1. Introduction
As power systems move to using renewable energy sources that rely on converters, the decrease in SMs takes away important sources of inertia and damping, which can put frequency stability at risk [
1,
2,
3,
4]. Virtual synchronous machines (VSMs) mimic the behavior of SMs and have become important for keeping stability [
5,
6]. However, they depend on real-time communication networks to share power settings, configuration details, and synchronization information, which creates serious cybersecurity risks [
7,
8,
9,
10]. FDIAs is one type of cyberattack that targets these control signals [
11], which depend on communication and can disturb local operations and threaten the overall stability of the system. This study aims to develop a scalable, physics-aware, and privacy-preserving mechanism for detecting FDIAs against FOC-VSMs. Existing solutions often ignore the physical behavior of FOC-VSMs or require centralized data access, limiting scalability, adaptability, and robustness in distributed grid environments. We suggest using a federated physics-informed LSTM that takes advantage of local inverter data and includes swing-equation dynamics, providing strong and adaptable detection in various operating conditions.
Many control methods mimic the behavior of SMs in power systems that heavily utilize inverter-based resources (IBRs). Among these, droop control is popular because it is simple and behaves like SMs in terms of frequency and power [
12]. To provide even better support during changes, VSM control not only mimics frequency droop but also simulates inertia and damping, leading to better performance in systems with low inertia [
13,
14,
15]. Matching control techniques help inverters work more like synchronous machines by taking advantage of their similar structures, which leads to better synchronization and stronger performance [
16,
17,
18]. Other alternatives, such as virtual oscillator control (VOC), aim for global synchronization by mimicking nonlinear oscillatory systems. In addition, dispatchable VOC (dVOC) helps achieve synchronization while meeting steady-state power flow equations, improving on some of the shortcomings of VOC [
19]. With the increasing deployment of grid-forming inverters, their reliance on communication networks for real-time data exchange has created new cyber-physical vulnerabilities. These inverters typically exchange control parameters, synchronization signals, and power setpoints, making them susceptible to cyberattacks. Researchers have looked into FDIAs and denial-of-service (DoS) attacks as serious risks to the stability and reliability of VSM-based systems [
20,
21]. FDIAs can change control signals or sensor data to trick the inverter into responding incorrectly, which can mess up voltage and frequency control [
20,
21]. VSMs are especially at risk because their simulated swing behavior relies on accurate frequency and power feedback, which attackers can fake or change by inserting false ω or
p* values [
22,
23,
24]. More invasive attacks also target setpoints or control parameters to degrade the power quality or destabilize the system [
25,
26].
Researchers have proposed various defense mechanisms to address these risks. One method involves using control systems based on trust and confidence, where each inverter gives a score to its neighbors and changes its settings based on that score [
27]. Another method uses the weighted mean subsequent reduction (WMSR) algorithm to filter out unusual data shared over the network by looking at connection limits in the communication graph [
28]. Intermittent communication protocols also contribute to cyber-resilience by verifying the timing of data exchanges. If communication links deviate from expected behavior, the affected controllers are isolated to prevent the propagation of corrupted information [
29]. Although previous studies address cybersecurity in microgrids, only a few explore robust detection methods tailored for inverter-based microgrids, particularly those using VSM control. Reference [
30] applies a long short-term memory (LSTM) network to monitor microgrid cybersecurity. Researchers propose observer-based techniques, such as Luenberger observers and augmented Kalman filters, to estimate signals under false data injection (FDI) attacks [
31,
32]. Artificial neural networks (ANNs) are used for detecting and mitigating DoS and FDI attacks in Volt-VAR control systems [
33] and DC microgrid inverters [
34]. LSTM is further used to detect and estimate anomalies in power measurements [
35], and stacked autoencoders combined with LSTM architectures identify electricity theft [
36]. An LSTM-based framework is also developed to detect cyberattacks on photovoltaic farms [
37]. In addition to these, researchers have proposed model-based, data-driven, and metric-based techniques to identify attacks on inverter-based energy resources (IBERs). Model-based methods rely on control-theoretic tools such as state-space estimation [
38], while data-driven methods use learning architectures like LSTM and convolutional neural networks (CNNs) [
39]. Metric-based techniques utilize signal processing features and thresholds for anomaly detection [
40]. However, model-based methods depend on accurate modeling of nonlinear systems, data-driven methods often suffer from false positives, and metric-based approaches are vulnerable to threshold manipulation. Despite recent progress in cyberattack detection for inverter-based resources, existing approaches exhibit several critical limitations that restrict their effectiveness in VSM-controlled, grid-forming environments:
Lack of physical system integration: Most data-driven detection approaches, such as those utilizing LSTM and convolutional neural networks, view inverter behavior as a mystery and fail to integrate the physical dynamics of virtual synchronous machines (VSMs). As a result, these models lack interpretability and struggle to differentiate between legitimate system disturbances and cyber-induced anomalies [
39].
