Cyber–physical interactions in power systems: A review of models, methods, and applications
暂无分享,去创建一个
Yixin Ni | Libao Shi | Qiangsheng Dai | Y. Ni | Libao Shi | Qiangsheng Dai
[1] Katherine R. Davis,et al. A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.
[2] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[3] Chuangxin Guo,et al. Incorporating Cyber Layer Failures in Composite Power System Reliability Evaluations , 2015 .
[4] Emilia Fridman,et al. Robustness of distributed averaging control in power systems: Time delays & dynamic communication topology , 2017, Autom..
[5] Bikash C. Pal,et al. Stability Analysis of Networked Control in Smart Grids , 2015, IEEE Transactions on Smart Grid.
[6] Paolo Attilio Pegoraro,et al. DMS Cyber-Physical Simulation for Assessing the Impact of State Estimation and Communication Media in Smart Grid Operation , 2014, IEEE Transactions on Power Systems.
[7] Abdullah Abusorrah,et al. Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.
[8] Jinde Cao,et al. Topological interactive analysis of power system and its communication module: A complex network approach , 2014 .
[9] Deepa Kundur,et al. A DER Attack-Mitigation Differential Game for Smart Grid Security Analysis , 2016, IEEE Transactions on Smart Grid.
[10] Jiexin Zhang,et al. Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory , 2017, Int. J. Crit. Infrastructure Prot..
[11] Béla Genge,et al. A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures , 2015, Int. J. Crit. Infrastructure Prot..
[12] Young-Woo Kim,et al. Protection Strategies Against False Data Injection Attacks with Uncertain Information on Electric Power Grids , 2017 .
[13] Fuchun Sun,et al. Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach , 2016, Int. J. Syst. Sci..
[14] Tao Jiang,et al. Effective method to determine time-delay stability margin and its application to power systems , 2017 .
[15] Alan A. Desrochers,et al. Modeling infrastructure interdependencies using Petri nets , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[16] Zhu Han,et al. Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.
[17] Siddharth Sridhar,et al. Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.
[18] Devendra Shelar,et al. Security Assessment of Electricity Distribution Networks Under DER Node Compromises , 2016, IEEE Transactions on Control of Network Systems.
[19] Alexander Sprintson,et al. Reliability Modeling and Analysis of IEC 61850 Based Substation Protection Systems , 2014, IEEE Transactions on Smart Grid.
[20] Lingfeng Wang,et al. Inclusion of SCADA Cyber Vulnerability in Power System Reliability Assessment Considering Optimal Resources Allocation , 2016, IEEE Transactions on Power Systems.
[21] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[22] Martin Maier,et al. Communications and power distribution network co-simulation for multidisciplinary smart grid experimentations , 2012, SpringSim.
[23] Eytan Modiano,et al. Mitigating cascading failures in interdependent power grids and communication networks , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[24] Wang Qi,et al. Overview of the co-simulation methods for power and communication system , 2016, RCAR.
[25] Alexandru Stefanov,et al. SCADA modeling for performance and vulnerability assessment of integrated cyber–physical systems , 2015 .
[26] J. Nutaro,et al. Integrated Hybrid-Simulation of Electric Power and Communications Systems , 2007, 2007 IEEE Power Engineering Society General Meeting.
[27] Kan Chen,et al. A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure , 2015, IEEE Transactions on Smart Grid.
[28] Zhao Yang Dong,et al. Will electrical cyber–physical interdependent networks undergo first-order transition under random attacks? , 2016 .
[29] Walid Saad,et al. Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks , 2018, IEEE Transactions on Smart Grid.
[30] José M. F. Moura,et al. Modeling of Future Cyber–Physical Energy Systems for Distributed Sensing and Control , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[31] Haibo He,et al. Integrated Security Analysis on Cascading Failure in Complex Networks , 2014, IEEE Transactions on Information Forensics and Security.
[32] Nirwan Ansari,et al. CONSUMER: A Novel Hybrid Intrusion Detection System for Distribution Networks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.
[33] Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
[34] Christian Wietfeld,et al. INSPIRE: Integrated co-simulation of power and ICT systems for real-time evaluation , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[35] Jianhui Wang,et al. Cyber-Physical Modeling and Cyber-Contingency Assessment of Hierarchical Control Systems , 2015, IEEE Transactions on Smart Grid.
[36] Liu Dong. Study on Cyber-Physical System Modeling on Coordinated Control of Photovoltaic Generation and Battery Energy Storage System , 2013 .
