no code implementations • 21 Apr 2023 • Gal Morgenstern, Jip Kim, James Anderson, Gil Zussman, Tirza Routtenberg
We present the GFDI attack as the solution for a non-convex constrained optimization problem.
no code implementations • 19 Mar 2020 • Gal Morgenstern, Tirza Routtenberg
In this paper, we develop novel structural-constrained methods for the detection of unobservable FDI attacks, the identification of the attacked buses' locations, and PSSE under the presence of such attacks.