An Overview of Cybersecurity for Natural Gas Networks: Attacks, Attack Assessment, and Attack Detection
暂无分享,去创建一个
[1] Nathan Leonard,et al. Analysis of pipeline accidents in the United States from 1968 to 2009 , 2014, Int. J. Crit. Infrastructure Prot..
[2] Stavros Ntalampiras,et al. Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling , 2015, IEEE Transactions on Industrial Informatics.
[3] H Vincent Poor,et al. Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.
[4] Sakir Sezer,et al. Impact of cyber-security issues on Smart Grid , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.
[5] M. Shahidehpour,et al. Interdependency of Natural Gas Network and Power System Security , 2008, IEEE Transactions on Power Systems.
[6] Malek Ben Salem,et al. A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.
[7] A. Conejo,et al. Using Electrical Energy Storage to Mitigate Natural Gas-Supply Shortages , 2018, IEEE Transactions on Power Systems.
[8] Lei Wu,et al. Robust Network Hardening Strategy for Enhancing Resilience of Integrated Electricity and Natural Gas Distribution Systems Against Natural Disasters , 2018, IEEE Transactions on Power Systems.
[9] Tudorica Daniela. Communication security in SCADA pipeline monitoring systems , 2011, 2011 RoEduNet International Conference 10th Edition: Networking in Education and Research.
[10] Siuming Lo,et al. Jet Fire Consequence Evaluation on the Natural Gas Transported by Pipelines , 2013 .
[11] Paul Honeine,et al. ${l_p}$-norms in One-Class Classification for Intrusion Detection in SCADA Systems , 2014, IEEE Transactions on Industrial Informatics.
[12] Aleksandr Rudkevich,et al. Adaptive convex relaxations for Gas Pipeline Network Optimization , 2017, 2017 American Control Conference (ACC).
[13] Lang Tong,et al. Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[14] Zuyi Li,et al. Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.
[15] Paul Honeine,et al. One-Class Classification Framework Based on Shrinkage Methods , 2018, J. Signal Process. Syst..
[16] Antonio J. Conejo,et al. Coordinated Expansion Planning of Natural Gas and Electric Power Systems , 2018, IEEE Transactions on Power Systems.
[17] Richard Brooks,et al. A survey of electric power synchrophasor network cyber security , 2014, IEEE PES Innovative Smart Grid Technologies, Europe.
[18] Donghua Zhou,et al. FAST LEAK DETECTION AND LOCATION OF GAS PIPELINES BASED ON AN ADAPTIVE PARTICLE FILTER , 2005 .
[19] Yang Liu,et al. A survey on bad data injection attack in smart grid , 2013, 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).
[20] Yang Xiang,et al. A survey on security control and attack detection for industrial cyber-physical systems , 2018, Neurocomputing.
[21] David Hutchison,et al. Evaluation of Anomaly Detection techniques for SCADA communication resilience , 2016, 2016 Resilience Week (RWS).
[22] Piroska Haller,et al. Data clustering-based anomaly detection in industrial control systems , 2014, 2014 IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP).
[23] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[24] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[25] Rick S. Blum,et al. Topology Attack Detection in Natural Gas Delivery Networks , 2019, 2019 53rd Annual Conference on Information Sciences and Systems (CISS).
[26] M. Spivak. Calculus On Manifolds: A Modern Approach To Classical Theorems Of Advanced Calculus , 2019 .
[27] Tanya L. Brewer,et al. Guidelines for Smart Grid Cybersecurity , 2014 .
[28] Tingting Li,et al. Multi-level Anomaly Detection in Industrial Control Systems via Package Signatures and LSTM Networks , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[29] Mashor Housh,et al. Model-based approach for cyber-physical attack detection in water distribution systems. , 2018, Water research.
[30] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[31] Igor V. Nikiforov,et al. A statistical method for detecting cyber/physical attacks on SCADA systems , 2014, 2014 IEEE Conference on Control Applications (CCA).
[32] Fei He,et al. Gas pipeline recovery from disruption using multi-objective optimization , 2017, 2017 IEEE International Symposium on Technologies for Homeland Security (HST).
[33] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[34] Andrzej J. Osiadacz Osiadacz,et al. Simulation and Analysis of Gas Networks , 1987 .