[37] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[38] David K. Y. Yau,et al. Profit-Optimal and Stability-Aware Load Curtailment in Smart Grids , 2013, IEEE Transactions on Smart Grid.
[39] Mohammad Shahidehpour,et al. A Simplified Co-Simulation Model for Investigating Impacts of Cyber-Contingency on Power System Operations , 2018, IEEE Transactions on Smart Grid.
[40] Parvaiz Ahmed Khand. System level security modeling using attack trees , 2009, 2009 2nd International Conference on Computer, Control and Communication.
[41] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[42] Md. Apel Mahmud,et al. Multi-Agent Approach for Enhancing Security of Protection Schemes in Cyber-Physical Energy Systems , 2017, IEEE Transactions on Industrial Informatics.
[43] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[44] Xinyu Yang,et al. On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.
[45] M. J. Hossain,et al. Distributed multi-agent scheme to enhance cyber security of smart power grids , 2015, 2015 IEEE Power & Energy Society General Meeting.
[46] Vincenzo Liberatore,et al. Smart grid communication and co-simulation , 2011, IEEE 2011 EnergyTech.
[47] Zahir Tari,et al. Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid , 2015, Inf. Syst..
[48] Yong Fu,et al. Reliability Assessment of Smart Grids Considering Indirect Cyber-Power Interdependencies , 2014, IEEE Transactions on Smart Grid.
[49] Mihalis Yannakakis,et al. Power Grid State Estimation Following a Joint Cyber and Physical Attack , 2018, IEEE Transactions on Control of Network Systems.
[50] Fushuan Wen,et al. Modeling Analysis and Control Research Framework of Cyber Physical Power Systems , 2011 .
[51] Yang Liu,et al. Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection , 2015, Future Gener. Comput. Syst..
[52] Kun Zhu,et al. ICT Architecture Impact on Wide Area Monitoring and Control Systems' Reliability , 2011, IEEE Transactions on Power Delivery.
[53] Zhiliang Wang,et al. False sequential logic attack on SCADA system and its physical impact analysis , 2016, Comput. Secur..
[54] Russell Bent,et al. Cyber-Physical Security: A Game Theory Model of Humans Interacting Over Control Systems , 2013, IEEE Transactions on Smart Grid.
[55] Harry Eugene Stanley,et al. Catastrophic cascade of failures in interdependent networks , 2009, Nature.
[56] Haibo He,et al. Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid , 2015, IEEE Transactions on Information Forensics and Security.
[57] Wenxia Liu,et al. Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM , 2010, IEEE Transactions on Power Delivery.
[58] Salim Hariri,et al. A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.
[59] William H. Sanders,et al. SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.
[60] Jeffrey L. Hieb,et al. Cyber security risk assessment for SCADA and DCS networks. , 2007, ISA transactions.
[61] P. Rangarajan,et al. Delay-dependent Stability Analysis of Microgrid with Constant and Time-varying Communication Delays , 2016 .
[62] Balasubramaniam Natarajan,et al. Goal-Based Holonic Multiagent System for Operation of Power Distribution Systems , 2015, IEEE Transactions on Smart Grid.
[63] Chen-Ching Liu,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees , 2007, 2007 IEEE Power Engineering Society General Meeting.
[64] Parviz Famouri,et al. Design, Modeling, and Simulation of On-Demand Communication Mechanisms for Cyber-Physical Energy Systems , 2014, IEEE Transactions on Industrial Informatics.
[65] Yufeng Xin,et al. ADMM Optimization Strategies for Wide-Area Oscillation Monitoring in Power Systems Under Asynchronous Communication Delays , 2016, IEEE Transactions on Smart Grid.
[66] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[67] Ying Chen,et al. A co-simulation platform for smart grid considering interaction between information and power systems , 2014, ISGT 2014.
[68] Hua Ye,et al. Efficient Eigen-Analysis for Large Delayed Cyber-Physical Power System Using Explicit Infinitesimal Generator Discretization , 2016, IEEE Transactions on Power Systems.
[69] R.F. Mills,et al. Analyzing Attack Trees using Generalized Stochastic Petri Nets , 2006, 2006 IEEE Information Assurance Workshop.
[70] Yong Fu,et al. Reliability Assessment of Smart Grid Considering Direct Cyber-Power Interdependencies , 2012, IEEE Transactions on Smart Grid.