Centralized learning dependency: Many existing detection frameworks rely on centralized data collection for model training and inference, which poses significant privacy concerns and limits deployment scalability in distributed, site-specific inverter environments [
39,
40].
Poor generalization and high false alarms: Detection techniques that rely on model approximations [
40] or metric-based thresholds [
40] often fail to generalize across different operating conditions. They are particularly prone to false positives when normal variations in load, voltage, or frequency occur (creating reliability concerns in practical applications).
This study addresses the limitations of existing cyberattack detection methods in VSM-controlled power systems by making the following key objectives and contributions:
- 1
Physics-informed detection framework: We develop a PI-LSTM model that incorporates the swing equation of the VSM as a physical constraint in the training process. By embedding domain-specific dynamics, the model enables residual-based anomaly detection that is highly sensitive to subtle deviations in frequency, power, or control behavior (typical signatures of false data injection attacks) while maintaining robustness to normal operational disturbances.
- 2
Federated learning for distributed VSM security: We implement a federated learning (FL) architecture that allows each VSM-enabled inverter to train its local PI-LSTM model using site-specific measurements (e.g., frequency, active power, and dc-link voltage) without sharing raw data. This distributed learning framework addresses privacy concerns, accommodates diverse operating conditions and control parameters across inverters, and scales to large power systems while enabling collaborative detection of cyberattacks.
The structure of this paper is organized as below:
Section 2 introduces the mathematical and control structure of VSMs, emphasizing their swing dynamics, voltage regulation, and vulnerability to cyber-physical disturbances due to increased reliance on communication links.
Section 3 provides a comprehensive classification of cyberattack surfaces in VSM-based systems, detailing various FDIA vectors and their impacts on system stability and coordination. In
Section 4, we present the proposed detection framework, which integrates a physics-informed long short-term memory (PI-LSTM) model with federated learning (FL) to enable decentralized, physically consistent, and data-private anomaly detection across VSM units.
Section 5 offers an in-depth analysis of simulation results under multiple attack scenarios, comparing the detection accuracy, robustness, and computational efficiency of the proposed model against baseline approaches. Finally,
Section 6 concludes the paper by summarizing key findings and highlighting directions for future research in cyber-resilient grid-forming converter networks.
2. Virtual Synchronous Machine
The global transition toward renewable energy has led to the widespread deployment of inverter-based resources (IBRs), such as photovoltaic (PV) systems and wind turbines. Unlike conventional SMs, which inherently contribute mechanical inertia and provide frequency and voltage regulation, these resources connect to the grid through power electronic interfaces that do not naturally support such dynamics. As the penetration of IBRs increases, system inertia declines, leading to degraded frequency stability, higher rates of change of frequency (RoCoFs), and reduced frequency nadirs following disturbances [
41]. To address these stability challenges, grid-forming converters (GFCs) are being developed to emulate SM capabilities such as inertial response, voltage support, black start, and droop-based frequency regulation. Among various control strategies for GFCs, the virtual synchronous machine (VSM) has emerged as a physically intuitive and widely adopted method. VSMs replicate the electromechanical behavior of synchronous machines using virtual models embedded in power converter controllers [
41]. At the heart of VSM control is the swing equation, which models the frequency dynamics of a synchronous machine. The
VSM emulates this using
Here,
is the internal angle of the converter,
is the instantaneous angular frequency,
is the virtual moment of inertia,
is the virtual damping factor,
is the nominal frequency (e.g., 50 or 60 Hz),
is the active power reference, and
is the measured active power output [
41]. Equation (1) ensures the phase angle evolves according to the frequency, replicating the rotor dynamics of SMs. To integrate virtual friction or coordinated damping, we modified the swing equation as follows [
42]:
where
This extension adds a damping torque that depends on the mismatch between a unit’s local frequency and the global average frequency. Equation (3) governs frequency changes in response to active power imbalance and provides a mechanism for emulated inertial and droop response. To enhance synchronization in multi-VSM networks, a virtual friction term
must also be included. This term dampens the deviation between the local frequency
and the center-of-inertia frequency
, calculated across all VSMs as in (3), and improves coherence across the microgrid. The output voltage of the VSM is synthesized based on the internal angle
and a virtual excitation current
