Cyber-Physical System Security of a Power Grid: State-of-the-Art
暂无分享,去创建一个
[1] Jie Wu,et al. Real time anomaly detection in wide area monitoring of smart grids , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[2] Robert C. Green,et al. Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .
[3] S. Shankar Sastry,et al. Game-Theoretic Models of Electricity Theft Detection in Smart Utility Networks: Providing New Capabilities with Advanced Metering Infrastructure , 2015, IEEE Control Systems.
[4] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[5] Dongho Kim,et al. Experience with DETER: a testbed for security research , 2006, 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TRIDENTCOM 2006..
[6] Vittorio Rosato,et al. Is the topology of the Internet network really fit to sustain its function , 2008 .
[7] K. McLaughlin,et al. Intrusion Detection System for IEC 60870-5-104 based SCADA networks , 2013, 2013 IEEE Power & Energy Society General Meeting.
[8] Gábor Hosszú,et al. Network-Based Intrusion Detection , 2008 .
[9] Yang Liu,et al. Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[10] John R. Williams,et al. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.
[11] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[12] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[13] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..
[14] Chen-Ching Liu,et al. An intrusion and defense testbed in a cyber-power system environment , 2011, 2011 IEEE Power and Energy Society General Meeting.
[15] A. Haslett. Electronics , 1948 .
[16] John Wroclawski,et al. Current Developments in DETER Cybersecurity Testbed Technology , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[17] Sukumar Kamalasadan,et al. A Lyapunov function based optimal hybrid power system controller for improved transient stability , 2016 .
[18] G. Manimaran,et al. Integrated Anomaly Detection for Cyber Security of the Substations , 2014, IEEE Transactions on Smart Grid.
[19] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[20] M.T.O. Amanullah,et al. Network Security Vulnerabilities in SCADA and EMS , 2005, 2005 IEEE/PES Transmission & Distribution Conference & Exposition: Asia and Pacific.
[21] Kim Fung Tsang,et al. Interference-Mitigated ZigBee-Based Advanced Metering Infrastructure , 2016, IEEE Transactions on Industrial Informatics.
[22] Alejandro D. Dominguez-Garcia,et al. Spoofing GPS Receiver Clock Offset of Phasor Measurement Units , 2013, IEEE Transactions on Power Systems.
[23] Tanya L. Brewer,et al. Smart Grid Cyber Security Strategy and Requirements , 2009 .
[24] Victor C. M. Leung,et al. Electricity Theft Detection in AMI Using Customers’ Consumption Patterns , 2016, IEEE Transactions on Smart Grid.
[25] Rose Qingyang Hu,et al. A security protocol for advanced metering infrastructure in smart grid , 2014, 2014 IEEE Global Communications Conference.
[26] Shuai Lu,et al. PMU-Based Wide-Area Security Assessment: Concept, Method, and Implementation , 2012, IEEE Transactions on Smart Grid.
[27] Saman A. Zonouz,et al. A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures , 2013, IEEE Journal on Selected Areas in Communications.
[28] Carl Eklund,et al. National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.
[29] Ward Jewell,et al. Wireless AMI application and security for controlled home area networks , 2011, 2011 IEEE Power and Energy Society General Meeting.
[30] David M. Nicol,et al. The Virtual Power System Testbed and Inter-Testbed Integration , 2009, CSET.
[31] Hamid Sharif,et al. A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[32] G. Manimaran,et al. Model-based intrustion detection for the smart grid (MINDS) , 2013, CSIIRW '13.
[33] Toru Ohira,et al. PHASE TRANSITION IN A COMPUTER NETWORK TRAFFIC MODEL , 1998 .
[34] Tarek N. Saadawi,et al. Experimental and theoretical modeling of DNP3 attacks in smart grids , 2015, 2015 36th IEEE Sarnoff Symposium.
[35] A.G. Phadke,et al. The Wide World of Wide-area Measurement , 2008, IEEE Power and Energy Magazine.
[36] Aditya Ashok,et al. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[37] M. Manic,et al. Improving cyber-security of smart grid systems via anomaly detection and linguistic domain knowledge , 2012, 2012 5th International Symposium on Resilient Control Systems.
[38] Robert Stone,et al. CenterTrack: An IP Overlay Network for Tracking DoS Floods , 2000, USENIX Security Symposium.
[39] David M. Nicol,et al. The Not-So-Smart Grid: Preliminary work on identifying vulnerabilities in ANSI C12.22 , 2012, 2012 IEEE Globecom Workshops.
[40] Annabelle Lee,et al. Guidelines for Smart Grid Cyber Security , 2010 .
[41] Chen-Ching Liu,et al. A co-simulation environment for integrated cyber and power systems , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[42] Chen-Ching Liu,et al. Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.
[43] D. Stallknecht. FACT SHEET , 2006 .
[44] Philippe Angays,et al. Integration of a New Standard: A Network Simulator of IEC 61850 Architectures for Electrical Substations , 2015, IEEE Industry Applications Magazine.
[45] Guo Zhizhong,et al. Cyber Security Vulnerability Assessment of Power Industry , 2006, TENCON 2006 - 2006 IEEE Region 10 Conference.
[46] Yawen Fan,et al. A Cross-Layer Defense Mechanism Against GPS Spoofing Attacks on PMUs in Smart Grids , 2015, IEEE Transactions on Smart Grid.
[47] Ing-Ray Chen,et al. Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.
[48] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[49] Dmitry Podkuiko,et al. Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.
[50] Yang Liu,et al. Cyberthreat Analysis and Detection for Energy Theft in Social Networking of Smart Homes , 2015, IEEE Transactions on Computational Social Systems.
[51] Siddharth Sridhar,et al. Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.
[52] Jia-Lun Tsai,et al. Secure Anonymous Key Distribution Scheme for Smart Grid , 2016, IEEE Transactions on Smart Grid.
[53] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[54] Liu Gao-wang,et al. Functional Vulnerability Assessment of SCADA Network , 2012, 2012 Asia-Pacific Power and Energy Engineering Conference.
[55] Deepa Kundur,et al. A Game-Theoretic Analysis of Cyber Switching Attacks and Mitigation in Smart Grid Systems , 2016, IEEE Transactions on Smart Grid.
[56] E.J. Byres,et al. Industrial cybersecurity for power system and SCADA networks , 2005, Record of Conference Papers Industry Applications Society 52nd Annual Petroleum and Chemical Industry Conference.
[57] S. Corsi,et al. A Real-Time Voltage Instability Identification Algorithm Based on Local Phasor Measurements , 2008, IEEE Transactions on Power Systems.