Cyber-Attacks in the Automatic Generation Control
暂无分享,去创建一个
John Lygeros | Maria Vrakopoulou | Kostas Margellos | Goran Andersson | Peyman Mohajerin Esfahani | J. Lygeros | G. Andersson | Kostas Margellos | Maria Vrakopoulou
[1] S. Sastry. Nonlinear Systems: Analysis, Stability, and Control , 1999 .
[2] John Lygeros,et al. A tractable nonlinear fault detection and isolation technique with application to the cyber-physical security of power systems , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[3] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[4] F. Bouffard,et al. Keeping the lights on and the information flowing , 2009, IEEE Power and Energy Magazine.
[5] Siddhartha Kumar Khaitan,et al. Cyber physical system approach for design of power grids: A survey , 2013, 2013 IEEE Power & Energy Society General Meeting.
[6] Goran Andersson,et al. Dynamics and Control of Electric Power Systems , 2007 .
[7] Siddhartha Kumar Khaitan,et al. Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.
[8] Alexandre M. Bayen,et al. A time-dependent Hamilton-Jacobi formulation of reachable sets for continuous dynamic games , 2005, IEEE Transactions on Automatic Control.
[9] H. H. Happ,et al. Power System Control and Stability , 1979, IEEE Transactions on Systems, Man, and Cybernetics.
[10] Gene F. Franklin,et al. Feedback Control of Dynamic Systems , 1986 .
[11] M. Negrete-Pincetic,et al. Towards quantifying the impacts of cyber attacks in the competitive electricity market environment , 2009, 2009 IEEE Bucharest PowerTech.
[12] P. Kundur,et al. Power system stability and control , 1994 .
[13] John Lygeros,et al. Stochastic Optimization on Continuous Domains With Finite-Time Guarantees by Markov Chain Monte Carlo Methods , 2009, IEEE Transactions on Automatic Control.
[14] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[15] Douglas P. Looze. Franklin, Powell and Emami-Naeini, Feedback Control of Dynamic Systems, 6 th Edition, Prentice-Hall, 2010. (referred to as FPE) References: Ogata, Modern Control Engineering, Prentice-Hall, 2009. Dorf, Modern Control Systems, Prentice-Hall, 2008. , 2013 .
[16] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[17] John Lygeros,et al. Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.
[18] John Lygeros,et al. On reachability and minimum cost optimal control , 2004, Autom..
[19] John Lygeros,et al. A robust policy for Automatic Generation Control cyber attack in two area power network , 2010, 49th IEEE Conference on Decision and Control (CDC).
[20] Mathias Ekstedt,et al. Vulnerability assessment of SCADA systems , 2011 .
[21] John Lygeros,et al. A Tractable Fault Detection and Isolation Approach for Nonlinear Systems With Probabilistic Performance , 2014, IEEE Transactions on Automatic Control.
[22] Jian-Wei Wang,et al. Cascade-based attack vulnerability on the US power grid. , 2009 .
[23] I. Kamwa,et al. Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance , 2005, IEEE Transactions on Power Systems.
[24] Turhan Demiray,et al. Simulation of Power System Dynamics using Dynamic Phasor Models , 2008 .
[25] Marek Zima,et al. Operation, Monitoring and Control Technology of Power Systems , 2007 .