Topology Perturbation for Detecting Malicious Data Injection
暂无分享,去创建一个
Thomas J. Overbye | Rakesh Bobba | Erich Heine | Katherine M. Rogers | Kate L. Morrow | T. Overbye | R. Bobba | K. M. Rogers | E. Heine
[1] M. Ribbens-Pavella,et al. Hypothesis Testing Identification: A New Method For Bad Data Analysis In Power System State Estimation , 1984, IEEE Transactions on Power Apparatus and Systems.
[2] A. Brameller,et al. Power System Tracking State Estimation and Bad Data Processing , 1982, IEEE Transactions on Power Apparatus and Systems.
[3] Felix F. Wu,et al. Observability analysis and bad data processing for state estimation with equality constraints , 1988 .
[4] A. Monticelli. State estimation in electric power systems : a generalized approach , 1999 .
[5] Felix F. Wu,et al. Detection of Topology Errors by State Estimation , 1989, IEEE Power Engineering Review.
[6] Fred C. Schweppe,et al. Power System Static-State Estimation, Part I: Exact Model , 1970 .
[7] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[8] R. Romero,et al. Identifying multiple interacting bad data in power system state estimation , 2005, IEEE Power Engineering Society General Meeting, 2005.
[9] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[10] Ning Zhou,et al. Probing signal design for power system identification , 2010, IEEE PES General Meeting.
[11] Thomas J. Overbye,et al. Power flow control with Distributed Flexible AC Transmission System (D-FACTS) devices , 2009, 41st North American Power Symposium.
[12] T.J. Overbye,et al. Some applications of Distributed Flexible AC Transmission System (D-FACTS) devices in power systems , 2008, 2008 40th North American Power Symposium.
[13] Xiang De,et al. An Application of Estimation-Identification Approach of Multiple Bad Data in Power System State Estimation , 1984, IEEE Power Engineering Review.
[14] Ali Abur,et al. Bad Data Detection and Identification , 2004 .
[15] L. Tong,et al. Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[16] E. Handschin,et al. Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.
[17] Katherine M. Rogers,et al. Power System Control with Distributed Flexible AC Transmission System Devices , 2009 .
[18] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[19] Ilya W. Slutsker. Bad Data Identification in Power System State Estimation Based on Measurement Compensation and Linear Residual Calculation , 1989, IEEE Power Engineering Review.
[20] B.M. Zhang,et al. A linear recursive bad data identification method with real-time application to power system state estimation , 1991, [Proceedings] Conference Papers 1991 Power Industry Computer Application Conference.
[21] Fred C. Schweppe,et al. Bad Data Suppression in Power System Static State Estimation , 1971 .
[22] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[23] John G. DeSteese,et al. A Tutorial on Detection and Characterization of Special Behavior in Large Electric Power Systems , 2004 .
[24] M. Vidyasagar,et al. Bad Data Rejection Properties of Weughted Least Absolute Value Techniques Applied to Static State Estimation , 1982, IEEE Transactions on Power Apparatus and Systems.
[25] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[26] R. Lugtu,et al. Power System State Estimation: Detection of Topological Errors , 1980, IEEE Transactions on Power Apparatus and Systems.
[27] W. L. Peterson,et al. Multiple bad data detection in power system state estimation using linear programming , 1988, [1988] Proceedings. The Twentieth Southeastern Symposium on System Theory.
[28] Probability Subcommittee,et al. IEEE Reliability Test System , 1979, IEEE Transactions on Power Apparatus and Systems.
[29] W.A. Mittelstadt,et al. Use of the WECC WAMS in Wide-Area Probing Tests for Validation of System Performance and Modeling , 2009, IEEE Transactions on Power Systems.
[30] Felix F. Wu,et al. Detection of topology errors by state estimation (power systems) , 1989 .
[31] Lang Tong,et al. Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[32] Ning Zhou,et al. Initial results in power system identification from injected probing signals using a subspace method , 2006, IEEE Transactions on Power Systems.
[33] Ning Zhou,et al. Probing Signal Design for Power System Identification , 2010, IEEE Transactions on Power Systems.
[34] Yu Er-keng,et al. A New Approach for Detection and Identification of Multiple Bad Data in Power System State Estimation , 1982, IEEE Transactions on Power Apparatus and Systems.
[35] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[36] Ali Abur,et al. A bad data identification method for linear programming state estimation , 1990 .
[37] Philip G. Hill,et al. Power generation , 1927, Journal of the A.I.E.E..
[38] A. Abur,et al. Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.