Advances, Systems and Applications
Sub-Problem | Description | Type of method | Status |
---|---|---|---|
Attack detecting | Replay attacks in attack detection exploit the system to accept previous communications without adequate security measures, which can lead to security breaches. | CNN CDBN | [96] |
Security threat detection | Check and report potential vulnerabilities in the system. | Stacked Deep Polynomial Network | [97] |
Malicious traffic detection | Detect malicious traffic in IoT networks and provide security as a service. | DBN | |
Interval state estimation | Maximize the variation range of system variables. | SAE | [29] |
Safety hazard prediction | Predict potential safety hazards that may arise in the system. | B-PDA SAE | [100] [101] |
Electricity theft detection | Fraudulent electricity consumption reduces power supply quality, increases power generation load, leads to legitimate consumers paying excessive electricity bills, and affects the overall economy. | CNN + LSTM CNN Text CNN LSTM-UNet-Adaboost | [102] [106] [107] |
Identify non-technical power losses | Power loss is inherent in power transmission and distribution, but it will lead to lower power conversion efficiency. | CNN、LSTM、SAE | [30] |
False data injection | FDI is an attack on Data integrity, which poses a serious threat to the SCADA system. | CDBN MLP AAE GAN | [108] [109] [110] [111] |