, which is analogous to the field current in a synchronous generator. The three-phase voltage reference is constructed as follows:
Here,
is the mutual inductance coefficient between the virtual field and stator windings. To regulate the voltage magnitude, a virtual automatic voltage regulator (AVR) is implemented. This typically consists of a fractional order proportional-integral (FO-PI) controller that adjusts the excitation current
to maintain the DC-link or output voltage at a desired setpoint:
which replicates the function of the AVR by adjusting
to maintain the reference voltage
. Here,
denotes the measured voltage magnitude in the dq-frame;
is the fractal factor; and
are the proportional and integral gains, respectively [
41,
43]. Transforming the reference voltages
to the dq-coordinate frame using the same angle
and frequency
as in (2), the FOC-VSM employs standard voltage and current control loops. These loops, along with PWM signal generation, remain consistent with the conventional control design [
41], ensuring accurate real-time tracking of voltage and current references.
Figure 1 presents a comprehensive view of the control architecture used to implement a FOC-VSM. This architecture is organized in a hierarchical manner, reflecting the layered control strategy required to replicate the behavior of synchronous machines using power electronics. At the highest level, the control system incorporates a swing equation and frequency droop-based loop, which governs the virtual rotor dynamics. Specifically, the angle dynamics are given by
, and the frequency dynamics are given by the swing Equation (2). This combination allows the converter to exhibit synthetic inertia and emulate a primary frequency response, adapting its internal frequency based on active power imbalances and deviations from nominal frequency.
Beneath this frequency control layer, the voltage magnitude control loop emulates the function of an automatic voltage regulator (AVR) as found in traditional synchronous generators. This loop regulates the virtual excitation current using a fractional order proportional-integral (FO-PI) controller that minimizes the error between the reference voltage and the measured terminal or DC-link voltage , as represented by (6). The result is dynamic voltage support capability and improved voltage stability at the point of common coupling (PCC). Once the internal angle and excitation current are determined, a waveform generator constructs the three-phase voltage reference signals. These are synthesized according to (5), thereby generating a rotating voltage vector with magnitude and frequency determined by the outer control loops. This sinusoidal reference ensures that the output voltage behaves like that of a synchronous machine’s stator windings.
3. Cyberattacks on Virtual Synchronous Machines
While the local control laws of VSMs are typically hardcoded into power electronics and locally executed, they increasingly rely on external communication to support coordinated operation. This includes feedback and synchronization signals exchanged between distributed inverters and central or supervisory controllers. Such communication channels (although essential for functions like virtual friction (VF) damping, droop control coordination, and grid restoration) open the system to cybervulnerabilities, particularly FDIAs.
3.1. Attack Surfaces in VSM Microgrids
Each VSM maintains its internal dynamics using the swing equation and voltage regulation via an AVR (see Equations (1)–(5)). These control laws rely on several signals that may be internally generated (e.g., power output and frequency ) or externally received, such as the center-of-inertia (COI) frequency . For example, VF damping requires that each VSM compares its local frequency to , a weighted average of all inverter frequencies, typically computed by a central controller and broadcast back to all units. These communication-based dependencies introduce four principal vectors of attack:
Frequency measurement reports ();
Global reference feedback ();
Setpoint commands (e.g., );
Excitation current feedback (e.g., used in some distributed AVR schemes).
3.2. False Data Injection on Local Frequency Measurements
Assume that each VSM
computes its own instantaneous frequency
using the standard swing dynamics. This locally computed frequency is then reported to a central controller (CC) or used in coordination mechanisms like frequency consensus or virtual friction. An FDIA can target this communication channel by adding a time-varying corrupting signal
to the outgoing data, resulting in a manipulated signal received by the CC:
Here,
represents an arbitrary and potentially unbounded additive disturbance introduced by the attacker. This injected error may not be observable at the CC and can mislead any subsequent frequency aggregation or control logic that depends on the ensemble of
values [
44]. In this study, the additive disturbance
in (7) was modeled using several representative attack profiles, including constant offsets, sinusoidal variations, square-wave manipulations, and ramped signals. These profiles represent practical FDIA strategies ranging from persistent biasing to stealthy gradual corruption. Their amplitudes, start times, and durations were randomized within specified bounds, to ensure comprehensive coverage of both short-term and long-duration attack cases.
