Data attack on strategic buses in the power grid: Design and protection
暂无分享,去创建一个
[1] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[2] Peter Sanders,et al. Shortest Paths , 1968, The Mathematical Gazette.
[3] A.G. Phadke,et al. Synchronized phasor measurements in power systems , 1993, IEEE Computer Applications in Power.
[4] Sriram Vishwanath,et al. Optimal hidden SCADA attacks on power grid: A graph theoretic approach , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[5] D. R. Fulkerson,et al. Maximal Flow Through a Network , 1956 .
[6] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[7] Lang Tong,et al. Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[8] Thomas L. Magnanti,et al. Shortest paths, single origin-destination network design, and associated polyhedra , 1993, Networks.
[9] Mechthild Stoer,et al. A simple min-cut algorithm , 1997, JACM.
[10] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[11] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[12] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.