Strengthening of Power Grid Protection Systems Against Cyber-Attacks: A Comprehensive Review
Zahra Pourahmad
1
(
Electrical Engineering Dept. University of Isfahan, Isfahan, Iran
)
R. Hooshmand
2
(
)
S. Mohammad Madani
3
(
Electrical Engineering Dept., University of Isfahan, Isfahan, Iran
)
Keywords: Cyber-attack, resilience, power network, protection system, relay.,
Abstract :
Protective systems constitute the most vital defensive element of power networks against unusual conditions. Therefore, any malfunction caused by cyber-attacks may cause huge consequences for power networks such as widespread blackouts. Among the most critical protective systems vulnerable to cyber intrusions are generator protection, transmission lines, and transformers. Cyber sabotages can be mitigated through strategic proceedings to reduce their impact on the network. This paper provides a comprehensive review of the methods of strengthening the protection system against cyber-attacks, given the importance of power network protection systems. For this purpose, in the first step, protection-based methods for strengthening the power network against cyber-attacks are presented. Then, in the second step, detection-based methods are described to reveal a possible cyber-attack. Since there is no definite guarantee against cyber intrusions, it is possible to prevent the progress of the attack by using attack detection methods. To this end, two types of data-based and model-based algorithms are utilized. In data-based algorithms, network knowledge and information can be optimally used to detect the conditions of cyber-attack compared to the conditions without cyber-attack. In model-based algorithms, parameters of the network are estimated by executing state estimation algorithms based on system relations. Then, data manipulation and cyber intrusions are detected despite the discrepancy between the estimated values and the measured values. Consequently, the use of defense and detection methods to deal with cyber intrusion leads to an increase in the cyber security of the power grid protection system. In this regard, it is very important to use various defense and detection algorithms in combating cyber-attacks.
[1] Y. Xiang, Z. Ding, Y. Zhang, and L. Wang, "Power system reliability evaluation considering load redistribution attacks," IEEE Trans. on Smart Grid, vol. 8, no. 2, pp. 889-901, Mar. 2017.
[2] Y. Xiang and L. Wang, "A game-theoretic study of load redistribution attack and defense in power systems," Electric Power Systems Research, vol. 151, pp. 12-25, Oct. 2017.
[3] N. Rajeswaran, et al., "A study on cyber-physical system architecture for smart grids and its cyber vulnerability," In: H. Haes Alhelou, N., Hatziargyriou, and Z. Y. Dong (eds) Power Systems Cybersecurity. Power Systems Power Systems Cybersecurity, pp. 413-427, Springer, 2023.
[4] J. Sakhnini, H. Karimipour, A. Dehghantanha, R. M. Parizim, and G. Srivastava, "Security aspects of Internet of Things aided smart grids: a bibliometric survey," Internet of Things, vol. 14, Article ID: 100111, Jun. 2021.
[5] S. Riahinia, A. Ameli, M. Ghafouri, and A. Yassine, "Cyber-security of protection system in power grids-part 1: vulnerabilities and counter-measures," In: H. Haes Alhelou, N., Hatziargyriou, and Z. Y. Dong (eds) Power Systems Cybersecurity. Power Systems Power Systems Cybersecurity, pp. 203-237, Springer, 2023.
[6] A. Hassan, et al., "A survey and bibliometric analysis of different communication technologies available for smart meters," Cleaner Engineering and Technology, vol. 7, Article ID: 100424, Apr. 2022.
[7] J. Jarmakiewicz, K. Parobczak, and K. Maślanka, "Cybersecurity protection for power grid control infrastructures," International J. of Critical Infrastructure Protection, vol. 18, pp. 20-33, Sept. 2017.
[8] GE Power Management, Relay Selection Guide, 40 pp., https://www.gegridsol utions.com/multilin/notes/get-8048a.pdf
[9] K. Islam, D. Kim, and A. Abu-Siada, "A review on adaptive power system protection schemes for future smart and micro grids, challenges and opportunities," Electric Power Systems Research, vol. 230, Article ID: 110241, May 2024.
