Опубликована: Дек. 8, 2023
Язык: Английский
Опубликована: Дек. 8, 2023
Язык: Английский
Applied Energy, Год журнала: 2025, Номер 383, С. 125317 - 125317
Опубликована: Янв. 14, 2025
Язык: Английский
Процитировано
3Energy, Год журнала: 2024, Номер 309, С. 133081 - 133081
Опубликована: Сен. 4, 2024
Язык: Английский
Процитировано
10Journal of Energy Storage, Год журнала: 2023, Номер 72, С. 108808 - 108808
Опубликована: Авг. 31, 2023
Язык: Английский
Процитировано
20Journal of Energy Storage, Год журнала: 2024, Номер 99, С. 112835 - 112835
Опубликована: Авг. 10, 2024
Язык: Английский
Процитировано
6Journal of Energy Storage, Год журнала: 2025, Номер 111, С. 115342 - 115342
Опубликована: Янв. 15, 2025
Язык: Английский
Процитировано
0Опубликована: Янв. 1, 2025
Язык: Английский
Процитировано
0Опубликована: Фев. 19, 2024
Язык: Английский
Процитировано
2e-Prime - Advances in Electrical Engineering Electronics and Energy, Год журнала: 2024, Номер 7, С. 100464 - 100464
Опубликована: Фев. 11, 2024
In this paper the new effective approaches for detecting and mitigating important cyber-attacks occurred in an AC microgrid (ACMG) renewable energy, including false data injection attack (FDIA), hijack (HjA) denial of service (DoS) are proposed. These methods applied inner loops current control rotor side converter (RSC) doubly fed induction generators (DFIGs) with marine turbines (MCTs). The goal is to enhance power management consequently, energy system against weak grid connected standalone operation modes. proposed method based on correcting smoothing reference voltage profiles d q axes sending pulse width modulation (PWM) commands RSC by occurring attacks a multi machine ACMG test simulated via MATLAB. obtained results various scenarios verified performance presented contribute cyber security ACMGs.
Язык: Английский
Процитировано
1Опубликована: Янв. 1, 2024
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
Язык: Английский
Процитировано
0Опубликована: Янв. 1, 2024
Cloud-controller-based electric vehicle supply equipment (EVSE) is becoming a necessity to effectively charge vehicles (EVs) while maintaining grid stability. This controller's effectiveness relies heavily on receiving accurate sensor measurements from the EV's Li-ion battery and sending precise charging actuation commands EVSE. However, an adversary can corrupt these signals as they are transmitted via communication networks. motivates our research detect cyberattacks both signal measurements, well isolate or distinguish between them. While problem of attack isolation based system model measurement generally ill-posed, it crucial for dispatching appropriate remedial measures following detection. Thus, we propose model-free Koopman operator-based cyberattack detection-isolation algorithm diagnostic residual generation. Our proposed utilizes voltage temperature reliably generate real-time flags using cell-level information limited module-level packs. We employ Python Battery Mathematical Modeling (PyBaMM) package realistic scenarios demonstrate performance individual cells large-format
Язык: Английский
Процитировано
0