An integrated detection system against false data injection attacks in the Smart Grid
暂无分享,去创建一个
Nada Golmie | Wei Yu | David W. Griffith | Linqiang Ge | Sulabh Bhattarai | Wei Yu | D. Griffith | N. Golmie | Linqiang Ge | Sulabh Bhattarai
[1] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[2] Sushil Jajodia,et al. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[3] Kameshwar Poolla,et al. Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[4] Darko Kirovski,et al. Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..
[5] Roger Corder,et al. Endotoxin induced hyperlactatemia and hypoglycemia is linked to decreased mitochondrial phosphoenolpyruvate carboxykinase. , 2009, Life sciences.
[6] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[7] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[8] Ruggero Carli,et al. A distributed method for state estimation and false data detection in power networks , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[9] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[10] William Stallings Zhu,et al. Network Security Essentials : Applications and Standards , 2007 .
[11] Xinwen Fu,et al. DSSS-Based Flow Marking Technique for Invisible Traceback , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Heejo Lee,et al. OMAP: One-Way Memory Attestation Protocol for Smart Meters , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
[13] V. Yohai,et al. Quantile–Quantile Plot for Deviance Residuals in the Generalized Linear Model , 2004 .
[14] Nicolas H. Younan,et al. An image-adaptive watermark based on a redundant wavelet transform , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[15] David G. Stork,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[16] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[17] Zhu Han,et al. Defending false data injection attack on smart grid network using adaptive CUSUM test , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[18] Yue Yuan,et al. Analysis of the environmental benefits of Distributed Generation , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[19] Kang Lee,et al. IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems , 2002, 2nd ISA/IEEE Sensors for Industry Conference,.
[20] Emanuele Garone,et al. False Data Injection Attacks for State Estimation in Cyber-Physical Systems , 2010, CDC 2010.
[21] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[22] Lang Tong,et al. Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[23] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[24] Bruce M. McMillin,et al. Information Flow Analysis of Energy Management in a Smart Grid , 2010, SAFECOMP.
[25] Wei Yu,et al. On statistical modeling and forecasting of energy usage in smart grid , 2014, RACS '14.
[26] Alvaro A. Cárdenas,et al. Evaluating Electricity Theft Detectors in Smart Grid Networks , 2012, RAID.
[27] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[28] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[29] Xinyu Yang,et al. On False Data Injection Attacks against Distributed Energy Routing in Smart Grid , 2012, 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems.
[30] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[31] Dmitry Podkuiko,et al. Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.
[32] Tao Jin,et al. Zero pre-shared secret key establishment in the presence of jammers , 2009, MobiHoc '09.
[33] June A. Flora,et al. Real-time Feedback and Electricity Consumption: A Field Experiment Assessing the Potential for Savings and Persistence , 2013 .
[34] Miodrag Potkonjak,et al. Real-time watermarking techniques for sensor networks , 2003, IS&T/SPIE Electronic Imaging.
[35] F.M. Cleveland,et al. Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[36] Harry L. Van Trees,et al. Detection, Estimation, and Modulation Theory, Part I , 1968 .
[37] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[38] David L. Mills,et al. Internet Engineering Task Force (ietf) Network Time Protocol Version 4: Protocol and Algorithms Specification , 2010 .
[39] Lang Tong,et al. Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[40] Lang Tong,et al. On malicious data attacks on power system state estimation , 2010, 45th International Universities Power Engineering Conference UPEC2010.
[41] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[42] Ibrahim Kamel,et al. Simplified watermarking scheme for sensor networks , 2010, Int. J. Internet Protoc. Technol..
[43] Grahame Smillie. Analogue and Digital Communication Techniques , 1999 .
[44] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .