (2021) M.R. Habibi, et al., Secure MPC/ANN-based false data injection cyber-attack detection and mitigation in DC microgrids. IEEE Syst. J. (2021)
121.
go back to reference S. Zhao, F. Blaabjerg, H. Wang, An overview of artificial intelligence applications for power electronics. IEEE Trans. Power Electron. 36(4), 4633–4658 (2020)CrossRef S. Zhao, F. Blaabjerg, H. Wang, An overview of artificial intelligence applications for power electronics. IEEE Trans. Power Electron. 36(4), 4633–4658 (2020)CrossRef
122.
go back to reference F. de Almeida Florencio, et al., Intrusion detection via MLP neural network using an arduino embedded system, in 2018 VIII Brazilian Symposium on Computing Systems Engineering (SBESC) (IEEE, 2018) F. de Almeida Florencio, et al., Intrusion detection via MLP neural network using an arduino embedded system, in 2018 VIII Brazilian Symposium on Computing Systems Engineering (SBESC) (IEEE, 2018)
123.
go back to reference Y. Javed, N. Rajabi. Multi-layer perceptron artificial neural network based IoT botnet traffic classification, in Proceedings of the Future Technologies Conference (Springer, 2019) Y. Javed, N. Rajabi. Multi-layer perceptron artificial neural network based IoT botnet traffic classification, in Proceedings of the Future Technologies Conference (Springer, 2019)
124.
go back to reference F. Pedregosa, et al., Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011) F. Pedregosa, et al., Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825–2830 (2011)
125.
go back to reference Z.E. Huma et al., A hybrid deep random neural network for cyberattack detection in the industrial internet of things. IEEE Access 9, 55595–55605 (2021)CrossRef Z.E. Huma et al., A hybrid deep random neural network for cyberattack detection in the industrial internet of things. IEEE Access 9, 55595–55605 (2021)CrossRef
126.
go back to reference B. Susilo, R.F. Sari, Intrusion detection in IoT networks using deep learning algorithm. Information 11(5), 279 (2020)CrossRef B. Susilo, R.F. Sari, Intrusion detection in IoT networks using deep learning algorithm. Information 11(5), 279 (2020)CrossRef
127.
go back to reference J. Yan, Y. Qi, Q. Rao, Detecting malware with an ensemble method based on deep neural network. Secur. Commun. Netw. 2018 (2018) J. Yan, Y. Qi, Q. Rao, Detecting malware with an ensemble method based on deep neural network. Secur. Commun. Netw. 2018 (2018)
128.
go back to reference Y. Li et al., Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154, 107450 (2020)CrossRef Y. Li et al., Robust detection for network intrusion of industrial IoT based on multi-CNN fusion. Measurement 154, 107450 (2020)CrossRef
129.
go back to reference Y. He, G.J. Mendis, J. Wei, Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017)CrossRef Y. He, G.J. Mendis, J. Wei, Real-time detection of false data injection attacks in smart grid: a deep learning-based intelligent mechanism. IEEE Trans. Smart Grid 8(5), 2505–2516 (2017)CrossRef
130.
go back to reference C. Jiang et al., A mixed deep recurrent neural network for MEMS gyroscope noise suppressing. Electronics 8(2), 181 (2019)CrossRef C. Jiang et al., A mixed deep recurrent neural network for MEMS gyroscope noise suppressing. Electronics 8(2), 181 (2019)CrossRef
131.
go back to reference J. Kim, et al., Long short term memory recurrent neural network classifier for intrusion detection, in 2016 International Conference on Platform Technology and Service (PlatCon) (IEEE, 2016) J. Kim, et al., Long short term memory recurrent neural network classifier for intrusion detection, in 2016 International Conference on Platform Technology and Service (PlatCon) (IEEE, 2016)
132.
go back to reference D. Tran et al., A LSTM based framework for handling multiclass imbalance in DGA botnet detection. Neurocomputing 275, 2401–2413 (2018)CrossRef D. Tran et al., A LSTM based framework for handling multiclass imbalance in DGA botnet detection. Neurocomputing 275, 2401–2413 (2018)CrossRef
133.
go back to reference X. Niu, et al., Dynamic detection of false data injection attack in smart grid using deep learning, in 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) (IEEE, 2019) X. Niu, et al., Dynamic detection of false data injection attack in smart grid using deep learning, in 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) (IEEE, 2019)
134.