In systems where the controller calculates the center-of-inertia (COI) frequency as a weighted average of reported frequencies,
The attack alters this value to
This attack can induce system-wide instabilities, such as frequency divergence, by perturbing only a subset of nodes. The systemic vulnerability arises from the aggregation mechanism of : the attack on a few nodes contaminates the reference used by all. Oscillatory or ramped attack profiles may be particularly destabilizing as they introduce persistent frequency fluctuations or false trends, potentially triggering overcurrent protection or load-shedding schemes.
3.3. False Data Injection on COI Frequency Feedback
The second major scenario involves corrupting the COI frequency signal
that the CC sends back to the inverters. Even if the CC computes a valid
, an adversary can compromise the downstream communication channel to VSM
, altering the signal as
Here,
is a second additive signal, designed to mislead the VSM about the global frequency state. Since VF damping applies a torque
, such an attack can invert, amplify, or disable the damping response. In a coordinated VSM network, misalignment of damping terms can degrade system synchrony, increase frequency drift, and compromise load-sharing. In [
38], it is shown that such attacks (if sustained) can prevent the system from reaching steady-state consensus, even if the swing dynamics remain otherwise unchanged.
3.4. Power Setpoint and Voltage Reference Manipulation
A third scenario involves manipulating control setpoints sent to the VSM, such as the active power reference
or the voltage reference
. These parameters typically originate from a central energy management system (EMS) or higher-level supervisory controller. If an attacker gains access to the control path between this supervisory layer and the inverter controller, they can corrupt the intended commands as
Such FDIAs can be particularly damaging because they directly modify target states, causing the VSM to regulate toward physically infeasible conditions. For instance, over-injection of power via may lead to inverter overloading, line overheating, or protection trips. Undervoltage commands via may degrade power quality and destabilize reactive power sharing. Intermittent switching of setpoints (e.g., toggling between extremes) can stress the converter’s inner control loops and introduce high-frequency oscillations. These attacks are difficult to detect because they do not necessarily trigger abnormal deviations in system states unless carefully monitored with residual-based mechanisms.
5. Simulation and Results
5.1. System Setup and Modeling Environment
To evaluate the proposed federated PI-LSTM-based cyberattack detection framework under realistic low-inertia power system conditions, we simulate the IEEE 9-bus transmission test system using Simscape Electrical/SimPowerSystems. The system configuration is illustrated in
Figure 2 and consists of a conventional synchronous machine (SM), two large-scale grid-forming converter (GFC) systems based on VSMs, and constant impedance loads.
All transmission lines are modeled as nominal π-sections incorporating full RLC dynamics, allowing accurate capture of fast transients and potential adverse interactions with grid-forming inverters. Line dynamics are essential in this context due to the rapid response characteristics of GFCs, which may interact nonlinearly with passive network elements under both normal and adversarial conditions. Transformers are implemented as three-phase linear transformer models, and all loads are constant impedance type.
The cyberattack detection framework is applied to these converter-interfaced VSMs. The relevant plant and control parameters for the VSM modules are as follows. Notably, each VSM uses a virtual moment of inertia = and droop coefficients . The VSMs operate at a nominal frequency of , with voltage reference regulation via FO-PI controllers embedded in each local control stack. These settings form the operational and physical context in which the PI-LSTM-based anomaly detection is tested under both nominal and compromised scenarios.
In the simulation environment, each VSM is subject to distinct operational conditions, including varying load profiles, renewable generation fluctuations, and cyberattack patterns. These differences result in non-IID data distributions across clients in the federated learning process, thereby reflecting realistic heterogeneity in distributed grid environments.
5.2. VSM Behavior Under Nominal and Attacked Conditions
To evaluate the vulnerability and detection performance of VSMs under cyberattacks, we simulate various FDIAs targeting key control and communication channels. We classify these attacks into four categories:
- (i)
Corruption of local frequency measurements sent to the central controller (CC);
- (ii)
Tampering with the COI frequency received by the VSMs;
- (iii)
Manipulation of the voltage reference .
