Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks
暂无分享,去创建一个
Rick S. Blum | Parv Venkitasubramaniam | Lawrence V. Snyder | Shalinee Kishore | Jiyun Yao | S. Kishore | P. Venkitasubramaniam | L. Snyder | Jiyun Yao
[1] Lang Tong,et al. Impacts of Malicious Data on Real-Time Price of Electricity Market Operations , 2012, 2012 45th Hawaii International Conference on System Sciences.
[2] Parv Venkitasubramaniam,et al. The privacy analysis of battery control mechanisms in demand response: Revealing state approach and rate distortion bounds , 2014, 53rd IEEE Conference on Decision and Control.
[3] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[4] Massimo Franceschetti,et al. Random networks for communication : from statistical physics to information systems , 2008 .
[5] Christian Wietfeld,et al. A system design framework for scalability analysis of geographic routing algorithms in large-scale mesh networks , 2010, SimuTools.
[6] Nadeem Javaid,et al. Minimizing Electricity Theft Using Smart Meters in AMI , 2012, 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[7] Christian Wietfeld,et al. RF Mesh Systems for Smart Metering: System Architecture and Performance , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[8] Reinhard Diestel,et al. Graph Theory , 1997 .
[9] Ying Jun Zhang,et al. Defending mechanisms against false-data injection attacks in the power system state estimation , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[10] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[11] Philip Koopman. Embedded System Security , 2004, Computer.
[12] Sushil Jajodia,et al. Topological analysis of network attack vulnerability , 2006, PST.
[13] Nick Feamster,et al. Practical verification techniques for wide-area routing , 2004, Comput. Commun. Rev..
[14] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[15] A. Monticelli,et al. Electric power system state estimation , 2000, Proceedings of the IEEE.
[16] David R. Cheriton,et al. Feedback based routing , 2003, CCRV.
[17] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[18] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.
[19] Gene H. Golub,et al. Matrix computations , 1983 .
[20] Parv Venkitasubramaniam,et al. Achievable Privacy in Aggregate Residential Energy Management Systems , 2015 .