Cyber-Physical Resilience of Electrical Power Systems Against Malicious Attacks: a Review
暂无分享,去创建一个
Golshan Madraki | Yury Dvorkin | Seyedamirabbas Mousavian | Sarmad Mehrdad | Y. Dvorkin | S. Mousavian | Sarmad Mehrdad | Golshan Madraki
[1] Randy H. Katz,et al. Above the Clouds: A Berkeley View of Cloud Computing , 2009 .
[2] Hamed Mohsenian Rad,et al. Detecting dynamic load altering attacks: A data-driven time-frequency analysis , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[3] Naeem Iqbal,et al. Load frequency resilient control of power system against delayed input cyber attack , 2015, 2015 Symposium on Recent Advances in Electrical Engineering (RAEE).
[4] Chao Yang,et al. Event-based distributed state estimation under deception attack , 2017, Neurocomputing.
[5] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[6] Xiaodong Wang,et al. Detecting the Sybil Attack Cooperatively in Wireless Sensor Networks , 2008, 2008 International Conference on Computational Intelligence and Security.
[7] H. Vincent Poor,et al. Enabling Self-Healing Smart Grid Through Jamming Resilient Local Controller Switching , 2015, IEEE Transactions on Dependable and Secure Computing.
[8] Maria Paola Scaparra,et al. Optimal Allocation of Protective Resources in Shortest-Path Networks , 2011, Transp. Sci..
[9] Ping Zhang,et al. Detection of replay attacks in cyber-physical systems , 2016, 2016 American Control Conference (ACC).
[10] Lingfeng Wang,et al. A game-theoretic approach to optimal defense strategy against load redistribution attack , 2015, 2015 IEEE Power & Energy Society General Meeting.
[11] Xiaodong Wang,et al. Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.
[12] Martine Chlela,et al. Fallback Control for Isochronous Energy Storage Systems in Autonomous Microgrids Under Denial-of-Service Cyber-Attacks , 2018, IEEE Transactions on Smart Grid.
[13] Brian Neil Levine,et al. Detecting the Sybil Attack in Mobile Ad hoc Networks , 2006, 2006 Securecomm and Workshops.
[14] Pan Li,et al. Privacy-Preserving Energy Theft Detection in Smart Grids: A P2P Computing Approach , 2013 .
[15] Bum-Joo Lee,et al. Extended smart meters-based remote detection method for illegal electricity usage , 2013 .
[16] Jianhui Wang,et al. A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks , 2015, IEEE Transactions on Power Systems.
[17] P. Varalakshmi,et al. Thwarting DDoS attacks in grid using information divergence , 2013, Future Gener. Comput. Syst..
[18] Lingfeng Wang,et al. A hybrid neural network model and encoding technique for enhanced classification of energy consumption data , 2011, 2011 IEEE Power and Energy Society General Meeting.
[19] Deepa Kundur,et al. Denial of service attacks and mitigation for stability in cyber-enabled power grid , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).
[20] Javier Del Ser,et al. Detection of non-technical losses in smart meter data based on load curve profiling and time series analysis , 2017 .
[21] Mohamed F. Younis,et al. Cross-layer scheme for detecting large-scale colluding Sybil attack in VANETs , 2015, 2015 IEEE International Conference on Communications (ICC).
[22] Zuyi Li,et al. Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.
[23] Adnan Anwar,et al. Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements , 2017, J. Comput. Syst. Sci..
[24] Lingfeng Wang,et al. Support vector machine based data classification for detection of electricity theft , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.
[25] Leandros A. Maglaras,et al. Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems , 2015, J. Inf. Secur. Appl..
[26] Ali Reza Seifi,et al. A statistical unsupervised method against false data injection attacks: A visualization-based approach , 2017, Expert Syst. Appl..
[27] J. Salmeron,et al. Worst-Case Interdiction Analysis of Large-Scale Electric Power Grids , 2009, IEEE Transactions on Power Systems.
[28] Ali Pinar,et al. Computing Criticality of Lines in Power Systems , 2007, 2007 IEEE International Symposium on Circuits and Systems.
[29] Åke J. Holmgren,et al. Evaluating Strategies for Defending Electric Power Networks Against Antagonistic Attacks , 2007, IEEE Transactions on Power Systems.
[30] Ramin Moslemi,et al. A Fast, Decentralized Covariance Selection-Based Approach to Detect Cyber Attacks in Smart Grids , 2018, IEEE Transactions on Smart Grid.
[31] Melike Erol-Kantarci,et al. A risk optimization model for enhanced power grid resilience against physical attacks , 2017 .
[32] Witold Kinsner,et al. Anomaly detection in a smart grid using wavelet transform, variance fractal dimension and an artificial neural network , 2016, 2016 IEEE Electrical Power and Energy Conference (EPEC).
[33] Toru Namerikawa,et al. Detection of replay attack on smart grid with code signal and bargaining game , 2017, 2017 American Control Conference (ACC).
[34] Chao Yang,et al. Identification of severe multiple contingencies in electric power networks , 2005, Proceedings of the 37th Annual North American Power Symposium, 2005..
[35] R. C. Diovu,et al. A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks , 2017, 2017 IEEE PES PowerAfrica.
[36] Beibei Li,et al. Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system , 2017, J. Parallel Distributed Comput..
[37] Haris M. Khalid,et al. Immunity Toward Data-Injection Attacks Using Multisensor Track Fusion-Based Model Prediction , 2017, IEEE Transactions on Smart Grid.
