Malicious data deception attacks against power systems: A new case and its detection method
暂无分享,去创建一个
Xue Li | Peng Zhou | Minrui Fei | Lei Wu | Dajun Du | Rui Chen | Lei Wu | M. Fei | D. Du | Xue Li | Peng Zhou | Rui Chen
[1] Pietro Tesi,et al. Input-to-State Stabilizing Control Under Denial-of-Service , 2015, IEEE Transactions on Automatic Control.
[2] Newton G. Bretas,et al. Power system state estimation: Undetectable bad data , 2014 .
[3] A. Conejo,et al. Power System State Estimation Considering Measurement Dependencies , 2009, IEEE Transactions on Power Systems.
[4] Farrokh Aminifar,et al. Observability of Hybrid AC/DC Power Systems With Variable-Cost PMUs , 2014, IEEE Transactions on Power Delivery.
[5] H. Vincent Poor,et al. Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.
[6] Gexiang Zhang,et al. Power System Real-Time Monitoring by Using PMU-Based Robust State Estimation Method , 2016, IEEE Transactions on Smart Grid.
[7] James D. McCalley,et al. Online risk-based security assessment , 2002 .
[8] Minrui Fei,et al. A Novel Networked Online Recursive Identification Method for Multivariable Systems With Incomplete Measurement Information , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[9] Simone Silvestri,et al. Managing Contingencies in Smart Grids via the Internet of Things , 2016, IEEE Transactions on Smart Grid.
[10] Lalitha Sankar,et al. Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.
[11] Lei Wu,et al. Transmission Line Overload Risk Assessment for Power Systems With Wind and Load-Power Generation Correlation , 2015, IEEE Transactions on Smart Grid.
[12] C. K. Michael Tse,et al. Assessment of Robustness of Power Systems From a Network Perspective , 2015, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[13] Minrui Fei,et al. Quantized control of distributed event-triggered networked control systems with hybrid wired-wireless networks communication constraints , 2017, Inf. Sci..
[14] Yijia Cao,et al. Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks , 2016, IEEE Transactions on Smart Grid.
[15] Minrui Fei,et al. Multiple event-triggered H2/H∞ filtering for hybrid wired-wireless networked systems with random network-induced delays , 2015, Inf. Sci..
[16] Zhu Han,et al. Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.
[17] Gustavo Valverde,et al. Unscented kalman filter for power system dynamic state estimation , 2011 .
[18] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[19] Xi Fang,et al. 3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .
[20] Jinping Hao,et al. Optimal malicious attack construction and robust detection in Smart Grid cyber security analysis , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[21] Stephen P. Boyd,et al. Enhancing Sparsity by Reweighted ℓ1 Minimization , 2007, 0711.1612.
[22] Ying Jun Zhang,et al. Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.
[23] Lang Tong,et al. Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.
[24] Xiaodong Wang,et al. Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.
[25] Walid Saad,et al. Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective , 2016, IEEE Transactions on Smart Grid.
[26] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[27] Carolyn Penstein Rosé,et al. CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.
[28] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[29] V. J. Gutierrez-Martinez,et al. Practical Security Boundary-Constrained DC Optimal Power Flow for Electricity Markets , 2016, IEEE Transactions on Power Systems.
[30] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[31] Chung-Shou Liao,et al. Hybrid search for the optimal PMU placement problem on a power grid , 2015, Eur. J. Oper. Res..
[32] Antonio T. Alexandridis,et al. Modular Control Design and Stability Analysis of Isolated PV-Source/Battery-Storage Distributed Generation Systems , 2015, IEEE Journal on Emerging and Selected Topics in Circuits and Systems.
[33] Xue Li,et al. Probabilistic optimal power flow for power systems considering wind uncertainty and load correlation , 2015, Neurocomputing.