[71] Anupam Joshi,et al. Data integrity attack in smart grid: optimised attack to gain momentary economic profit , 2016 .
[72] Chanan Singh,et al. Application of Bayesian networks in composite power system reliability assessment and reliability-based analysis , 2015 .
[73] K. Schneider,et al. Assessment of interactions between power and telecommunications infrastructures , 2006, IEEE Transactions on Power Systems.
[74] Jia Guo,et al. Modeling and Vulnerability Analysis of Cyber-Physical Power Systems Considering Network Topology and Power Flow Properties , 2017 .
[75] M. Pipattanasomporn,et al. Real-time co-simulation platform using OPAL-RT and OPNET for analyzing smart grid performance , 2015, 2015 IEEE Power & Energy Society General Meeting.
[76] Husheng Li,et al. Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.
[77] Jean-Claude Laprie,et al. Modelling Interdependencies Between the Electricity and Information Infrastructures , 2007, SAFECOMP.
[78] Fei Xue,et al. Vulnerability of interconnected power systems to malicious attacks under limited information , 2008 .
[79] Chanan Singh,et al. Power system reliability evaluation considering cyber-malfunctions in substations , 2015 .
[80] Haibo He,et al. Q-Learning-Based Vulnerability Analysis of Smart Grid Against Sequential Topology Attacks , 2017, IEEE Transactions on Information Forensics and Security.
[81] J. M. Arroyo,et al. A Genetic Algorithm Approach for the Analysis of Electric Grid Interdiction with Line Switching , 2009, 2009 15th International Conference on Intelligent System Applications to Power Systems.
[82] Deepa Kundur,et al. A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.
[83] Mourad Debbabi,et al. Enhancing WAMS Communication Network Against Delay Attacks , 2019, IEEE Transactions on Smart Grid.
[84] Sushmita Ruj,et al. Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory , 2013, 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA).
[85] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[86] Hua Ye,et al. Iterative infinitesimal generator discretization-based method for eigen-analysis of large delayed cyber-physical power system , 2017 .
[87] M. Cheng,et al. A game theory approach to vulnerability analysis: Integrating power flows with topological analysis , 2016 .
[88] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[89] Deepa Kundur,et al. A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems , 2016, IEEE Transactions on Smart Grid.
[90] Thoshitha T. Gamage,et al. Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid , 2015, IEEE Transactions on Smart Grid.
[91] Deepa Kundur,et al. Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.
[92] Deepa Kundur,et al. A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.
[93] Edward A. Lee,et al. Introduction to Embedded Systems - A Cyber-Physical Systems Approach , 2013 .
[94] Thomas M. Chen,et al. Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.
[95] Deepa Kundur,et al. A Cyber-Physical Control Framework for Transient Stability in Smart Grids , 2018, IEEE Transactions on Smart Grid.
[96] T.J. Overbye,et al. SCADA Cyber Security Testbed Development , 2006, 2006 38th North American Power Symposium.
[97] Ping Liu,et al. Characteristics and technical challenges in energy Internet cyber-physical system , 2016, 2016 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).
[98] Guanghui Wen,et al. Complex cyber-physical networks: From cybersecurity to security control , 2017, J. Syst. Sci. Complex..
[99] Christian Wietfeld,et al. Analyzing Cyber-Physical Energy Systems:The INSPIRE Cosimulation of Power and ICT Systems Using HLA , 2014, IEEE Transactions on Industrial Informatics.
[100] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[101] Thomas H. Morris,et al. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.
[102] Lingfeng Wang,et al. Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems , 2016, IEEE Transactions on Smart Grid.
[103] Wenyuan Xu,et al. On modeling of electrical cyber-physical systems considering cyber security , 2016, Frontiers of Information Technology & Electronic Engineering.
[104] Alberto Borghetti,et al. ICT-power co-simulation platform for the analysis of communication-based volt/var optimization in distribution feeders , 2014, ISGT 2014.
[105] Mesut Baran,et al. Extending EMTDC/PSCAD for Simulating Agent-Based Distributed Applications , 2002 .
[106] Takashi Hikihara,et al. A Hybrid System Approach to the Analysis and Design of Power Grid Dynamic Performance , 2012, Proceedings of the IEEE.
[107] Wei Yu,et al. On false data injection attacks against Kalman filtering in power system dynamic state estimation , 2016, Secur. Commun. Networks.
[108] Chen-Ching Liu,et al. Cyber intrusion of wind farm SCADA system and its impact analysis , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.