In allusion to the issue that the power scheduling-related fraud data can efficiently bypass the traditional bad data detection and identification and pose a great threat to the optimal allocation of power energy,the power scheduling-related fraud data attack model and the hidden data security vulnerabilities in the power scheduling model are presented.The feasibility of two types of power scheduling-related fraud data attack models are illustrated,and the issues of concern in the research of power scheduling-related fraud data attacks are pointed out.
关键词
电力调度/欺诈性数据/数据安全漏洞/负荷重分配攻击/电价攻击
Key words
power scheduling/fraud data/data security vulnerability/load redistribution attack/electricity price attack