Subspace Methods for Data Attack on State Estimation: A Data Driven Approach
暂无分享,去创建一个
[1] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[2] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[3] J. Hull,et al. Staying in control: Cybersecurity and the modern electric grid , 2012, IEEE Power and Energy Magazine.
[4] Henry Cox,et al. Eigenvalue Beamforming Using a Multirank MVDR Beamformer and Subspace Selection , 2008, IEEE Transactions on Signal Processing.
[5] Kameshwar Poolla,et al. Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[6] T. W. Anderson. ASYMPTOTIC THEORY FOR PRINCIPAL COMPONENT ANALYSIS , 1963 .
[7] G. Krumpholz,et al. Power System Observability: A Practical Algorithm Using Network Topology , 1980, IEEE Transactions on Power Apparatus and Systems.
[8] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[9] Mats Viberg,et al. Subspace-based methods for the identification of linear time-invariant systems , 1995, Autom..
[10] Ying Jun Zhang,et al. Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.
[11] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[12] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[13] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[14] J. Norris. Appendix: probability and measure , 1997 .
[15] Rong Zheng,et al. Stealth false data injection using independent component analysis in smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[16] Lang Tong,et al. Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.
[17] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[18] Garry Tamlyn,et al. Music , 1993 .
[19] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[20] Jing Huang,et al. State Estimation in Electric Power Grids: Meeting New Challenges Presented by the Requirements of the Future Grid , 2012, IEEE Signal Processing Magazine.
[21] R. F.,et al. Mathematical Statistics , 1944, Nature.
[22] Petre Stoica,et al. MUSIC, maximum likelihood, and Cramer-Rao bound , 1989, IEEE Transactions on Acoustics, Speech, and Signal Processing.
[23] H. V. Trees,et al. Covariance, Subspace, and Intrinsic CramrRao Bounds , 2007 .
[24] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[25] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[26] Ying Jun Zhang,et al. Defending mechanisms against false-data injection attacks in the power system state estimation , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[27] E. Handschin,et al. Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.
[28] Lang Tong,et al. On phasor measurement unit placement against state and topology attacks , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[29] S.T. Smith,et al. Covariance, subspace, and intrinsic Crame/spl acute/r-Rao bounds , 2005, IEEE Transactions on Signal Processing.
[30] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[31] Anuj Srivastava,et al. A Bayesian approach to geometric subspace estimation , 2000, IEEE Trans. Signal Process..
[32] Edward A. Lee. Cyber Physical Systems: Design Challenges , 2008, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC).
[33] Hamed Mohsenian Rad,et al. False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[34] Lang Tong,et al. Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.