To send content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about sending content to .
To send content items to your Kindle, first ensure firstname.lastname@example.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about sending to your Kindle.
Note you can select to send to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be sent to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Data injection attacks serve as the hallmark example of the security concerns posed by the incorporation of advanced sensing and communication capabilities in power systems. Data injection attacks arise when one or several malicious attackers compromise a subset of the meters used by the state estimation procedure with the aim of manipulating the estimate obtained by the network operator. This chapter surveys the main data injection attacks that are formulated under the assumption that the state variables do not posses a probabilistic description and, therefore, the network operator implements unbiased state estimation procedures. Data injection attacks without this assumption are also studied. In particular, when the network operator perform minimum mean square error (MMSE) estimation, a fundamental trade-off is established between the distortion induced by the attacker and the achievable probability of attack detection. Within this setting, optimal attack strategies are described. The chapter also describes stealth attack constructions that simultaneously minimize the amount of information obtained by the network operator and the probability of attack detection.
Experts in data analytics and power engineering present techniques addressing the needs of modern power systems, covering theory and applications related to power system reliability, efficiency, and security. With topics spanning large-scale and distributed optimization, statistical learning, big data analytics, graph theory, and game theory, this is an essential resource for graduate students and researchers in academia and industry with backgrounds in power systems engineering, applied mathematics, and computer science.