[10] Y. M. Khaw, et al., "Preventing false tripping cyberattacks against distance relays: a deep learning approach," in Proc. IEEE Int. Conf. on Communications, Control, and Computing Technologies for Smart Grids, 6 pp., Beijing, China, 21-23 Oct. 2019.
[11] T. A. Abd Almuhsen and A. J. Sultan, "Coordination of directional overcurrent, distance, and breaker failure relays using genetic algorithm including pilot protection," in Proc. IOP Conf. Series: Materials Science and Engineering, vol. 1105, 14 pp., Baghdad, Iraq, 21-22 Dec. 2021.
[12] M. Zare Jahromi, A. Abiri Jahromi, S. Sanner, D. Kundur, and M. Kassouf, "Cybersecurity enhancement of transformer differential protection using machine learning," IEEE Power & Energy Society General Meeting, 5 pp., Montreal, Canada, 2-6 Aug. 2020.
[13] J. Olijnyk, B. Bond, and J. Rrushi, "Design and emulation of physics-centric cyberattacks on an electrical power transformer," IEEE Access, vol. 10, pp. 15227-15246, 2022.
[14] EN IEC 60255-187-1: 2021.
[15] A. Ayad, E. F. El-Saadany, M. M. A. Salama, and A. Youssef, "A learning-based framework for detecting cyber-attacks against line current differential relays," IEEE Trans. on Power Delivery, vol. 36, no. 4, pp. 2274-2286, Aug. 2020.
[16] A. M. Saber, A. Youssef, D. Svetinovic, H. H. Zeineldin, E. F. El-Saadany, "Anomaly-based detection of cyberattacks on line current differential relays," IEEE Trans. on Smart Grid, vol. 13, no. 6, pp. 4787-4800, Nov. 2022.
[17] ] A.A. Bouramdane. "Cyberattacks in smart grids: challenges and solving the multi-criteria decision-making for cybersecurity options, including ones that incorporate artificial intelligence, using an analytical hierarchy process," Journal of Cybersecurity and Privacy, vol. 3, no. 4, pp. 662–705, 2023.
[18] R. Nuqui, J. Hong, A. Kondabathini, D. Ishchenko, and D. Coats, "A collaborative defense for securing protective relay settings in electrical cyber physical systems," in Proc. 2018 Resilience Week, pp. 49-54, Denver, CO, USA, 20-23 Aug. 2018.
[19] M. Zare Jahromi, A. Abiri Jahromi, S. Sanner, D. Kundur, and M. Kassouf, "Cybersecurity enhancement of transformer differential protection using machine learning," IEEE Power & Energy Society General Meeting, 5 pp., Montreal, Canada, 2-6 Aug. 2020.
[20] A. Ameli, A. Hooshyar, E. F. El-Saadany, and A. M. Youssef, "An intrusion detection method for line current differential relays," IEEE Trans. on Information Forensics and Security, vol. 15, pp. 329-344, 2019.
[21] M. Ganjkhani, M. M. Hosseini, and M. Parvania, "Optimal defensive strategy for power distribution systems against relay setting attacks," IEEE Trans. on Power Delivery, vol. 38, no. 3, pp. 1499-1509, Jun. 2023.
[22] V. S. Rajkumar, et al., "Cyber attacks on power system automation and protection and impact analysis," in Proc. IEEE PES Innovative Smart Grid Technologies Europe, pp. 247-254, Hague, The Netherlands, 26-28 Oct. 2020.
[23] J. Wurm, K. Hoang, O. Arias, A. R. Sadeghi, and Y. Jin, "Security analysis on consumer and industrial IoT devices," in Proc. IEEE 21st Asia South Pacific Des. Automat. Conf., pp. 519-524, Macao, China, 25-28 Jan. 2016.