go back to reference M.M. Hassan et al., A hybrid deep learning model for efficient intrusion detection in big data environment. Inf. Sci. 513, 386–396 (2020)CrossRef M.M. Hassan et al., A hybrid deep learning model for efficient intrusion detection in big data environment. Inf. Sci. 513, 386–396 (2020)CrossRef
135.
go back to reference D. Vasan et al., MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning. IEEE Trans. Comput. 69(11), 1654–1667 (2020)CrossRef D. Vasan et al., MTHAEL: Cross-architecture IoT malware detection based on neural network advanced ensemble learning. IEEE Trans. Comput. 69(11), 1654–1667 (2020)CrossRef
136.
go back to reference M. Saharkhizan et al., An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet Things J. 7(9), 8852–8859 (2020)CrossRef M. Saharkhizan et al., An ensemble of deep recurrent neural networks for detecting IoT cyber attacks using network traffic. IEEE Internet Things J. 7(9), 8852–8859 (2020)CrossRef
137.
go back to reference I. Goodfellow, Y. Bengio, A. Courville, Deep Learning (MIT Press, 2016) I. Goodfellow, Y. Bengio, A. Courville, Deep Learning (MIT Press, 2016)
138.
go back to reference W. Liu et al., A survey of deep neural network architectures and their applications. Neurocomputing 234, 11–26 (2017)CrossRef W. Liu et al., A survey of deep neural network architectures and their applications. Neurocomputing 234, 11–26 (2017)CrossRef
139.
go back to reference M. Yousefi-Azar, et al., Autoencoder-based feature learning for cyber security applications, in 2017 International Joint Conference on Neural Networks (IJCNN) (IEEE, 2017) M. Yousefi-Azar, et al., Autoencoder-based feature learning for cyber security applications, in 2017 International Joint Conference on Neural Networks (IJCNN) (IEEE, 2017)
140.
go back to reference B. Yan, G. Han, Effective feature extraction via stacked sparse autoencoder to improve intrusion detection system. IEEE Access 6, 41238–41248 (2018)CrossRef B. Yan, G. Han, Effective feature extraction via stacked sparse autoencoder to improve intrusion detection system. IEEE Access 6, 41238–41248 (2018)CrossRef
141.
go back to reference R. Memisevic, G.E. Hinton, Learning to represent spatial transformations with factored higher-order Boltzmann machines. Neural Comput. 22(6), 1473–1492 (2010)MATHCrossRef R. Memisevic, G.E. Hinton, Learning to represent spatial transformations with factored higher-order Boltzmann machines. Neural Comput. 22(6), 1473–1492 (2010)MATHCrossRef
142.
go back to reference U. Fiore et al., Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122, 13–23 (2013)CrossRef U. Fiore et al., Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122, 13–23 (2013)CrossRef
143.
go back to reference Y. Imamverdiyev, F. Abdullayeva, Deep learning method for denial of service attack detection based on restricted boltzmann machine. Big data 6(2), 159–169 (2018)CrossRef Y. Imamverdiyev, F. Abdullayeva, Deep learning method for denial of service attack detection based on restricted boltzmann machine. Big data 6(2), 159–169 (2018)CrossRef
144.
go back to reference S. Seo, S. Park, J. Kim. Improvement of network intrusion detection accuracy by using restricted Boltzmann machine, in 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN). (IEEE, 2016) S. Seo, S. Park, J. Kim. Improvement of network intrusion detection accuracy by using restricted Boltzmann machine, in 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN). (IEEE, 2016)
145.
go back to reference P. Wei et al., An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7, 87593–87605 (2019)CrossRef P. Wei et al., An optimization method for intrusion detection classification model based on deep belief network. IEEE Access 7, 87593–87605 (2019)CrossRef
146.
go back to reference M.A. Salama et al., Hybrid intelligent intrusion detection scheme, in Soft computing in industrial applications. (Springer, 2011), pp.293–303CrossRef M.A. Salama et al., Hybrid intelligent intrusion detection scheme, in Soft computing in industrial applications. (Springer, 2011), pp.293–303CrossRef
147.
go back to reference F. Qu, et al., An intrusion detection model based on deep belief network, in Proceedings of the 2017 VI International Conference on Network, Communication and Computing (2017) F. Qu, et al., An intrusion detection model based on deep belief network, in Proceedings of the 2017 VI International Conference on Network, Communication and Computing (2017)
148.
