IET Cyber-Physical Systems: Theory and Applications最新文献

筛选
英文 中文
Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack 虚假数据注入攻击下交直流混合微电网的分布式弹性恢复策略
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-05-15 DOI: 10.1049/cps2.12060
Yihe Wang, Luyuan Wang, Xiang Xiao, Haoran Cui, Liangsheng Lan
{"title":"Distributed elastic recovery strategy of AC/DC hybrid microgrid under false data injection attack","authors":"Yihe Wang,&nbsp;Luyuan Wang,&nbsp;Xiang Xiao,&nbsp;Haoran Cui,&nbsp;Liangsheng Lan","doi":"10.1049/cps2.12060","DOIUrl":"10.1049/cps2.12060","url":null,"abstract":"<p>The AC/DC hybrid microgrid, which integrates AC microgrid and DC microgrid, greatly improves the flexibility of distributed energy. However, it is imperative to acknowledge that the microgrid in question is accompanied by a significantly elevated network security risk. To solve this problem, this article proposes a false data injection attack detection and alarm method based on active power output. The detection algorithm is capable of detecting attacks at any location within the microgrid and mitigating the impact of communication delay. Moreover, a distributed elastic recovery strategy based on the aforementioned detection algorithm is proposed. This strategy aims to expeditiously restore the compromised agent to its rated state. Finally, a simulation model is developed to demonstrate the effectiveness of the proposed strategy.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"280-288"},"PeriodicalIF":1.5,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83245932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification 综述:监测智能电网网络物理系统的态势感知和关键资产识别
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-05-12 DOI: 10.1049/cps2.12059
Yazeed Alrowaili, Neetesh Saxena, Anurag Srivastava, Mauro Conti, Pete Burnap
{"title":"A review: Monitoring situational awareness of smart grid cyber-physical systems and critical asset identification","authors":"Yazeed Alrowaili,&nbsp;Neetesh Saxena,&nbsp;Anurag Srivastava,&nbsp;Mauro Conti,&nbsp;Pete Burnap","doi":"10.1049/cps2.12059","DOIUrl":"https://doi.org/10.1049/cps2.12059","url":null,"abstract":"<p>Cyber-Physical Systems (CPSs) are becoming more automated and aimed to be as efficient as possible by enabling integration between their operations and Information Technology (IT) resources. In combination with production automation, these systems need to identify their assets and the correlation between them; any potential threats or failures alert the relevant user/department and suggest the appropriate remediation plan. Moreover, identifying critical assets in these systems is essential. With numerous research and technologies available, assessing IT assets nowadays can be straightforward to implement. However, there is one significant issue of evaluating operational technology critical assets since they have different characteristics, and traditional solutions cannot work efficiently. This study presents the necessary background to attain the appropriate approach for monitoring critical assets in CPSs' Situational Awareness (SA). Additionally, the study presents a broad survey supported by an in-depth review of previous works in three important aspects. First, it reviews the applicability of possible techniques, tools and solutions that can be used to collect detailed information from such systems. Secondly, it covers studies that were implemented to evaluate the criticality of assets in CPSs, demonstrates requirements for critical asset identification, explores different risks and failure techniques utilised in these systems and delves into approaches to evaluate such methods in energy systems. Finally, this paper highlights and analyses SA gaps based on existing solutions, provides future directions and discusses open research issues.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 3","pages":"160-185"},"PeriodicalIF":1.5,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50130421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection 利用分层特征聚类和激励加权异常检测检测智能电表虚假数据攻击
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-05-09 DOI: 10.1049/cps2.12057
Martin Higgins, Bruce Stephen, David Wallom
{"title":"Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection","authors":"Martin Higgins,&nbsp;Bruce Stephen,&nbsp;David Wallom","doi":"10.1049/cps2.12057","DOIUrl":"10.1049/cps2.12057","url":null,"abstract":"<p>Spot pricing is often suggested as a method of increasing demand-side flexibility in electrical power load. However, few works have considered the vulnerability of spot pricing to financial fraud via false data injection (FDI) style attacks. The authors consider attacks which aim to alter the consumer load profile to exploit intraday price dips. The authors examine an anomaly detection protocol for cyber-attacks that seek to leverage spot prices for financial gain. In this way the authors outline a methodology for detecting attacks on industrial load smart meters. The authors first create a feature clustering model of the underlying business, segregated