[24] C. W. Johnson, M. H. Saleem, M. Evangelopoulou, M. Cook, R. Harkness, and T. Barker, "Defending against firmware cyber attacks on safety-critical systems," J. Syst. Saf., vol. 54, no. 1, pp. 16-21, Spring 2018.
[25] D. Formby, S. S. Jung, S. Walters, and R. Beyah, "A physical overlay framework for insider threat mitigation of power system devices," in Proc. IEEE Int. Conf. on Smart Grid Communications, pp. 970-975, Venice, Italy, 3-6 Nov. 2014.
[26] A. Chattopadhyay, A. Ukil, D. Jap, and S. Bhasin, "Toward threat of implementation attacks on substation security: case study on fault detection and isolation," IEEE Trans. Ind. Inform., vol. 14, no. 6, pp. 2442-2451, Jun. 2018.
[27] T. E. McDermott, J. D. Doty, J. G. O’Brien, C. R. Eppinger, and T. Becejac, Cybersecurity for Distance Relay Protection, No. PNNL-29663. Pacific Northwest National Lab., Richland, WA, USA, 2020.
[28] A. K. Maurya, P. Singhaal, and H. K. Pathak, "Analysis of cyber security attacks on power system networks and its protection schemes," in Proc. 4th Int. Conf. on Advances in Electrical, Computing, Communication and Sustainable Technologies, 6 pp., Bhilai, India, 11-12 Jan. 2024.
[29] F. Peng, et al., "Power differential protection for transformer based on fault component network," IEEE Trans. on Power Delivery, vol. 38, no. 4, pp. 2464-2477, Aug. 2023.
[30] D. Yang, Y. Zhang, X. An, and Y. Hou, "Analysis of relay protection fault propagation mechanism and attack detection method under cyber attack," in Proc. 3rd Int. Conf. on Electronic Information Engineering and Computer Communication, 5 pp., Wuhan, China, 22-24 2023.
[31] Z. Q. Bo, X. N. Lin, Q. P. Wang, Y. H. Yi, and F. Q. Zhou, "Developments of power system protection and control," Protection and Control of Modern Power Systems, vol. 1, Article ID: 7, 2016.
[32] Y. M. Khaw, et al., "A deep learning-based cyberattack detection system for transmission protective relays," IEEE Trans. on Smart Grid, vol. 12, no. 3, pp. 2554-2565, May 2020.
[33] L. Yu, X. M. Sun, and T. Sui, "False-data injection attack in electricity generation system subject to actuator saturation: analysis and design," IEEE Trans. on Systems, Man, and Cybernetics: Systems, vol. 49, no. 8, pp. 1712-1719, Aug. 2019.
[34] L. Zeng, et al., "Resilience assessment for power systems under sequential attacks using double DQN with improved prioritized experience replay," IEEE Systems J., vol. 17, no. 2, pp. 1865-1876, Jun. 2022.
[35] S. D. Roy and S. Debbarma, "Detection and mitigation of cyber-attacks on AGC systems of low inertia power grid," IEEE Systems J., vol. 14, no. 2, pp. 2023-2031, Jun. 2019.
[36] A. Ameli, A. Hooshyar, E. F. El-Saadany, and A. M. Youssef, "Attack detection and identification for automatic generation control systems," IEEE Trans. on Power Systems, vol. 33, no. 5, pp. 4760-4774, Sept. 2018.
[37] A. S. L. V. Tummala and R. K. Inapakurthi, "A two-stage Kalman filter for cyber-attack detection in automatic generation control system," J. of Modern Power Systems and Clean Energy, vol. 10, no. 1, pp. 50-59, Jan. 2021.
[38] Z. Qu, et al., "Detection of false data injection attack in AGC system based on random forest," Machines, vol. 11, no. 1, Article ID: 83, Jan. 2023.
