Search Results for author: Gal Morgenstern

Found 2 papers, 0 papers with code

Protection Against Graph-Based False Data Injection Attacks on Power Systems

no code implementations21 Apr 2023 Gal Morgenstern, Jip Kim, James Anderson, Gil Zussman, Tirza Routtenberg

We present the GFDI attack as the solution for a non-convex constrained optimization problem.

Structural-constrained Methods for the Identification of Unobservable False Data Injection Attacks in Power Systems

no code implementations19 Mar 2020 Gal Morgenstern, Tirza Routtenberg

In this paper, we develop novel structural-constrained methods for the detection of unobservable FDI attacks, the identification of the attacked buses' locations, and PSSE under the presence of such attacks.

Model Selection

Cannot find the paper you are looking for? You can Submit a new open access paper.