Each attack is introduced in a controlled simulation scenario and evaluated for its impact on frequency and power output. The baseline (nominal) behavior is compared against the system response under attack.
5.2.1. Attack on Signals Sent to the Central Controller
The first attack class targets the upward communication from VSMs to the CC.
Figure 3a illustrates the scenario in which individual VSM frequency measurements are corrupted by time-varying signals before reaching the CC. At
, a sine wave of amplitude
is added to
. At
, a square wave (
) is applied to
, and a constant offset (
) is injected into
at
. These manipulated values distort the computed center-of-inertia frequency
, as shown in
Figure 3a. Despite the corrupted inputs,
Figure 3b demonstrates that the output power of each VSM remains close to the nominal case (dashed lines), indicating the system’s inherent masking of subtle attacks without proper anomaly detection.
5.2.2. Attack on COI Frequency Feedback to VSMs
The second attack manipulates the COI frequency signal
broadcast from the CC to each VSM.
Figure 4a presents the behavior of
, the received COI frequency at a VSM1, under a square-wave FDIA. An attack is introduced at
, generating sharp frequency fluctuations that differ from the true CC value, original
.
Figure 4b shows the power output of VSM1 under these conditions. Without anomaly mitigation, the output exhibits large oscillations (red line).
5.2.3. Attack on Voltage Reference
The final attack class modifies the reference voltage input used by the AVR controller. This alters the terminal voltage output of the converter, affecting the power balance and potentially causing local voltage collapse or instability (as shown in
Figure 5). Overall, these case studies demonstrate that VSMs are susceptible to diverse FDIA vectors that exploit communication dependencies. Without a physics-informed detection mechanism, these attacks may remain hidden while degrading system synchrony or power quality. The proposed PI-LSTM model successfully identifies such anomalies through temporal inconsistency and physical residuals, especially when embedded in a federated architecture.
In addition to short-duration, abrupt false data injection attacks, long-running stealth attacks with low-magnitude perturbations were simulated on the communication links of VSMs. These stealthy manipulations persisted across multiple control cycles while maintaining a degree of stealthiness by remaining within normal operating margins.
5.3. Dataset Construction and Network Parameters
To train and evaluate the proposed FL-PI-LSTM framework for detecting cyberattacks on VSMs, we develop a labeled dataset through simulation of the IEEE 9-bus transmission system. The VSMs are installed at buses 2 and 3, selected due to their inverter-based generation and critical participation in grid-forming control. Each VSM is simulated independently to support decentralized training across clients in the federated learning (FL) setup.
The proposed FL-PI-LSTM framework is not limited to a fixed power or frequency operating point. In this study, simulations were conducted with a nominal frequency of 50 Hz (2π × 50 rad/s) and load variations in the range of 0.8–1.2 p.u. These values were selected to represent typical operating conditions in distribution networks. While the method is demonstrated within this range, it can be extended to different grid frequencies (e.g., 60 Hz) or power levels through retraining with representative datasets, ensuring adaptability across diverse system configurations.
5.3.1. Data Generation and Labeling
Simulations were carried out in MATLAB/Simulink using Simscape Electrical with a sampling interval of 5 ms over 10 s windows. Both nominal operation and FDIA scenarios were considered. For each scenario, time-series data of rotor angle, frequency, power reference, voltage reference, excitation current, and DC-link voltage were collected. Sliding windows were applied to extract training sequences, and labels were assigned as normal or anomalous depending on overlap with injected attacks. To ensure diversity, multiple parameters were systematically varied: attack type (frequency report, COI feedback, power setpoint, and voltage reference), trigger time (uniformly randomized within [1 s, 7 s]), duration (0.5–2 s), amplitude (1–5 rad/s or p.u. equivalent), waveform (constant, sine, square, and ramp), load level (0.8–1.2 of nominal), and the VSM under attack (VSM1, VSM2, or both). A total of 2000 distinct attack events were generated and labeled with metadata. Both training and test datasets included these diverse conditions, ensuring that the proposed framework was evaluated on realistic variations (as shown in
Table 1).
Each simulation outputs vectors of measured states (e.g., rotor angle and frequency), control inputs (e.g., power reference and voltage reference), and internal signals (e.g., excitation current and VDC), which are aligned to build training sequences. A total of 2000 sequences are labeled with attack metadata.