go back to reference Y. Zhang, P. Li, X. Wang, Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019)CrossRef Y. Zhang, P. Li, X. Wang, Intrusion detection for IoT based on improved genetic algorithm and deep belief network. IEEE Access 7, 31711–31722 (2019)CrossRef
149.
go back to reference I. Goodfellow, et al., Generative adversarial nets. Advances in neural information processing systems (2014), p. 27 I. Goodfellow, et al., Generative adversarial nets. Advances in neural information processing systems (2014), p. 27
150.
go back to reference J.-Y. Kim, S.-J. Bu, S.-B. Cho, Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Inf. Sci. 460, 83–102 (2018)CrossRef J.-Y. Kim, S.-J. Bu, S.-B. Cho, Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders. Inf. Sci. 460, 83–102 (2018)CrossRef
151.
go back to reference T. Merino, et al., Expansion of cyber attack data from unbalanced datasets using generative adversarial networks, in International Conference on Software Engineering Research, Management and Applications (Springer, 2019) T. Merino, et al., Expansion of cyber attack data from unbalanced datasets using generative adversarial networks, in International Conference on Software Engineering Research, Management and Applications (Springer, 2019)
152.
go back to reference K. Weiss, T.M. Khoshgoftaar, D. Wang, A survey of transfer learning. J. Big data 3(1), 1–40 (2016)CrossRef K. Weiss, T.M. Khoshgoftaar, D. Wang, A survey of transfer learning. J. Big data 3(1), 1–40 (2016)CrossRef
153.
go back to reference S.J. Pan, Q. Yang, A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345–1359 (2009)CrossRef S.J. Pan, Q. Yang, A survey on transfer learning. IEEE Trans. Knowl. Data Eng. 22(10), 1345–1359 (2009)CrossRef
154.
go back to reference P. Wu, H. Guo, R. Buckland, A transfer learning approach for network intrusion detection, in 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA). IEEE (2019) P. Wu, H. Guo, R. Buckland, A transfer learning approach for network intrusion detection, in 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA). IEEE (2019)
155.
go back to reference X. Gao et al., Malware classification for the cloud via semi-supervised transfer learning. J. Inf. Secur. Appl. 55, 102661 (2020) X. Gao et al., Malware classification for the cloud via semi-supervised transfer learning. J. Inf. Secur. Appl. 55, 102661 (2020)
156.
go back to reference L. Vu et al., Deep transfer learning for IoT attack detection. IEEE Access 8, 107335–107344 (2020)CrossRef L. Vu et al., Deep transfer learning for IoT attack detection. IEEE Access 8, 107335–107344 (2020)CrossRef
157.
go back to reference K. Arulkumaran et al., Deep reinforcement learning: a brief survey. IEEE Signal Process. Mag. 34(6), 26–38 (2017)CrossRef K. Arulkumaran et al., Deep reinforcement learning: a brief survey. IEEE Signal Process. Mag. 34(6), 26–38 (2017)CrossRef
158.
go back to reference M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst. Appl. 141, 112963 (2020)CrossRef M. Lopez-Martin, B. Carro, A. Sanchez-Esguevillas, Application of deep reinforcement learning to intrusion detection for supervised problems. Expert Syst. Appl. 141, 112963 (2020)CrossRef
159.
go back to reference K. Sethi, et al., Deep reinforcement learning based intrusion detection system for cloud infrastructure, in 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (IEEE, 2020) K. Sethi, et al., Deep reinforcement learning based intrusion detection system for cloud infrastructure, in 2020 International Conference on COMmunication Systems & NETworkS (COMSNETS) (IEEE, 2020)
160.
go back to reference D. Li et al., IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manag. 49, 533–545 (2019)CrossRef D. Li et al., IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. Int. J. Inf. Manag. 49, 533–545 (2019)CrossRef
161.
go back to reference K. Hughes, K. McLaughlin, S. Sezer, A model-free approach to intrusion response systems. J. Inf. Secur. Appl. 66, 103150 (2022) K. Hughes, K. McLaughlin, S. Sezer, A model-free approach to intrusion response systems. J. Inf. Secur. Appl. 66, 103150 (2022)
162.
go back to reference M. Esmalifalak et al., Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 11(3), 1644–1652 (2014)CrossRef M. Esmalifalak et al., Detecting stealthy false data injection using machine learning in smart grid. IEEE Syst. J. 11(3), 1644–1652 (2014)CrossRef
163.
