期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Dynamic attack zone of air-to-air missile after being launched in random wind field 被引量:22
1
作者 Hui Yaoluo Nan Ying +2 位作者 Chen Shaodong Ding Quanxin Wu Shengliang 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第5期1519-1528,共10页
A new concept is presented for air-to-air missile which is dynamic attack zone after being launched in random wind field. This new concept can be used to obtain the 4-dimensional (4-D) information regarding the dyna... A new concept is presented for air-to-air missile which is dynamic attack zone after being launched in random wind field. This new concept can be used to obtain the 4-dimensional (4-D) information regarding the dynamic envelope of an air-to-air missile at any flight time airned at different flight targets considering influences of random wind, in the situation of flight fighters coop- crated with missiles fighting against each other. Based on an air-to-air missile model, some typical cases of dynamic attack zone after being launched in random wind field were numerically simulated. Compared with the simulation results of traditional dynamic envelope, the properties of dynamic attack zone after being launched are as follows. The 4-D dynamic attack zone after being launched is inside traditional maximum dynamic envelope, but its forane boundary is usually not inside traditional no-escape dynamic envelope; Traditional dynamic attack zone can just be reliably used at launch time, while dynamic envelope after being launched can be reliably and accurately used during any flight antagonism time. Traditional envelope is a special case of dynamic envelope after being launched when the dynamic envelope is calculated at the launch time: the dynamic envelope after being launched can be inflt, enced by the random wind field. 展开更多
关键词 Air-to-air missiles dynamic attack zone afterbeing launched:Traditional dynamic attackenvelope:Flight dynamics:Flight envelopes Numerical calculationprocedures:Simulation analysis
原文传递
Non-intrusive Hybrid Two-stage Detection of Dynamic Attacks in Wide-area Damping Controller Using Autoencoder and Unscented Kalman Filter with Unknown Input Estimation
2
作者 Abhishek Saini Hussain M.Mustafa +1 位作者 Pratyasa Bhui Anurag K.Srivastava 《Journal of Modern Power Systems and Clean Energy》 2025年第5期1763-1775,共13页
Wide-area damping controllers(WADCs)help in damping poorly damped inter-area oscillations(IAOs)using wide-area measurements.However,the vulnerability of the communication network makes the WADC susceptible to maliciou... Wide-area damping controllers(WADCs)help in damping poorly damped inter-area oscillations(IAOs)using wide-area measurements.However,the vulnerability of the communication network makes the WADC susceptible to malicious dynamic attacks.Existing cyber-resilient WADC solutions rely on accurate power system models or extensive simulation data for training the machine learning(ML)model,which are difficult to obtain for large-scale power system.This paper proposes a novel non-intrusive hybrid two-stage detection framework that mitigates these limitations by eliminating the need for realtime access to large system data or attack samples for training the ML model.In the first stage,an autoencoder is deployed at the actuator location to detect dynamic attacks with sharp gradient variations,e.g.,triangular,saw-tooth,pulse,ramp,and random attack signals.In the second stage,an unscented Kalman filter with unknown input estimation at the control center identifies smoothly varying dynamic attacks by estimating the control signal received by the actuator using synchrophasor measurements.A modified cosine similarity(MCS)metric is proposed to compare and quantify the similarity between the estimated control signal and the control signal sent by the WADC placed at the control center to detect any dynamic attacks.The MCS is designed to differentiate between events and dynamic attacks.The performance of the proposed framework has been validated on a hardware-in-the-loop(HIL)cyber-physical testbed built by using the OPAL-RT simulator and industry-grade hardware. 展开更多
关键词 dynamic attack dynamic state estimation attack detection machine learning wide-area damping controller autoencoder unscented Kalman filter
原文传递
Improved Zero-Dynamics Attack Scheduling With State Estimation
3
作者 Zhe Wang Heng Zhang +1 位作者 Chaoqun Yang Xianghui Cao 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期472-474,共3页
Dear Editor,This letter focuses on how an attacker can design suitable improved zero-dynamics (ZD) attack signal based on state estimates of target system. Improved ZD attack is to change zero dynamic gain matrix of a... Dear Editor,This letter focuses on how an attacker can design suitable improved zero-dynamics (ZD) attack signal based on state estimates of target system. Improved ZD attack is to change zero dynamic gain matrix of attack signal to a matrix with determinant greater than 1. 展开更多
关键词 change zero dynamic gain matrix target system state estimation SCHEDULING attack signal improved zd state estimates improved zero dynamics attack
在线阅读 下载PDF
Novel cyber-physical collaborative detection and localization method against dynamic load altering attacks in smart energy grids 被引量:2
4
作者 Xinyu Wang Xiangjie Wang +2 位作者 Xiaoyuan Luo Xinping Guan Shuzheng Wang 《Global Energy Interconnection》 EI CSCD 2024年第3期362-376,共15页
Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical a... Owing to the integration of energy digitization and artificial intelligence technology,smart energy grids can realize the stable,efficient and clean operation of power systems.However,the emergence of cyber-physical attacks,such as dynamic load-altering attacks(DLAAs)has introduced great challenges to the security of smart energy grids.Thus,this study developed a novel cyber-physical collaborative security framework for DLAAs in smart energy grids.The proposed framework integrates attack prediction in the cyber layer with the detection and localization of attacks in the physical layer.First,a data-driven method was proposed to predict the DLAA sequence in the cyber layer.By designing a double radial basis function network,the influence of disturbances on attack prediction can be eliminated.Based on the prediction results,an unknown input observer-based detection and localization method was further developed for the physical layer.In addition,an adaptive threshold was designed to replace the traditional precomputed threshold and improve the detection performance of the DLAAs.Consequently,through the collaborative work of the cyber-physics layer,injected DLAAs were effectively detected and located.Compared with existing methodologies,the simulation results on IEEE 14-bus and 118-bus power systems verified the superiority of the proposed cyber-physical collaborative detection and localization against DLAAs. 展开更多
