New Approaches to Smart Grid Security with SCADA Systems
暂无分享,去创建一个
[1] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[2] A. Abur,et al. Improved bad data processing via strategic placement of PMUs , 2005, IEEE Power Engineering Society General Meeting, 2005.
[3] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[4] Vasant Honavar,et al. Intelligent agents for intrusion detection , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[5] Ning Lu,et al. Smart-grid security issues , 2010, IEEE Security & Privacy.
[6] Mary Grammatikou,et al. An Architectural Framework for Distributed Intrusion Detection Using Smart Agents , 2004, Security and Management.
[7] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[8] B. Fardanesh,et al. Advanced disturbance recording and playback enabled by a distributed dynamic state estimation including bad data detection and topology change identification , 2012, 2012 IEEE Power and Energy Society General Meeting.
[9] G. Sheblé,et al. Power generation operation and control — 2nd edition , 1996 .
[10] Seema Singh,et al. Applications of phasor measurement units (PMUs) in electric power system networks incorporated with FACTS controllers , 2011 .
[11] Srikanth H Kamath,et al. Smart Grid: An Overview , 2015 .
[12] Xiang Chen,et al. Output consensus control for heterogeneous multi-agent systems , 2013, 52nd IEEE Conference on Decision and Control.
[13] Yun Gu,et al. Bad data detection method for smart grids based on distributed state estimation , 2013, 2013 IEEE International Conference on Communications (ICC).
[14] Jan F. Kreider,et al. Distributed Generation : The Power Paradigm for the New Millennium , 2001 .
[15] Reza Olfati-Saber,et al. Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.
[16] CneKTpaJrbHbIX WIeHOB,et al. Algebraic Properties of Minimal Degree Spectral Factors * + , 2005 .
[17] A. Monticelli,et al. Fast Decoupled State Estimation and Bad Data Processing , 1979, IEEE Transactions on Power Apparatus and Systems.
[18] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[19] V. Vasudevan,et al. Agent based Intrusion Detection System: A Computational Biology Approach , 2006, 2006 Annual IEEE India Conference.
[20] Jeu-Min Lin,et al. A Static State Estimation Approach Including Bad Data Detection and Identification in Power Systems , 2007, 2007 IEEE Power Engineering Society General Meeting.
[21] J. Doyle,et al. Robust and optimal control , 1995, Proceedings of 35th IEEE Conference on Decision and Control.
[22] A. Jain,et al. A Review of Power System Dynamic State Estimation Techniques , 2008, 2008 Joint International Conference on Power System Technology and IEEE Power India Conference.
[23] E. Byres,et al. The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .
[24] Lennart Ljung,et al. System Identification: Theory for the User , 1987 .
[25] Robert J. Turk. Cyber Incidents Involving Control Systems , 2005 .
[26] Mario Montagna,et al. Multiple bad data processing by genetic algorithms , 2003, 2003 IEEE Bologna Power Tech Conference Proceedings,.
[27] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[28] Fred C. Schweppe,et al. Power System Static-State Estimation, Part III: Implementation , 1970 .
[29] Juan M. Gers. Smart Grid overview , 2013 .
[30] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[31] George J. Pappas,et al. Stochastic game approach for replay attack detection , 2013, 52nd IEEE Conference on Decision and Control.
[32] D. Rh. International symposium on pain. , 1973 .
[33] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[34] Patrice Clemente,et al. A Collaborative Approach for Access Control, Intrusion Detection and Security Testing , 2006, International Symposium on Collaborative Technologies and Systems (CTS'06).
[35] Mi-Ching Tsai,et al. Robust and Optimal Control , 2014 .
[36] Yu Er-keng,et al. A New Approach for Detection and Identification of Multiple Bad Data in Power System State Estimation , 1982, IEEE Transactions on Power Apparatus and Systems.
[37] J. Capon. High-resolution frequency-wavenumber spectrum analysis , 1969 .
[38] Nei Kato,et al. An early warning system against malicious activities for smart grid communications , 2011, IEEE Network.
[39] N.H. Abbasy,et al. Power system state estimation: ANN application to bad data detection and identification , 1996, Proceedings of IEEE. AFRICON '96.
[40] R. Romero,et al. Identifying multiple interacting bad data in power system state estimation , 2005, IEEE Power Engineering Society General Meeting, 2005.
[41] A. Abur,et al. Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.
[42] Hao Zhu,et al. Sparse Overcomplete Representations for Efficient Identification of Power Line Outages , 2012, IEEE Transactions on Power Systems.
[43] Randal W. Beard,et al. Consensus seeking in multiagent systems under dynamically changing interaction topologies , 2005, IEEE Transactions on Automatic Control.
[44] Sajal K. Das,et al. Security and Discoverability of Spread Dynamics in Cyber-Physical Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[45] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[46] E. Handschin,et al. Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.
[47] Fred C. Schweppe,et al. Power System Static-State Estimation, Part II: Approximate Model , 1970 .
[48] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[49] Petre Stoica,et al. Spectral Analysis of Signals , 2009 .
[50] Robert C. Green,et al. Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .
[51] Ing-Ray Chen,et al. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.
[52] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[53] Guoxiang Gu,et al. Generalized LQR control and Kalman filtering with relations to computations of inner-outer and spectral factorizations , 2006, IEEE Transactions on Automatic Control.
[54] John Y. Hung,et al. Denial of service attacks on network-based control systems: impact and mitigation , 2005, IEEE Transactions on Industrial Informatics.
[55] Mohamed G. Gouda,et al. Firewall design: consistency, completeness, and compactness , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[56] Jong-Ho Lee,et al. Detection of replay attacks in smart grid systems , 2013, 2013 International Conference on Computing, Management and Telecommunications (ComManTel).
[57] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[58] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[59] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[60] S. Shankar Sastry,et al. Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.
[61] Yunzhi Cheng,et al. Dynamic parameter identification of generators for smart grid development , 2011, 2011 IEEE Power and Energy Society General Meeting.
[62] Frank L. Lewis,et al. Optimal Design for Synchronization of Cooperative Systems: State Feedback, Observer and Output Feedback , 2011, IEEE Transactions on Automatic Control.
[63] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[64] K. Tamine,et al. Intelligent Agents for Distributed Intrusion Detection System , 2007 .
[65] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[66] Bruno Sinopoli,et al. Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[67] A. Monticelli. State estimation in electric power systems : a generalized approach , 1999 .
[68] Fred C. Schweppe,et al. Power System Static-State Estimation, Part I: Exact Model , 1970 .
[69] D. Hill,et al. Generalizations and new proof of the discrete-time positive real lemma and bounded real lemma , 1999 .
[70] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[71] A. Simoes-Costa,et al. Bad Data Detection and Identification Techniques Using Estimation Orthogonal Methods , 1982, IEEE Transactions on Power Apparatus and Systems.