go back to reference S.J. Lee et al., IMPACT: impersonation attack detection via edge computing using deep autoencoder and feature abstraction. IEEE Access 8, 65520–65529 (2020)CrossRef S.J. Lee et al., IMPACT: impersonation attack detection via edge computing using deep autoencoder and feature abstraction. IEEE Access 8, 65520–65529 (2020)CrossRef
164.
go back to reference M.G. Raman et al., An efficient intrusion detection system based on hypergraph-Genetic algorithm for parameter optimization and feature selection in support vector machine. Knowl. Based Syst. 134, 1–12 (2017)CrossRef M.G. Raman et al., An efficient intrusion detection system based on hypergraph-Genetic algorithm for parameter optimization and feature selection in support vector machine. Knowl. Based Syst. 134, 1–12 (2017)CrossRef
165.
go back to reference X. Tang, S.X.-D. Tan, H.-B. Chen, SVM based intrusion detection using nonlinear scaling scheme, in 2018 14th IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT) (IEEE, 2018) X. Tang, S.X.-D. Tan, H.-B. Chen, SVM based intrusion detection using nonlinear scaling scheme, in 2018 14th IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT) (IEEE, 2018)
166.
go back to reference V. Shakhov, et al., On Lightweight method for intrusions detection in the Internet of Things, in 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) (IEEE, 2019) V. Shakhov, et al., On Lightweight method for intrusions detection in the Internet of Things, in 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom) (IEEE, 2019)
167.
go back to reference M.R. Habibi et al., Decentralized coordinated cyberattack detection and mitigation strategy in DC microgrids based on artificial neural networks. IEEE J. Emerg. Select. Top. Power Electron. 9(4), 4629–4638 (2021)CrossRef M.R. Habibi et al., Decentralized coordinated cyberattack detection and mitigation strategy in DC microgrids based on artificial neural networks. IEEE J. Emerg. Select. Top. Power Electron. 9(4), 4629–4638 (2021)CrossRef
168.
go back to reference A. Kavousi-Fard, W. Su, T. Jin, A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Trans. Ind. Inf. 17(1), 650–658 (2020)CrossRef A. Kavousi-Fard, W. Su, T. Jin, A machine-learning-based cyber attack detection model for wireless sensor networks in microgrids. IEEE Trans. Ind. Inf. 17(1), 650–658 (2020)CrossRef
169.
go back to reference M. Dehghani et al., Cyber-attack detection in dc microgrids based on deep machine learning and wavelet singular values approach. Electronics 10(16), 1914 (2021)CrossRef M. Dehghani et al., Cyber-attack detection in dc microgrids based on deep machine learning and wavelet singular values approach. Electronics 10(16), 1914 (2021)CrossRef
170.
go back to reference Y. Liu et al., Robust and resilient distributed optimal frequency control for microgrids against cyber attacks. IEEE Trans. Ind. Inf. 18(1), 375–386 (2021)CrossRef Y. Liu et al., Robust and resilient distributed optimal frequency control for microgrids against cyber attacks. IEEE Trans. Ind. Inf. 18(1), 375–386 (2021)CrossRef
171.
go back to reference M. Shafiee-Rad et al., Robust decentralized voltage control for uncertain DC microgrids. Int. J. Electr. Power Energy Syst. 125, 106468 (2021)CrossRef M. Shafiee-Rad et al., Robust decentralized voltage control for uncertain DC microgrids. Int. J. Electr. Power Energy Syst. 125, 106468 (2021)CrossRef
172.
go back to reference L. Xu, Y. Chen, M. Li, Sliding mode resilient control for TOD-based servo system under DoS attack. Int. J. Control Autom. Syst. 20(2), 526–535 (2022)CrossRef L. Xu, Y. Chen, M. Li, Sliding mode resilient control for TOD-based servo system under DoS attack. Int. J. Control Autom. Syst. 20(2), 526–535 (2022)CrossRef
173.
go back to reference R. Sakthivel et al., Resilient sampled-data control for Markovian jump systems with an adaptive fault-tolerant mechanism. IEEE Trans. Circuits Syst. II Express Briefs 64(11), 1312–1316 (2017) R. Sakthivel et al., Resilient sampled-data control for Markovian jump systems with an adaptive fault-tolerant mechanism. IEEE Trans. Circuits Syst. II Express Briefs 64(11), 1312–1316 (2017)
174.
go back to reference Y. Xu, et al., Resilient and robust control for event‐triggered uncertain semi‐Markov jump systems against stochastic cyber attacks. Int. J. Robust Nonlinear Control Y. Xu, et al., Resilient and robust control for event‐triggered uncertain semi‐Markov jump systems against stochastic cyber attacks. Int. J. Robust Nonlinear Control
175.
go back to reference X. Xie, J. Lu, D. Yue, Resilient stabilization of discrete-time Takagi-Sugeno fuzzy systems: dynamic trade-off between conservatism and complexity. Inf. Sci. 582, 181–197 (2022)MathSciNetCrossRef X. Xie, J. Lu, D. Yue, Resilient stabilization of discrete-time Takagi-Sugeno fuzzy systems: dynamic trade-off between conservatism and complexity. Inf. Sci. 582, 181–197 (2022)MathSciNetCrossRef
176.
go back to reference Y. Seyedi, H. Karimi, J. Mahseredjian, A data-driven method for prediction of post-fault voltage stability in hybrid AC/DC microgrids. IEEE Trans. Power Syst. (2022) Y. Seyedi, H. Karimi, J. Mahseredjian, A data-driven method for prediction of post-fault voltage stability in hybrid AC/DC microgrids. IEEE Trans. Power Syst. (2022)
177.
go back to reference J. Duan, W. Zeng, M.-Y. Chow, Resilient distributed DC optimal power flow against data integrity attack. IEEE Trans. Smart Grid 9(4), 3543–3552 (2016)CrossRef J. Duan, W. Zeng, M.-Y. Chow, Resilient distributed DC optimal power flow against data integrity attack. IEEE Trans. Smart Grid 9(4), 3543–3552 (2016)CrossRef
178.
go back to reference H. Zhang et al., Distributed load sharing under false data injection attack in an inverter-based microgrid. IEEE Trans. Ind. Electron. 66(2), 1543–1551 (2018)CrossRef H. Zhang et al., Distributed load sharing under false data injection attack in an inverter-based microgrid. IEEE Trans. Ind. Electron. 66(2), 1543–1551 (2018)CrossRef
179.
go back to reference S. Abhinav et al., Synchrony in networked microgrids under attacks. IEEE Trans. Smart Grid 9(6), 6731–6741 (2017)CrossRef S. Abhinav et al., Synchrony in networked microgrids under attacks. IEEE Trans. Smart Grid 9(6), 6731–6741 (2017)CrossRef
180.
go back to reference L.-Y. Lu et al., Intrusion detection in distributed frequency control of isolated microgrids. IEEE Trans. Smart Grid 10(6), 6502–6515 (2019)CrossRef L.-Y. Lu et al., Intrusion detection in distributed frequency control of isolated microgrids. IEEE Trans. Smart Grid 10(6), 6502–6515 (2019)CrossRef
181.
go back to reference L. Ding et al., Distributed resilient finite-time secondary control for heterogeneous battery energy storage systems under denial-of-service attacks. IEEE Trans. Ind. Inf. 16(7), 4909–4919 (2019)CrossRef L. Ding et al., Distributed resilient finite-time secondary control for heterogeneous battery energy storage systems under denial-of-service attacks. IEEE Trans. Ind. Inf. 16(7), 4909–4919 (2019)CrossRef
182.
go back to reference A. Bidram et al., Resilient and cybersecure distributed control of inverter-based islanded microgrids. IEEE Trans. Ind. Inf. 16(6), 3881–3894 (2019)CrossRef A. Bidram et al., Resilient and cybersecure distributed control of inverter-based islanded microgrids. IEEE Trans. Ind. Inf. 16(6), 3881–3894 (2019)CrossRef
183.
go back to reference C. Deng et al., Distributed resilient control for energy storage systems in cyber–physical microgrids. IEEE Trans. Ind. Inf. 17(2), 1331–1341 (2020)CrossRef C. Deng et al., Distributed resilient control for energy storage systems in cyber–physical microgrids. IEEE Trans. Ind. Inf. 17(2), 1331–1341 (2020)CrossRef
184.
go back to reference T. Ding et al., A resilient microgrid formation strategy for load restoration considering master-slave distributed generators and topology reconfiguration. Appl. Energy 199, 205–216 (2017)CrossRef T. Ding et al., A resilient microgrid formation strategy for load restoration considering master-slave distributed generators and topology reconfiguration. Appl. Energy 199, 205–216 (2017)CrossRef
185.
go back to reference C. Wu et al., Active defense-based resilient sliding mode control under denial-of-service attacks. IEEE Trans. Inf. Forensics Secur. 15, 237–249 (2019)CrossRef C. Wu et al., Active defense-based resilient sliding mode control under denial-of-service attacks. IEEE Trans. Inf. Forensics Secur. 15, 237–249 (2019)CrossRef
186.
go back to reference H.R. Baghaee et al., A decentralized robust mixed $h_ {{2}}/h_ {{{\infty}}}$ voltage control scheme to improve small/large-signal stability and frt capability of islanded multi-der microgrid considering load disturbances. IEEE Syst. J. 12(3), 2610–2621 (2017)CrossRef H.R. Baghaee et al., A decentralized robust mixed $h_ {{2}}/h_ {{{\infty}}}$ voltage control scheme to improve small/large-signal stability and frt capability of islanded multi-der microgrid considering load disturbances. IEEE Syst. J. 12(3), 2610–2621 (2017)CrossRef
187.
go back to reference X. Li, et al. Adaptive resilient secondary control for microgrids with communication faults. IEEE Trans. Cybern. (2021) X. Li, et al. Adaptive resilient secondary control for microgrids with communication faults. IEEE Trans. Cybern. (2021)
188.
go back to reference C. Lin et al., Dynamic MGs-based load restoration for resilient urban power distribution systems considering intermittent RESs and droop control. Int. J. Electr. Power Energy Syst. 140, 107975 (2022)CrossRef C. Lin et al., Dynamic MGs-based load restoration for resilient urban power distribution systems considering intermittent RESs and droop control. Int. J. Electr. Power Energy Syst. 140, 107975 (2022)CrossRef
189.
go back to reference Y. Xu, Resilient secure control of networked systems over unreliable communication networks. IEEE Trans. Ind. Inf. (2021) Y. Xu, Resilient secure control of networked systems over unreliable communication networks. IEEE Trans. Ind. Inf. (2021)
190.
go back to reference Y. Zhao, et al., Adaptive resilient control of cyber-physical systems under actuator and sensor attacks. IEEE Trans. Ind. Inf. (2021) Y. Zhao, et al., Adaptive resilient control of cyber-physical systems under actuator and sensor attacks. IEEE Trans. Ind. Inf. (2021)
191.
go back to reference C. Deng, D. Zhang, G. Feng, Resilient practical cooperative output regulation for MASs with unknown switching exosystem dynamics under DoS attacks. Automatica 139, 110172 (2022)MathSciNetMATHCrossRef C. Deng, D. Zhang, G. Feng, Resilient practical cooperative output regulation for MASs with unknown switching exosystem dynamics under DoS attacks. Automatica 139, 110172 (2022)MathSciNetMATHCrossRef
192.
go back to reference S. Song et al., Adaptive resilient control design for nonlinear time-delay systems against unknown state-dependent deception attacks. Int. J. Robust Nonlinear Control 32(4), 2159–2182 (2022)MathSciNetCrossRef S. Song et al., Adaptive resilient control design for nonlinear time-delay systems against unknown state-dependent deception attacks. Int. J. Robust Nonlinear Control 32(4), 2159–2182 (2022)MathSciNetCrossRef
193.
go back to reference Y. Yang, Y. Qian, W. Yue, A secure dynamic event-triggered mechanism for resilient control of multi-agent systems under sensor and actuator attacks. IEEE Trans. Circuits Syst. I Regular Papers (2021) Y. Yang, Y. Qian, W. Yue, A secure dynamic event-triggered mechanism for resilient control of multi-agent systems under sensor and actuator attacks. IEEE Trans. Circuits Syst. I Regular Papers (2021)
194.
go back to reference P. Meng, et al., Resilient DC voltage control for islanded wind farms integration using cascaded hybrid HVDC system. IEEE Trans. Power Syst. (2021) P. Meng, et al., Resilient DC voltage control for islanded wind farms integration using cascaded hybrid HVDC system. IEEE Trans. Power Syst. (2021)
195.
go back to reference S. Zuo, D. Yue, Resilient containment of multigroup systems against unknown unbounded FDI attacks. IEEE Trans. Ind. Electron. 69(3), 2864–2873 (2021)CrossRef S. Zuo, D. Yue, Resilient containment of multigroup systems against unknown unbounded FDI attacks. IEEE Trans. Ind. Electron. 69(3), 2864–2873 (2021)CrossRef
196.
go back to reference M.S. Sadabadi, S. Sahoo, F. Blaabjerg, Stability-oriented design of cyberattack-resilient controllers for cooperative DC microgrids. IEEE Trans. Power Electron. 37(2), 1310–1321 (2021) M.S. Sadabadi, S. Sahoo, F. Blaabjerg, Stability-oriented design of cyberattack-resilient controllers for cooperative DC microgrids. IEEE Trans. Power Electron. 37(2), 1310–1321 (2021)
197.
go back to reference S. Saha, S. Gholami, M.K.K. Prince, Sensor fault-resilient control of electronically coupled distributed energy resources in Islanded microgrids. IEEE Trans. Ind. Appl. 58(1), 914–929 (2021)CrossRef S. Saha, S. Gholami, M.K.K. Prince, Sensor fault-resilient control of electronically coupled distributed energy resources in Islanded microgrids. IEEE Trans. Ind. Appl. 58(1), 914–929 (2021)CrossRef
198.
go back to reference S. Zuo, D. Yue, Resilient output formation containment of heterogeneous multigroup systems against unbounded attacks. IEEE Trans. Cybern. (2020) S. Zuo, D. Yue, Resilient output formation containment of heterogeneous multigroup systems against unbounded attacks. IEEE Trans. Cybern. (2020)
199.
go back to reference Y. Shan, A. Pan, H. Liu, A switching event-triggered resilient control scheme for primary and secondary levels in AC microgrids. ISA Trans. (2022) Y. Shan, A. Pan, H. Liu, A switching event-triggered resilient control scheme for primary and secondary levels in AC microgrids. ISA Trans. (2022)
200.
go back to reference X. Ma, et al., Consensus tracking control for uncertain non‐strict feedback multi‐agent system under cyber attack via resilient neuroadaptive approach. Int. J. Robust Nonlinear Control X. Ma, et al., Consensus tracking control for uncertain non‐strict feedback multi‐agent system under cyber attack via resilient neuroadaptive approach. Int. J. Robust Nonlinear Control
201.
go back to reference T. Vigneysh, N. Pachauri, V. Suresh, Internal model-based cascaded control approach for multi-functional grid interactive converters. IEEE Access 10, 19862–19874 (2022)CrossRef T. Vigneysh, N. Pachauri, V. Suresh, Internal model-based cascaded control approach for multi-functional grid interactive converters. IEEE Access 10, 19862–19874 (2022)CrossRef
202.
go back to reference Z. Wang et al., Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks. J. Franklin Inst. 355(1), 406–420 (2018)MathSciNetMATHCrossRef Z. Wang et al., Centralized security-guaranteed filtering in multirate-sensor fusion under deception attacks. J. Franklin Inst. 355(1), 406–420 (2018)MathSciNetMATHCrossRef
203.
go back to reference S. Sahoo, T. Dragičević, F. Blaabjerg, Multilayer resilience paradigm against cyber attacks in DC microgrids. IEEE Trans. Power Electron. 36(3), 2522–2532 (2020)CrossRef S. Sahoo, T. Dragičević, F. Blaabjerg, Multilayer resilience paradigm against cyber attacks in DC microgrids. IEEE Trans. Power Electron. 36(3), 2522–2532 (2020)CrossRef
204.
go back to reference X. Chen et al., Distributed resilient control against denial of service attacks in DC microgrids with constant power load. Renew. Sustain. Energy Rev. 153, 111792 (2022)CrossRef X. Chen et al., Distributed resilient control against denial of service attacks in DC microgrids with constant power load. Renew. Sustain. Energy Rev. 153, 111792 (2022)CrossRef
205.
go back to reference S. Sahoo, T. Dragičević, F. Blaabjerg, Resilient operation of heterogeneous sources in cooperative dc microgrids. IEEE Trans. Power Electron. 35(12), 12601–12605 (2020)CrossRef S. Sahoo, T. Dragičević, F. Blaabjerg, Resilient operation of heterogeneous sources in cooperative dc microgrids. IEEE Trans. Power Electron. 35(12), 12601–12605 (2020)CrossRef
Metadata
Title
A Comprehensive Review on Cyber-Attack Detection and Control of Microgrid Systems
Authors
Hamidreza Shafei
Li Li
Ricardo P. Aguilera
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-20360-2_1