by business type. The authors then use these clusters to create an incentive-weighted anomaly detection protocol for false data attacks against load profiles. This clustering-based methodology incorporates both the load profile and spot pricing considerations for the detection of injected load profiles. To reduce false positives, the authors model incentive-based detection, which includes knowledge of spot prices, into the anomaly tracking, enabling the methodology to account for changes in the load profile which are unlikely to be attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"257-271"},"PeriodicalIF":1.5,"publicationDate":"2023-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79538771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on eigenparameters and detection methods for single-phase-to-ground faults in non-effectively grounded distribution systems 非有效接地配电系统单相接地故障特征参数及检测方法研究
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-05-02 DOI: 10.1049/cps2.12055
Wanxing Sheng, Xiaohui Song
{"title":"Research on eigenparameters and detection methods for single-phase-to-ground faults in non-effectively grounded distribution systems","authors":"Wanxing Sheng,&nbsp;Xiaohui Song","doi":"10.1049/cps2.12055","DOIUrl":"https://doi.org/10.1049/cps2.12055","url":null,"abstract":"<p>Non-effectively grounded power distribution systems (NGDS) are widely used in China and other countries. However, over a long time, single-phase-to-ground faults (SGF) have been misjudged or omitted by the monitoring system, threatening the security of the power supply system and human safety. Based on the reason analysis for the omitted and misjudged SGFs in NGDS, the concept of NGDS fault eigenparameters to correctly reflect fault characteristics and a method of SGF detection based on fault eigenparameters are proposed. Then, the detection mechanism of phase voltage and fault current resistive elements for SGF is revealed. The variation characteristics of typical fault parameters changing with distribution system scale (parameter) and fault transition resistance, such as residual voltage and Zero-sequence current (iA-iO), are analysed. The eigenparameters of SGF in certain NGDS with specific scales/parameters are also proposed, which can correctly reflect the fault characteristics under different transition resistances.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 3","pages":"205-217"},"PeriodicalIF":1.5,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12055","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50118487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital farming based on a smart and user-friendly IoT irrigation system: A conifer nursery case study 基于智能和用户友好型物联网灌溉系统的数字农业:针叶树苗圃案例研究
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-04-27 DOI: 10.1049/cps2.12054
Adrian Florea, Daniel-Ioan Popa, Daniel Morariu, Ionela Maniu, Lasse Berntzen, Ugo Fiore
{"title":"Digital farming based on a smart and user-friendly IoT irrigation system: A conifer nursery case study","authors":"Adrian Florea,&nbsp;Daniel-Ioan Popa,&nbsp;Daniel Morariu,&nbsp;Ionela Maniu,&nbsp;Lasse Berntzen,&nbsp;Ugo Fiore","doi":"10.1049/cps2.12054","DOIUrl":"10.1049/cps2.12054","url":null,"abstract":"<p>Although digital technologies on farms bridge the productivity-sustainability gap, they are not yet widely adopted. Familiarising farmers with digital systems is as important as developing advanced technological platforms: As farmers become accustomed to and feel in control of digital systems, they will find it easier to accept, adapt and keep pace with technological developments. This article describes the design and implementation of a flexible, scalable, easy-to-use and extensible IoT embedded system to control sprinkler irrigation in an outdoor Thuja conifer nursery in an automated mode and under varying weather. Irrigation is controlled by Mamdani Fuzzy Inference Logic based on rainfall prediction and real-time monitoring of the plants. The IoT system provides a control dashboard and offers three operating modes: manual, automated or scheduled (daily, weekly, and monthly). The system is robust in the event of a power outage or loss of connectivity. The code is available on GitHub. Sensors, solenoid valves, Raspberry Pi microcontrollers, fuzzy logic systems, a web interface and a cloud service create a sustainable solution that makes water use more efficient, creates a healthy environment for crops (using just the right amount of water), makes life easier for farmers, and exposes them to the benefits of the IoT.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"150-168"},"PeriodicalIF":1.5,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72762867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-supervised pre-training in photovoltaic systems via supervisory control and data acquisition data 通过监控和数据采集数据对光伏系统进行自我监督预培训
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-04-27 DOI: 10.1049/cps2.12056
Dejun Wang, Zhenqing Duan, Wenbin Wang, Jingchun Chu, Qingru Cui, Runze Zhu, Yahui Cui, You Zhang, Zedong You