[35] Cheng Wang,et al. Robust Defense Strategy for Gas–Electric Systems Against Malicious Attacks , 2016, IEEE Transactions on Power Systems.
[36] Rick S. Blum,et al. A Statistical Learning-Based Algorithm for Topology Verification in Natural Gas Networks Based on Noisy Sensor Measurements , 2020, IEEE Transactions on Information Forensics and Security.
[37] Rick S. Blum,et al. A PMU Scheduling Scheme for Transmission of Synchrophasor Data in Electric Power Systems , 2014, IEEE Transactions on Smart Grid.
[38] Ross Baldick,et al. Solving the natural gas flow problem using semidefinite program relaxation , 2017, 2017 IEEE Power & Energy Society General Meeting.
[39] Peter Willett,et al. Feature article: security of SCADA systems against cyber–physical attacks , 2017, IEEE Aerospace and Electronic Systems Magazine.
[40] Xifan Wang,et al. An MILP-Based Optimal Power Flow in Multicarrier Energy Systems , 2017, IEEE Transactions on Sustainable Energy.
[41] Juan Lopez,et al. Firmware modification attacks on programmable logic controllers , 2013, Int. J. Crit. Infrastructure Prot..
[42] Haibo He,et al. Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..
[43] Igor Nikiforov,et al. Sequential monitoring of SCADA systems against cyber/physical attacks , 2015 .
[44] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[45] Dilip Patel,et al. Assessing and augmenting SCADA cyber security: A survey of techniques , 2017, Comput. Secur..
[46] Yatin Wadhawan,et al. Evaluating Resilience of Gas Pipeline Systems Under Cyber-Physical Attacks: A Function-Based Methodology , 2016, CPS-SPC '16.
[47] Chau Yuen,et al. Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid , 2018, IEEE Transactions on Smart Grid.
[48] H. Vincent Poor,et al. Approaches to Secure Inference in the Internet of Things: Performance Bounds, Algorithms, and Effective Attacks on IoT Sensor Networks , 2018, IEEE Signal Processing Magazine.
[49] Lang Tong,et al. On phasor measurement unit placement against state and topology attacks , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[50] Krishnaprasad Thirunarayan,et al. Detecting Integrity Attacks on Industrial Control Systems , 2014, Critical Infrastructure Protection.
[51] Pramod K. Varshney,et al. Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.
[52] Tao Ding,et al. Multi-Stage Stochastic Programming With Nonanticipativity Constraints for Expansion of Combined Power and Natural Gas Systems , 2018, IEEE Transactions on Power Systems.
[53] Ramteen Sioshansi,et al. Unit commitment under gas-supply uncertainty and gas-price variability , 2017, 2017 IEEE Power & Energy Society General Meeting.
[54] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[55] Ridha Soua,et al. Machine Learning for Reliable Network Attack Detection in SCADA Systems , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[56] Qaisar Shafi,et al. Cyber Physical Systems Security: A Brief Survey , 2012, 2012 12th International Conference on Computational Science and Its Applications.
[57] Salvatore Belsito,et al. Leak detection in liquefied gas pipelines by artificial neural networks , 1998 .
[58] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part II: Attack Detection Using Enhanced Hydrodynamic Models , 2013, IEEE Transactions on Control Systems Technology.
[59] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[60] Lei Wu,et al. Robust Co-Optimization Planning of Interdependent Electricity and Natural Gas Systems With a Joint N-1 and Probabilistic Reliability Criterion , 2018, IEEE Transactions on Power Systems.
[61] J. P. Gupta,et al. Securing oil and gas infrastructure , 2007 .
[62] Nicholas Judson,et al. Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security , 2013 .
[63] Xiaohua Ge,et al. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[64] Mark A. Buckner,et al. An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications , 2013, 2013 12th International Conference on Machine Learning and Applications.
[65] Xian-Da Zhang,et al. Matrix Analysis and Applications , 2017 .
[66] Antonio J. Conejo,et al. Shadow Price-Based Co-Ordination of Natural Gas and Electric Power Systems , 2019, IEEE Transactions on Power Systems.
[67] Emil Pricop,et al. Assessing the security risks of a wireless sensor network from a gas compressor station , 2014, Proceedings of the 2014 6th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
[68] Alex Talevski,et al. Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.