Against Data Attacks on Smart Grid Operations: Attack Mechanisms and Security Measures
暂无分享,去创建一个
[1] Lang Tong,et al. Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.
[2] Lang Tong,et al. Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.
[3] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[4] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[5] Petre Stoica,et al. MUSIC, maximum likelihood, and Cramer-Rao bound , 1989, IEEE Transactions on Acoustics, Speech, and Signal Processing.
[6] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[7] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[8] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[9] Lang Tong,et al. Dynamic attacks on power systems economic dispatch , 2014, 2014 48th Asilomar Conference on Signals, Systems and Computers.
[10] Richard M. Karp,et al. Reducibility Among Combinatorial Problems , 1972, 50 Years of Integer Programming.
[11] E. S. Page. CONTINUOUS INSPECTION SCHEMES , 1954 .
[12] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[13] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[14] V. Paschos. A survey of approximately optimal solutions to some covering and packing problems , 1997, CSUR.
[15] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[16] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[17] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[18] Hamed Mohsenian Rad,et al. False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[19] Lang Tong,et al. Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.
[20] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[21] Felix F. Wu,et al. Network Observability: Theory , 1985, IEEE Power Engineering Review.
[22] A. Ott,et al. Experience with PJM market operation, system design, and implementation , 2003 .
[23] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[24] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[25] George Kurtz,et al. Hacking Exposed: Network Security Secrets & Solutions , 1999 .
[26] Zhu Han,et al. Defending false data injection attack on smart grid network using adaptive CUSUM test , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[27] Ying Jun Zhang,et al. Defending mechanisms against false-data injection attacks in the power system state estimation , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[28] E. Handschin,et al. Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.
[29] Rong Zheng,et al. Stealth false data injection using independent component analysis in smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[30] Lang Tong,et al. On phasor measurement unit placement against state and topology attacks , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[31] Siddhartha Kumar Khaitan,et al. Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.
[32] T. Coleman,et al. The null space problem I. complexity , 1986 .
[33] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[34] J. Hull,et al. Staying in control: Cybersecurity and the modern electric grid , 2012, IEEE Power and Energy Magazine.
[35] H. Vincent Poor,et al. Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[36] Lang Tong,et al. Data framing attack on state estimation with unknown network parameters , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.
[37] Thomas J. Overbye,et al. Topology Perturbation for Detecting Malicious Data Injection , 2012, 2012 45th Hawaii International Conference on System Sciences.
[38] Marc E. Pfetsch,et al. The Computational Complexity of the Restricted Isometry Property, the Nullspace Property, and Related Concepts in Compressed Sensing , 2012, IEEE Transactions on Information Theory.
[39] G. Krumpholz,et al. Power System Observability: A Practical Algorithm Using Network Topology , 1980, IEEE Transactions on Power Apparatus and Systems.
[40] Le Xie,et al. Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets , 2013, IEEE Transactions on Smart Grid.
[41] Siddhartha Kumar Khaitan,et al. Cyber physical system approach for design of power grids: A survey , 2013, 2013 IEEE Power & Energy Society General Meeting.
[42] A. Monticelli. State estimation in electric power systems : a generalized approach , 1999 .