Extended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids
暂无分享,去创建一个
Yun Gu | Ting Liu | Xiaohong Guan | Chao Shen | Dai Wang | Zhanbo Xu | X. Guan | Zhanbo Xu | Chao Shen | Ting Liu | Dai Wang | Yun Gu
[1] H. Poor,et al. Fully Distributed State Estimation for Wide-Area Monitoring Systems , 2012, IEEE Transactions on Smart Grid.
[2] G.T. Heydt,et al. A Distributed State Estimator Utilizing Synchronized Phasor Measurements , 2007, IEEE Transactions on Power Systems.
[3] Mourad Debbabi,et al. Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.
[4] Robert J. Thomas,et al. MATPOWER's extensible optimal power flow architecture , 2009, 2009 IEEE Power & Energy Society General Meeting.
[5] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[6] Le Xie,et al. Fully distributed bad data processing for wide area state estimation , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[7] William H. Sanders,et al. SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.
[8] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[9] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[10] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[11] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[12] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[13] György Dán,et al. On the security of distributed power system state estimation under targeted attacks , 2013, SAC '13.
[14] Qiaoping Zhang,et al. A New and Efficient K-Medoid Algorithm for Spatial Clustering , 2005, ICCSA.
[15] William F. Tinney,et al. Optimal Power Flow Solutions , 1968 .
[16] J.F. Dopazo,et al. Implementation of the AEP real-time monitoring system , 1976, IEEE Transactions on Power Apparatus and Systems.
[17] Fred C. Schweppe,et al. Power System Static-State Estimation, Part I: Exact Model , 1970 .
[18] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[19] Lawrence Hasdorff,et al. Economic Dispatch Using Quadratic Programming , 1973 .
[20] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[21] Vipin Kumar,et al. Chameleon: Hierarchical Clustering Using Dynamic Modeling , 1999, Computer.
[22] P. Hespanha,et al. An Efficient MATLAB Algorithm for Graph Partitioning , 2006 .
[23] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[24] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[25] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[26] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[27] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[28] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[29] Jiang Wu,et al. A gradient information based real time pricing mechanism for microgrid in energy intensive enterprise , 2012, Proceedings of the 10th World Congress on Intelligent Control and Automation.