关键词 Smart energy grids Cyber-physical system dynamic load altering attacks attack prediction Detection and localization
在线阅读 下载PDF
Real-time trajectory planning for UCAV air-to-surface attack using inverse dynamics optimization method and receding horizon control 被引量:16
5
作者 Zhang Yu Chen Jing Shen Lincheng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第4期1038-1056,共19页
This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits... This paper presents a computationally efficient real-time trajectory planning framework for typical unmanned combat aerial vehicle (UCAV) performing autonomous air-to-surface (A/S) attack. It combines the benefits of inverse dynamics optimization method and receding horizon optimal control technique. Firstly, the ground attack trajectory planning problem is mathematically formulated as a receding horizon optimal control problem (RHC-OCP). In particular, an approximate elliptic launch acceptable region (LAR) model is proposed to model the critical weapon delivery constraints. Secondly, a planning algorithm based on inverse dynamics optimization, which has high computational efficiency and good convergence properties, is developed to solve the RHCOCP in real-time. Thirdly, in order to improve robustness and adaptivity in a dynamic and uncer- tain environment, a two-degree-of-freedom (2-DOF) receding horizon control architecture is introduced and a regular real-time update strategy is proposed as well, and the real-time feedback can be achieved and the not-converged situations can be handled. Finally, numerical simulations demon- strate the efficiency of this framework, and the results also show that the presented technique is well suited for real-time implementation in dynamic and uncertain environment. 展开更多
关键词 Air-to-surface attack Direct method Inverse dynamics Motion planning Real time control Receding horizon control Trajectory planning Unmanned combat aerial vehicles
原文传递
On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
6
作者 Mahdi Taheri Khashayar Khorasani Nader Meskin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2191-2203,共13页
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition... In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies. 展开更多
关键词 Controllable attacks cyber-physical systems(CPS) dynamic coding zero dynamics attacks stealthy cyber-attacks
在线阅读 下载PDF
Unsteady aerodynamics modeling for flight dynamics application 被引量:13
7
作者 Qing Wang Kai-Feng He. +3 位作者 Wei-Qi Qian Tian-Jiao Zhang Yan-Qing Cheng Kai-Yuan Wu 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2012年第1期14-23,共10页
In view of engineering application, it is practicable to decompose the aerodynamics into three components: the static aerodynamics, the aerodynamic increment due to steady rotations, and the aerodynamic increment due... In view of engineering application, it is practicable to decompose the aerodynamics into three components: the static aerodynamics, the aerodynamic increment due to steady rotations, and the aerodynamic increment due to unsteady separated and vortical flow. The first and the second components can be presented in conventional forms, while the third is described using a one-order differential equation and a radial-basis-function (RBF) network. For an aircraft configuration, the mathematical models of 6- component aerodynamic coefficients are set up from the wind tunnel test data of pitch, yaw, roll, and coupled yawroll large-amplitude oscillations. The flight dynamics of an aircraft is studied by the bifurcation analysis technique in the case of quasi-steady aerodynamics and unsteady aerodynam- ics, respectively. The results show that: (1) unsteady aerodynamics has no effect upon the existence of trim points, but affects their stability; (2) unsteady aerodynamics has great effects upon the existence, stability, and amplitudes of periodic solutions; and (3) unsteady aerodynamics changes the stable regions of trim points obviously. Furthermore, the dynamic responses of the aircraft to elevator deflections are inspected. It is shown that the unsteady aerodynamics is beneficial to dynamic stability for the present aircraft. Finally, the effects of unsteady aerodynamics on the post-stall maneuverability 展开更多
关键词 Unsteady aerodynamics High angle of attack Mathematical model Flight dynamics - Bifurcation analysis Post-stall maneuver
在线阅读 下载PDF
Mitigating the Dynamic Load Altering Attack on Load Frequency Control with Network Parameter Regulation
8
作者 Yunhao Yu Boda Zhang +4 位作者 Meiling Dizha Ruibin Wen Fuhua Luo Xiang Guo Zhenyong Zhang 《Computers, Materials & Continua》 2026年第2期1561-1579,共19页
Load frequency control(LFC)is a critical function to balance the power consumption and generation.Thegrid frequency is a crucial indicator for maintaining balance.However,the widely used information and communication ... Load frequency control(LFC)is a critical function to balance the power consumption and generation.Thegrid frequency is a crucial indicator for maintaining balance.However,the widely used information and communication infrastructure for LFC increases the risk of being attacked by malicious actors.The dynamic load altering attack(DLAA)is a typical attack that can destabilize the power system,causing the grid frequency to deviate fromits nominal value.Therefore,in this paper,we mathematically analyze the impact of DLAA on the stability of the grid frequency and propose the network parameter regulation(NPR)to mitigate the impact.To begin with,the dynamic LFC model is constructed by highlighting the importance of the network parameter.Then,we model the DLAA and analyze its impact on LFC using the theory of second-order dynamic systems.Finally,we model the NPR and prove its effect in mitigating the DLAA.Besides,we construct a least-effort NPR considering its infrastructure cost and aim to reduce the operation cost.Finally,we carry out extensive simulations to demonstrate the impact of the DLAA and evaluate the mitigation performance of NPR.The proposed cost-benefit NPR approach can not only mitigate the impact of DLAA with 100%and also save 41.18$/MWh in terms of the operation cost. 展开更多
关键词 Smart grid cybersecurity dynamic load altering attack load frequency control network parameter modification
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部