Please use this identifier to cite or link to this item:
http://localhost:8081/jspui/handle/123456789/19933Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Upadhyay, Neeraj | - |
| dc.date.accessioned | 2026-03-24T12:23:08Z | - |
| dc.date.available | 2026-03-24T12:23:08Z | - |
| dc.date.issued | 2022-11 | - |
| dc.identifier.uri | http://localhost:8081/jspui/handle/123456789/19933 | - |
| dc.guide | Gupta, C.P. | en_US |
| dc.description.abstract | The iivulnerability iito iiPower iiGrid iinetwork iiframework iito iicyber-attacks iihas iialtogether iiup iibecauseiiofiiaiihigher iilevel iiofiiinterconnectioniiofiitheiigridiiandiinetworkiimodality. iitheiiquantity iiandiiintricacyiiofiithoseiiattacksiioniipower iisystemsiiiniioperationiifunctionsiii.e. iiStateiiEstimation ii(SE), iiand iialternative iiEnergy iiManagement iiSystemiinetwork iiare iiincessantly iiincreasing iiday iibyiiday. iiTheiipower iisystemiioperational iiinfrastructureiiis iiturningiiintoiiprogressivelyiidatabase-centrical. iiwhereas iithe iibounty iiof iiknowledge iimight iiimprove iisystem iicapability, iiit iiposes iia iiconsiderably iilarger iichallenge. iiIn iiparticular, iistate iiestimation iiaims iito iiseek iiout iithe iiin-operation iistate iiof iia iinetwork iifrom iithe iimeasured iidata, iihowever, iian iiassociate iidegree iiundiscovered iicyber-attack iion iithe iiinformation iicould iilead iito iicreating iifaulty iioperational iiselectionsiitherebyiitriggeringiianiioversizediiscale iiblackout. For iia iilarge-scale iipower iisystem, iiweiihave iia iitendency iito iifigure, iiinvestigate, iiand iipicture iithe iiregions iiof iithe iinetwork iithat iiaren't iiforeseeable iito iithose iiattacks iiwithin iithe iisense iithat iithere iiexistsiianiiinformationiistrategiciimaniimaneuver iieveryiioneiiofiitheseiiregionsiithat iimisguidesiithe iioperators iiat iithe iiworldwide iiscale iiand iiyields iia iithus iireferred iito iias iifaulty iiestimation iiof iithe iistateiiat iiadditional iioriilessiiall iitheiibuses. iiInformationiirelatingiito iitheseiiattacksii(cyber-attacks) iion iithe iiIndian iifacility iishows iithat iia iilot iiof iicontagions iiwere iidesignedly iideveloped iito iistrike iithese iiindustrial iinetwork iifacilities, iiwith iigrid iijointly iiof iithe iikey iiprey. iiThe iiattackers iionce iihave iiaccess iito iithe iigrid iimanagement iisystem, iitheniithese iiattacks iimight iipresumably iiactivate iitheiioutagesiitherebyiiinflictingiioversizediiscaleiilossesii(loadiiloss). iiThus, iitherefore, iisuchiicyber iithreatsiiareiithought iiabout iiandiistudiediitotallyiibyiitheiiPOSOCOiisinceii2012. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | IIT, Roorkee | en_US |
| dc.title | CYBER-ATTACKSii iiAGAINSTii iiPOWERii iiSYSTEMii iiSTATEii iiESTIMATION | en_US |
| dc.type | Dissertations | en_US |
| Appears in Collections: | MASTERS' THESES (Electrical Engg) | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 20529007_Neeraj Upadhyay.pdf | 3.67 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