5.3.2. FL-PI-LSTM Network Configuration
The architecture used for each local model is a physics-informed long short-term memory (PI-LSTM) network. Each VSM is assigned a local model instance, which is trained independently in the federated setting and periodically synchronized via model aggregation (as shown in
Table 2).
This structured simulation and training environment ensures that the detection model is exposed to a wide variety of attack dynamics and system operating conditions, improving its generalization and robustness under realistic grid threats.
5.4. Performance Analysis
This section presents a comprehensive evaluation of the proposed FL-PI-LSTM detection framework in comparison with three alternative models: CL-LSTM, FL-LSTM, and CL-PI-LSTM. Each model is trained and tested under the same simulation setup and evaluated using standard detection metrics and runtime efficiency indicators. The training behavior of all models is shown in
Figure 6, which presents the evolution of training loss over 250 epochs. The CL-LSTM model demonstrates moderate convergence, with loss reduction tapering off after epoch 150. The FL-LSTM model converges slightly faster and reaches a lower final loss due to the benefit of local training across varied data sources. The CL-PI-LSTM model maintains consistently lower loss values throughout training due to the added regularization effect of physics-based residuals. Among all models, FL-PI-LSTM exhibits the fastest and smoothest convergence, indicating both local model stability and enhanced generalization from physics-informed constraints.
It should be noted that the datasets across VSMs are non-IID by construction since each client experiences unique disturbances and attack scenarios. The convergence behavior illustrated in
Figure 6 thus inherently validates the robustness of the proposed method under non-IID conditions.
Figure 7 displays the precision, recall, and F1 score achieved by each model on the test set. The CL-LSTM model yields the lowest overall performance across all metrics, while the FL-LSTM improves notably in recall, benefiting from heterogeneous training data. CL-PI-LSTM surpasses both prior models by incorporating physical constraints, thus reducing false positives. The FL-PI-LSTM achieves the highest overall performance, with a precision of 95%, a recall of 96%, and an F1 score of 95.5%. This demonstrates the combined benefits of federated learning and physics-informed modeling in producing an accurate, resilient, and generalizable cyberattack detection system.
This study concentrates on detecting cyberattacks against VSM signals. Model poisoning and backdoor threats targeting federated aggregation remain outside our present scope but represent important directions for future work, where robust aggregation and client update validation could complement the proposed framework.
The training and inference runtimes of each model are presented in
Table 3. Pure LSTM models (CL-LSTM and FL-LSTM) demonstrate faster training per epoch due to their simpler objectives. However, the physics-informed models maintain comparable inference time, indicating no major penalty during real-time deployment. The FL-PI-LSTM, while incorporating additional physical constraints, completes each local epoch in only 4.0 s and maintains an inference latency of 0.39 milliseconds per sample, making it suitable for real-time detection in distributed power systems.
To evaluate the effect of
, we conducted a sensitivity analysis with three representative values:
.
Table 4 reports the precision, recall, and false positive rate (FPR) for each setting. The results indicate that
achieves the most balanced trade-off, providing both high precision/recall and low FPR. Lower values emphasize physics consistency at the cost of recall, while higher values increase sensitivity but with more false positives.
The proposed PI-LSTM framework was applied to multiple FDIA categories, including frequency measurement corruption, COI feedback tampering, power setpoint manipulation, and voltage reference tampering. In addition, stealthy long-duration perturbations with small amplitudes were introduced to emulate subtle adversarial strategies. Across these scenarios, the PI-LSTM successfully distinguished between normal dynamics and attack-induced anomalies, demonstrating its general applicability for FDIA detection in VSM-based networks.
Ablation Study: Dynamic Thresholding
In addition to fixed-threshold detection, we evaluated a dynamic threshold mechanism to explore its effect on anomaly detection performance. The dynamic threshold
was defined as
where
and
denote the moving average and standard deviation of the residual loss
within a sliding window of size
, and
is a scaling hyperparameter. This allows the threshold to adapt in real time to the variability and noise level of operating conditions.
Table 5 summarizes the performance comparison between fixed and dynamic thresholds. Results indicate that dynamic thresholding reduces false positives (FPR) by
on average, while recall and precision remain nearly unchanged. This demonstrates that dynamic adjustment primarily helps in suppressing unnecessary alarms without affecting true anomaly detection.