Semantic security analysis of SCADA networks to detect malicious control commands in power grids
暂无分享,去创建一个
Ravishankar K. Iyer | Zbigniew T. Kalbarczyk | Peter W. Sauer | Hui Lin | Adam J. Slagell | Z. Kalbarczyk | P. Sauer | A. Slagell | Hui Lin | R. Iyer
[1] R. Gutman,et al. Analytical Development of Loadability Characteristics for EHV and UHV Transmission Lines , 1979, IEEE Transactions on Power Apparatus and Systems.
[2] A. Monticelli,et al. Electric power system state estimation , 2000, Proceedings of the IEEE.
[3] Anjan Bose,et al. A topology processor that tracks network modifications , 1988 .
[4] Hongbin Sun,et al. Transition to a Two-Level Linear State Estimator—Part I: Architecture , 2011, IEEE Transactions on Power Systems.
[5] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[6] Ravishankar K. Iyer,et al. Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol , 2013, CSIIRW '13.
[7] Sandip Roy,et al. Power System Extreme Event Detection: The Vulnerability Frontier , 2007, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[8] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[9] Igor Nai Fovino,et al. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept , 2009, CRITIS.
[10] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.