{"title":"Self-supervised pre-training in photovoltaic systems via supervisory control and data acquisition data","authors":"Dejun Wang,&nbsp;Zhenqing Duan,&nbsp;Wenbin Wang,&nbsp;Jingchun Chu,&nbsp;Qingru Cui,&nbsp;Runze Zhu,&nbsp;Yahui Cui,&nbsp;You Zhang,&nbsp;Zedong You","doi":"10.1049/cps2.12056","DOIUrl":"10.1049/cps2.12056","url":null,"abstract":"<p>Owing to the availability of sensor data, the operation and maintenance (O&amp;M) of sustainable energy systems have become more intelligent. In particular, data-driven approaches have gained growing interest in supporting intelligent O&amp;M. However, this is not a simple task, as the deficiency of labelled data poses a major challenge. This work proposes a self-supervised pre-training approach for autonomous learning of the Supervisory Control and Data Acquisition (SCADA) data representations for photovoltaic (PV) systems. Specifically, the proposed method first constructs the sample pairs using reasonable assumptions from a large volume of unlabelled SCADA data. Then, it designs a deep Siamese network to extract the representations of the input sample pair and sets the pretext task to measure whether the input pair is similar. The proposed method has been deployed in a PV system with nominal power 2.5 MW located in North China. Experimental results show that the proposed approach achieves accurate similarity assessment for the sample pairs and can potentially support downstream tasks regarding intelligent O&amp;M.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 4","pages":"272-279"},"PeriodicalIF":1.5,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12056","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91061760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variational mode decomposition enabled temporal convolutional network model for state of charge estimation 用于电荷状态估计的变分模式分解时间卷积网络模型
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-04-20 DOI: 10.1049/cps2.12053
Zhaocheng Zhang, Tao Cai, Aote Yuan
{"title":"Variational mode decomposition enabled temporal convolutional network model for state of charge estimation","authors":"Zhaocheng Zhang,&nbsp;Tao Cai,&nbsp;Aote Yuan","doi":"10.1049/cps2.12053","DOIUrl":"https://doi.org/10.1049/cps2.12053","url":null,"abstract":"<p>Due to the fast growth of electric vehicles (EVs) , estimation for Battery's State-of-charge (SOC) received significant research interests. The reason is that an accurate SOC estimation can significantly contribute to the reliability of EVs. A Variational Mode Decomposition (VMD) technique enabled Temporal Convolutional Network (TCN) model is proposed by the authors for SOC estimation. The proposed method first adopts time-frequency analysis techniques to decompose voltage values into different frequency domains, each of which is analysed with the VMD technique to obtain its features as the input for the TCN model. Then, the proposed method combines outputs of different frequency domains with an attention module as the final output of the TCN model. Experiments on real battery datasets indicate that the proposed method outperforms the existing methods by 7.2% in mean absolute error and 6.13% in root mean square error. In addition, the error between the estimated and actual values using the proposed method is bounded by 2%.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 3","pages":"195-204"},"PeriodicalIF":1.5,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50138636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discrete-time modelling methodology of networked control systems under packet delay and dropout 分组时延和丢包情况下网络控制系统的离散时间建模方法
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-04-20 DOI: 10.1049/cps2.12050
Kamran Mohajeri, Ali Madadi, Babak Tavassoli, Wan Rahiman
{"title":"Discrete-time modelling methodology of networked control systems under packet delay and dropout","authors":"Kamran Mohajeri,&nbsp;Ali Madadi,&nbsp;Babak Tavassoli,&nbsp;Wan Rahiman","doi":"10.1049/cps2.12050","DOIUrl":"https://doi.org/10.1049/cps2.12050","url":null,"abstract":"<p>Models and control techniques for networked control systems (NCSs) can be divided into continuous-time and discrete-time types. Unlike the continuous-time analysis, literature on discrete-time analysis and control of NCSs under packet delay and dropout shows a variety of different models. However, a systematic study of these models is absent in the literature. This article is a methodology for these models. Different factors involved in making this variety are discussed. The models are described and it is shown how they are different or related to each other. The models are from the existing literature. However, to complete the methodology some of the models are introduced by the authors. Furthermore, the concept of sequence matrix is introduced which helps to differentiate some models and should be considered when NCS is analysed as a switched linear system. This methodology can be used as a basis for selecting the suitable model in analysis and design of NCSs. Denial of service (DoS) attack and time delay switch (TDS) attack can be considered as packet dropout and packet delay respectively. Thus, this methodology can also be used in analysis and design of NCS under these cyber-physical attacks.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 3","pages":"131-148"},"PeriodicalIF":1.5,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50152576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space vector pulse width modulation strategy for modular multilevel converters in power system 电力系统中模块化多电平变换器的空间矢量脉宽调制策略
