Skip to main content
. 2020 Dec 25;9:2545–2563. doi: 10.1109/ACCESS.2020.3047374

TABLE 2. Threat Model Formulation of Load-Changing Attacks.

Threat Model Inline graphic Threat Load-changing Attack
Knowledge Oblivious or Semi-Oblivious
Access Non-possession
Specificity Targeted
Resources Class II
Frequency Iterative
Reproducibility Multiple-times
Level L1 or L2
Asset Smart HVAC, IoT-connected motors, PLCs, EV chargers, water heaters, etc.
Technique Modify control logic or wireless compromise
Premise Cyber: Integrity