[39] S. Alhalali, N. Christopher, and R. El-Shatshat, "Mitigation of cyber-physical attacks in multi-area automatic generation control," International J. of Electrical Power & Energy Systems, vol. 112, pp. 362-369, Nov. 2019.
[40] S. Sarangan, V. K. Singh, and M. Govindarasu, "Cyber attack-defense analysis for automatic generation control with renewable energy sources," in Proc. North American Power, 6 pp., Fargo, ND, USA, 9-11 Sept. 2018.
[41] T. Huang, B. Satchidanandan, P. R. Kumar, and L. Xie, "An online detection framework for cyber attacks on automatic generation control," IEEE Trans. on Power Systems, vol. 33, no. 6, pp. 6816-6827, Nov. 2018.
[42] Z. Amiri, et al., "Adventures in data analysis: a systematic review of deep learning techniques for pattern recognition in cyber-physical-social systems," Multimedia Tools and Applications, vol. 83, pp. 22909-22973, 2024.
[43] T. Behdadnia and G. Deconinck, Anomaly Detection in Automatic Generation Control Systems Based on Traffic Pattern Analysis and Deep Transfer Learning, arXiv preprint arXiv: 2209.08099, 2022.
[44] A. Ameli, A. Hooshyar, and E. F. El-Saadany, "Development of a cyber-resilient line current differential relay," IEEE Trans. on Industrial Informatics, vol. 15, no. 1, pp. 305-318, Jan. 2018.
[45] V. S. Rajkumar, A. Stefanov, A. Presekal, P. Palensky, and J. L. R. Torres, "Cyber attacks on power grids: causes and propagation of cascading failures," IEEE Access, vol. 11, pp. 103154-103176, 2023.
[46] A. Khaleghi, M. S. Ghazizadeh, and M. R. Aghamohammadi, "A deep learning-based attack detection mechanism against potential cascading failure induced by load redistribution attacks," IEEE Trans. on Smart Grid, vol. 14, no. 6, pp. 4772-4783, Nov. 2023.
[47] A. Ameli, et al., "Vulnerabilities of line current differential relays to cyber-attacks," in Proc. IEEE Power & Energy Society Innovative Smart Grid Technologies Conf., 5 pp., Washington, DC, USA, 18-21 Feb. 2019.
[48] A. Ameli, A. Hooshyar, and E. F. El-Saadany, "Development of a cyber-resilient line current differential relay," IEEE Trans. on Industrial Informatics, vol. 15, no. 1, pp. 305-318, Jan. 2019.
[49] L. Chen, et al., "Remedial pilot main protection scheme for transmission line independent of data synchronism," IEEE Trans. on Smart Grid, vol. 10, no. 1, pp. 681-690, Jan. 2019.
[50] L. I. U. Raanaa, Condition Monitoring of Power Transformers in Digital Substations, MS Thesis, NTNU, 2020.
[51] H. Rahimpour, et al., Cybersecurity Challenges of Power Transformers, arXiv preprint arXiv: 2302.13161, 2023.
[52] D. B. Unsal, T. S. Ustun, S. M. S. Hussain, and A. Onen, "Enhancing cybersecurity in smart grids: false data injection and its mitigation," Energies, vol. 14, no. 9, Article ID: 2657, May-1 2021.
[53] Y. Wang and J. P. Hespanha, "Distributed estimation of power system oscillation modes under attacks on GPS clocks," IEEE Trans. on Instrumentation and Measurement, vol. 67, no. 7, pp. 1626-1637, Jul. 2018.
[54] E. Shereen, et al., "Feasibility of time-synchronization attacks against PMU-based state estimation," IEEE Trans. on Instrumentation and Measurement, vol. 69, no. 6, pp. 3412-3427, Jun. 2019.
[55] K. D. Lu and Z. G. Wu, "Genetic algorithm-based cumulative sum method for jamming attack detection of cyber-physical power systems," IEEE Trans. on Instrumentation and Measurement, vol. 71, Article ID: 9004810, 10 pp., 2022.