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-04-18 DOI: 10.1049/cps2.12052
Shengyang Lu, Yan Zhenhong, Xiong Yongsheng, Zhang Jianhao, Wang Tong, Zhu Yu, Sui Yuqiu, Yang Junyou, Li Zhang, Haixin Wang
{"title":"Space vector pulse width modulation strategy for modular multilevel converters in power system","authors":"Shengyang Lu,&nbsp;Yan Zhenhong,&nbsp;Xiong Yongsheng,&nbsp;Zhang Jianhao,&nbsp;Wang Tong,&nbsp;Zhu Yu,&nbsp;Sui Yuqiu,&nbsp;Yang Junyou,&nbsp;Li Zhang,&nbsp;Haixin Wang","doi":"10.1049/cps2.12052","DOIUrl":"https://doi.org/10.1049/cps2.12052","url":null,"abstract":"<p>As a superior modulation strategy, space vector pulse width modulation (SVPWM) provides redundant voltage vectors and adjustable action time, which can achieve multi-objective control of modular multilevel converter (MMC). An SVPWM strategy suitable for MMC is proposed. The strategy is divided into three stages. In the first stage, the appropriate voltage vector, the action time and the basic sub-module (SM) input number are quickly calculated to ensure the output quality by equating MMC as a 2-level inverter. In the second stage, a finite set of the circulating current suppression is established on the basis of the basic SM input number. The optimal SM input number is selected through rolling optimisation. In the last stage, according to the SM voltage sorting and the optimal SM input number, the optimal switching state is determined to realise the SM voltage balance control. The proposed control strategy simplifies the design of the control system, reduces the computational burden and can be easily extended to MMC with any SM number. The simulation and experimental results show that the proposed SVPWM strategy can reduce the circulating current and balance the SM capacitor voltage while ensuring the output quality.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 3","pages":"186-194"},"PeriodicalIF":1.5,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12052","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50145302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring adversarial behaviour in cyber-physical power systems using a Bayesian attack graph approach 使用贝叶斯攻击图方法推断网络物理电力系统中的对抗行为
IF 1.5
IET Cyber-Physical Systems: Theory and Applications Pub Date : 2023-02-11 DOI: 10.1049/cps2.12047
Abhijeet Sahu, Katherine Davis
{"title":"Inferring adversarial behaviour in cyber-physical power systems using a Bayesian attack graph approach","authors":"Abhijeet Sahu,&nbsp;Katherine Davis","doi":"10.1049/cps2.12047","DOIUrl":"https://doi.org/10.1049/cps2.12047","url":null,"abstract":"<p>Highly connected smart power systems are subject to increasing vulnerabilities and adversarial threats. Defenders need to proactively identify and defend new high-risk access paths of cyber intruders that target grid resilience. However, cyber-physical risk analysis and defense in power systems often requires making assumptions on adversary behaviour, and these assumptions can be wrong. Thus, this work examines the problem of inferring adversary behaviour in power systems to improve risk-based defense and detection. To achieve this, a Bayesian approach for inference of the Cyber-Adversarial Power System (Bayes-CAPS) is proposed that uses Bayesian networks (BNs) to define and solve the inference problem of adversarial movement in the grid infrastructure towards targets of physical impact. Specifically, BNs are used to compute conditional probabilities to queries, such as the probability of observing an event given a set of alerts. Bayes-CAPS builds initial Bayesian attack graphs for realistic power system cyber-physical models. These models are adaptable using collected data from the system under study. Then, Bayes-CAPS computes the posterior probabilities of the occurrence of a security breach event in power systems. Experiments are conducted that evaluate algorithms based on time complexity, accuracy and impact of evidence for different scales and densities of network. The performance is evaluated and compared for five realistic cyber-physical power system models of increasing size and complexities ranging from 8 to 300 substations based on computation and accuracy impacts.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"8 2","pages":"91-108"},"PeriodicalIF":1.5,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12047","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50128539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信