Attacks and Malicious code AWS/WIS Dr. Moutasem Shafa’amry 1 Lecture 8.
On Malicious Data Attacks on Power System State Estimation
17
-
Upload
faizan-ali -
Category
Engineering
-
view
32 -
download
3
Transcript of On Malicious Data Attacks on Power System State Estimation
•
• 𝑎 = 𝐻𝑐 𝑐
• 𝑎
•
• 𝑁(𝜇𝑥, ∑𝑥
• 𝑎 = 0 𝑧, 𝑥 ∈ 𝑁(𝜇(𝑥,𝑧), ∑(𝑥,𝑧)
휀0 = 𝑚𝑖𝑛𝑥 𝐸 𝑥 − 𝑥 𝑧2
= 𝑇𝑟 (∑𝑥 − 𝐾𝑥𝐻∑𝑥)
• ⇒ •
•
𝐻0 ∶ 𝑧 ~ 𝑁(0, ∑𝑧)
𝐻1 ∶ 𝑧 ~ 𝑁 𝑎, ∑𝑧 , 𝑎 ∈ 𝐴𝑘 \ *0+
∑𝑧 ≜ 𝐻∑𝑥𝐻𝑇 + ∑𝑒
𝐿 𝑧 ≜𝑚𝑎𝑥𝑎∈𝐴𝑘
𝑓 𝑧 𝑎
𝑓 𝑧 𝑎 = 0
𝐿 𝑧 > 𝜏 ⇒ 𝐻1 𝐿 𝑧 < 𝜏 ⇒ 𝐻0