[56] P. Top, et al., "Simulation of a RTU cyber attack on a transformer bank," in Proc. IEEE Power & Energy Society General Meeting, 5 pp., Chicago, IL, USA, 16-20 Jul. 2017.
[57] C. Avci, B. Tekinerdogan, and C. Catal. "Design tactics for tailoring transformer architectures to cybersecurity challenges," Cluster Computing, vol. 27, pp. 9587-9613, 2024.
[58] United States Senate Republican Policy Committee, Infrastructure Cybersecurity: The US Electric Grid, 2021.
[59] J. Olijnyk, B. Bond, and J. Rrushi, "Design and emulation of physics-centric cyberattacks on an electrical power transformer," IEEE Access, vol. 10, pp. 15227-15246, 2022.
[60] S. Hasheminejad. "A new protection method for the power transformers using Teager energy operator and a fluctuation identifier index," Electric Power Systems Research, vol. 213, Article ID: 108776, Dec. 2022.
[61] A. Klien, Y. Gosteli, and S. Mattmann, "Design and commissioning of a secure substation network architecture," in Proc. 15th Int. Conf. on Developments in Power System Protection, 5 pp., Liverpool, UK, 9-12 Mar. 2020.
[62] B. Ahn, et al., "Security threat modeling for power transformers in cyber-physical environments," in Proc. IEEE Power & Energy Society Innovative Smart Grid Technologies Conf., 5 pp., Washington, DC, USA, 16-18 Feb. 2021.
[63] S. Chakrabarty and B. Sikdar, "Detection of hidden transformer tap change command attacks in transmission networks," IEEE Trans. on Smart Grid, vol. 11, no. 6, pp. 5161-5173, Nov. 2020.
[64] A. S. Musleh, G. Chen, and Z. Y. Dong, "A survey on the detection algorithms for false data injection attacks in smart grids," IEEE Trans. on Smart Grid, vol. 11, no. 3, pp. 2218-2234, May 2020.
[65] L. Xu, L. Xiaoyi, and Y. Sun, "Detection of false data injection attacks in smart grid based on machine learning," In Advances in Artificial Intelligence and Security: 7th Int. Conf., ICAIS 2021, Dublin, Ireland, Jul. 2021, Proc. Part III 7, Springer, 2021.
[66] J. Q. Ruan, et al., "AC sparse modeling for false data injection attack on smart gird," in Proc. Asian Conf. on Energy, Power and Transportation Electrification, 5 pp., Singapore, 24-26 Oct. 2017.
[67] C. Liu, H. Liang, T. Chen, J. Wu and C. Long, "Joint admittance perturbation and meter protection for mitigating stealthy FDI attacks against power system state estimation," IEEE Trans. on Power Systems, vol. 35, no. 2, pp. 1468-1478, Mar. 2020.
[68] M. Z. Jahromi, et al., "Data analytics for cybersecurity enhancement of transformer protection," ACM SIGEnergy Energy Informatics Review, vol. 1, no. 1, pp. 12-19, Nov. 2021.
[69] S. Chakrabarty and B. Sikdar, "Detection of malicious command injection attacks on phase shifter control in smart grids," IEEE Trans. on Power Systems, vol. 36, no. 1, pp. 271-280, Jan. 2021.
[70] H. Karimipour, et al., "A deep and scalable unsupervised machine learning system for cyber-attack detection in large-scale smart grids," IEEE Access, vol. 7, pp. 80778-80788, 2019.
[71] W. Sattinger, Critical Infrastructure Cyber Security: Applications of Machine Learning and Artificial Intelligence in Detecting, Responding, to and Containing Threats, CIGRETech. Rep., Ref D2-210_2020, 2020.
[72] N. Tatipatri and S. L. Arun, "A comprehensive review on cyber-attacks in power systems: impact analysis, detection and cyber security," IEEE Access, vol. 12, pp. 18147-18167, 2024.