[38] Sushil Kumar Saroj,et al. Sybil attack prevention and detection in vehicular ad hoc network , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).
[39] Ravishankar K. Iyer,et al. Self-Healing Attack-Resilient PMU Network for Power System Operation , 2018, IEEE Transactions on Smart Grid.
[40] Jose M. Yusta,et al. Grid vulnerability analysis based on scale-free graphs versus power flow models , 2013 .
[41] Lei Wu,et al. An optimal joint placement of PMUs and flow measurements for ensuring power system observability under N-2 transmission contingencies , 2018 .
[42] Yanfei Sun,et al. Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid , 2017, IEEE Transactions on Smart Grid.
[43] Jorge Valenzuela,et al. Real-time data reassurance in electrical power systems based on artificial neural networks , 2013 .
[44] Lingfeng Wang,et al. Power System Reliability Evaluation Considering Load Redistribution Attacks , 2017, IEEE Transactions on Smart Grid.
[45] Jin Wei,et al. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.
[46] Arman Sargolzaei,et al. Preventing Time-Delay Switch Attack on Load Frequency Control in Distributed Power Systems , 2016, IEEE Transactions on Smart Grid.
[47] Kang Yen,et al. Delayed inputs attack on load frequency control in smart grid , 2014, ISGT 2014.
[48] Shunzheng Yu,et al. One-way queuing delay measurement and its application on detecting DDoS attack , 2009, J. Netw. Comput. Appl..
[49] Jorge Valenzuela,et al. A two-phase investment model for optimal allocation of phasor measurement units considering transmission switching , 2015 .
[50] Rida Khatoun,et al. Vehicle Driving Pattern Based Sybil Attack Detection , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[51] Jun Luo,et al. Energy-theft detection issues for advanced metering infrastructure in smart grid , 2014, Tsinghua Science and Technology.
[52] S. Mirzakuchaki,et al. A Solution to Remote Detecting of Illegal Electricity Usage Based on Smart Metering , 2007, 2007 2nd International Workshop on Soft Computing Applications.
[53] Yang Liu,et al. Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection , 2015, Future Gener. Comput. Syst..
[54] Yuancheng Li,et al. State summation for detecting false data attack on smart grid , 2014 .
[55] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[56] Zuyi Li,et al. Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.
[57] Saman A. Zonouz,et al. AMIDS: A multi-sensor energy theft detection framework for advanced metering infrastructures , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[58] David K. Y. Yau,et al. Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.
[59] Lalitha Sankar,et al. Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.
[60] Zhao Yang Dong,et al. Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks , 2011, IEEE Transactions on Power Systems.
[61] R. Alvarez,et al. Trilevel Optimization in Power Network Defense , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[62] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[63] Hamed Mohsenian Rad,et al. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.
[64] Mohammad Javad Feizollahi,et al. An investment decision model for the optimal placement of phasor measurement units , 2015, Expert Syst. Appl..
[65] Siddharth Garg,et al. IoT-enabled distributed cyber-attacks on transmission and distribution grids , 2017, 2017 North American Power Symposium (NAPS).
[66] Faruk Kazi,et al. Data driven approach to attack detection in a cyber-physical smart grid system , 2017, 2017 Indian Control Conference (ICC).
[67] Syed Khaleel Ahmed,et al. Detection of abnormalities and electricity theft using genetic Support Vector Machines , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.
[68] Hamed Mohsenian Rad,et al. Dynamic load altering attacks in smart grid , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).
[69] Chao Yang,et al. Severe Multiple Contingency Screening in Electric Power Systems , 2008, IEEE Transactions on Power Systems.
[70] Neeraj Kumar,et al. Decision Tree and SVM-Based Data Analytics for Theft Detection in Smart Grid , 2016, IEEE Transactions on Industrial Informatics.
[71] Walter S. Baer,et al. Electricity Requirements for a Digital Society , 2003 .
[72] Satyajayant Misra,et al. SybilExposer: An effective scheme to detect Sybil communities in online social networks , 2016, 2016 IEEE International Conference on Communications (ICC).
[73] Natalia Alguacil,et al. A trilevel programming approach for electric grid defense planning , 2014, Comput. Oper. Res..
[74] Hao Liang,et al. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.
[75] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[76] Victor C. M. Leung,et al. Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.
[77] Melike Erol-Kantarci,et al. Cyber Attack Protection for a Resilient Electric Vehicle Infrastructure , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[78] Aditya Ashok,et al. Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation , 2018, IEEE Transactions on Smart Grid.
[79] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[80] Radu State,et al. Large-scale detection of non-technical losses in imbalanced data sets , 2016, 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).
[81] Gerald G. Brown,et al. Defending Critical Infrastructure , 2006, Interfaces.
[82] Arman Sargolzaei,et al. Resilient Design of Networked Control Systems Under Time Delay Switch Attacks, Application in Smart Grid , 2017, IEEE Access.
[83] Hamed Mohsenian-Rad,et al. Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.
[84] Gexiang Zhang,et al. Robust Detection of Cyber Attacks on State Estimators Using Phasor Measurements , 2017, IEEE Transactions on Power Systems.
[85] Pankaj Kumar Bhowmik,et al. Remote detection of illegal electricity usage employing smart energy meter - A current based technique , 2011, ISGT2011-India.
[86] Anastasios A. Economides,et al. Detecting Sybil attacks in wireless sensor networks using UWB ranging-based information , 2015, Expert Syst. Appl..