Observer-Based Attack Detection and Mitigation for Load Frequency Control System
暂无分享,去创建一个
Ying Wang | Chunyu Chen | Kaifeng Zhang | Ke Wang | Kun Yuan | Wenjun Bi | Kaifeng Zhang | K. Wang | Kun Yuan | Ying Wang | Chunyu Chen | Wenjun Bi
[1] Kameshwar Poolla,et al. Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[2] Ling Shi,et al. Optimal Denial-of-Service Attack Scheduling With Energy Constraint , 2015, IEEE Transactions on Automatic Control.
[3] Jitesh H. Panchal,et al. Risk Mitigation for Dynamic State Estimation Against Cyber Attacks and Unknown Inputs , 2015, IEEE Transactions on Smart Grid.
[4] Hao Liang,et al. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.
[5] Siddharth Sridhar,et al. Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.
[6] Roberto Maass-Moreno,et al. Fitting Models to Biological Data Using Linear and Nonlinear Regression: A Practical Guide to Curve Fitting.ByHarvey Motulskyand, Arthur Christopoulos.Oxford and New York: Oxford University Press. $65.00 (hardcover); $29.95 (paper). 351 p; ill.; index. ISBN: 0–19–517179–9 (hc); 0–19–517180–2 (pb). 2 , 2005 .
[7] Panos J. Antsaklis,et al. Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies , 2015, IEEE Transactions on Automatic Control.
[8] Ehab F. El-Saadany,et al. Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators , 2018, IEEE Transactions on Information Forensics and Security.
[9] Carlo Fischione,et al. Energy-efficient sampling of networked control systems over IEEE 802.15.4 wireless networks , 2013, Autom..
[10] Lingzhi Zhu,et al. Novel Detection Scheme Design Considering Cyber Attacks on Load Frequency Control , 2018, IEEE Transactions on Industrial Informatics.
[11] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[12] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[13] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[14] Qing-Long Han,et al. On Designing a Novel Self-Triggered Sampling Scheme for Networked Control Systems With Data Losses and Communication Delays , 2016, IEEE Transactions on Industrial Electronics.
[15] Dong Yue,et al. A Delay System Method for Designing Event-Triggered Controllers of Networked Control Systems , 2013, IEEE Transactions on Automatic Control.
[16] Kun Yuan,et al. Disturbance rejection-based LFC for multi-area parallel interconnected AC/DC system , 2016 .
[17] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.