[73] V. Dave and A. Sharma, "Operation of differential relay for power transformer using support vector machine," in Proc. IEEE/PES Transmission and Distribution Conf. and Exposition. 6 pp., Chicago, IL, USA, 21-24 Apr. 2008.
[74] A. Clark and S. Zonouz, "Cyber-physical resilience: definition and assessment metric," IEEE Trans. Smart Grid, vol. 10, no. 2, pp. 1671-1684, Mar. 2019.
[75] M. Rajaee and K. Mazlumi, "Multi-agent distributed deep learning algorithm to detect cyber-attacks in distance relays," IEEE Access, vol. 11, pp. 10842-10849, 2023.
[76] Z. Pourahmad, R. A. Hooshmand, and M. Ataei. "Optimal placement of PMU and PDC in power systems by considering the vulnerabilities against cyber-attacks," Electrical Engineering, vol. 106, no. 1, pp. 93-109, 2024.
[77] Z. Pourahmad and R. A. Hooshmand, "Smart grid protection against cyber-attacks using PMUs and DC system model," in Proc. 13th Smart Grid Conf., 8 pp., Tehran, Iran, 5-6 Dec. 2023.
[78] A. Moradi and S. M. Madani, "Technique for inrush current modelling of power transformers based on core saturation analysis," IET Generation, Transmission & Distribution, vol. 12, no. 10, pp. 2317-2324, May 2018.
[79] S. W. Kim, "Detection and mitigation of false data injection in cooperative communications," in Proc. IEEE 16th Int. Workshop on Signal Processing Advances in Wireless Communications, pp. 321-325, Stockholm, Sweden, 28 Jun.-1 Jul. 2015.
[80] J. K. Narang and B. Bag, "Replay attack detection in overcurrent relays using mathematical morphology and LSTM autoencoder," in Proc. IEEE Int. Conf. on Advanced Networks and Telecommunications Systems, 6 pp., Gandhinagar, India, 18-21 Dec. 2022.
[81] L. Wang, et al., "Power electronic attack targeting relay protection and corresponding detection method," in Proc. IEEE 3rd Int. Conf. on Circuits and Systems, pp. 203-206, Chengdu, China, 29-31 Oct. 2021.
[82] A. Aflaki, H. Karimipour, and A. N. Jahromi, "A GAN-based false data injection and civil attack detection framework for digital relays with feature selection," in Proc. IEEE Int. Conf. on Systems, Man, and Cybernetics, pp. 5027-5033, Honolulu, Oahu, HI, USA, 1-4 Oct. 2023.
[83] J. Mo and H. Yang, "Sampled value attack detection for busbar differential protection based on a negative selection immune system," J. of Modern Power Systems and Clean Energy, vol. 11, no. 2, pp. 421-433, Mar. 2022.
[84] M. Hamzeh, B. Vahidi, and A. Foroughi Nematollahi, "Optimizing configuration of cyber network considering graph theory structure and teaching-learning-based optimization (GT-TLBO)," IEEE Trans. on Industrial Informatics, vol. 15, no. 4, pp. 2083-2090, Apr. 2018.
[85] M. Ismail, M. F. Shaaban, M. Naidu and E. Serpedin, "Deep learning detection of electricity theft cyber-attacks in renewable distributed generation," IEEE Trans. on Smart Grid, vol. 11, no. 4, pp. 3428-3437, Jul. 2020.
[86] R. Nuqui, J. Hong, A. Kondabathini, D. Ishchenko, and D. Coats, "A collaborative defense for securing protective relay settings in electrical cyber physical systems," in Proc. Resilience Week, pp. 49-54, Denver, CO, USA, 20-23 Aug. 2018.
[87] M. Chougule, G. Gajjar, and S. A. Soman, "PMU supervised secure backup protection of distance relays," in Proc. IEEE PES Innovative Smart Grid Technologies Europe, 5 pp., Bucharest, Romania, 29 Sept.-2 Oct. 2019.
[88] A. M. Saber, A. Youssef, D. Svetinovic, H. H. Zeineldin, and E. F. El-Saadany, "Cyber-immune line current differential relays," IEEE Trans. on Industrial Informatics, vol. 20, no. 3, pp. 3597-3608, Mar. 2024.
[89] E. Ali, et al., "Power transformer differential protection using current and voltage ratios," Electric Power Systems Research, vol. 154, pp. 140-150, Jan. 2018.
[90] P. Zhao, et al. "Cyber-resilience enhancement and protection for uneconomic power dispatch under cyber-attacks," IEEE Trans. on Power Delivery, vol. 36, no. 4, pp. 2253-2263, Aug. 2020.
[91] D. P. Chinta, et al. "Cyber resilient differential protection scheme for transmission lines," in Proc. 2023 IEEE 3rd. Int. Conf. on Smart Technologies for Power, Energy and Control, 4 pp., Bhubaneswar, India, 10-13 Dec. 2023.
[92] S. Shafiulla and M. K. Jena, "Dynamic state estimation based cyber attack detection scheme to supervise distance relay operation in transmission line," in Proc. IEEE Int. Conf. on Power Electronics, Smart Grid, and Renewable Energy, 6 pp., Trivandrum, India, 17-20 Dec. 2023.
[93] H. Margossian, R. Kfouri, and R. Saliba, "Measurement protection to prevent cyber-physical attacks against power system state estimation," International J. of Critical Infrastructure Protection, vol. 43, Article ID: 100643, Dec. 2023.
[94] A. Kemmeugne, A. A. Jahromi, and D. Kundur, "Resilience enhancement of pilot protection in power systems," IEEE Trans. on Power Delivery, vol. 37, no. 6, pp. 5255-5266, Dec. 2022.
[95] S. Pola, M. Jovanovic, M. A. Azzouz, and M. Mirhassani, "Cyber resiliency enhancement of overcurrent relays in distribution systems," IEEE Trans. on Smart Grid, vol. 15, no. 4, pp. 4063-4076, Jul. 2023.
[96] Y. Joo, Z. Qu, and T. Namerikawa, "Resilient control of cyber-physical system using nonlinear encoding signal against system integrity attacks," IEEE Trans. on Automatic Control, vol. 66, no. 9, pp. 4334-4341, Sept. 2020.
[97] G. Chen, Y. Zhang, S. Gu and W. Hu, "Resilient state estimation and control of cyber-physical systems against false data injection attacks on both actuator and sensors," IEEE Trans. on Control of Network Systems, vol. 9, no. 1, pp. 500-510, Mar. 2021.
[98] S. Liu, et al., "Adaptive resilient output feedback control against unknown deception attacks for nonlinear cyber-physical systems," IEEE Trans. on Circuits and Systems II: Express Briefs, vol. 71, no. 8, pp. 3855-3859, Aug. 2024.
[99] W. Zhang, S. Mao, J. Huang, L. Kocarev, and Y. Tang, "Data-driven resilient control for linear discrete-time multi-agent networks under unconfined cyber-attacks," IEEE Trans. on Circuits and Systems I: Regular Papers, vol. 68, no. 2, pp. 776-785, Feb. 2020.
[100] S. Hu, X. Chen, J. Li and X. Xie, "Observer-based resilient controller design for networked stochastic systems under coordinated DoS and FDI attacks," IEEE Trans. on Control of Network Systems, vol. 11, no. 2, pp. 890-901, Jun. 2024.
[101] Z. Liu and L. Wang, "A distributionally robust defender-attacker-defender model for resilience enhancement of power systems against malicious cyberattacks," IEEE Trans. on Power Systems, vol. 38, no. 6, pp. 4986-4997, Nov. 2022.