Packet-data anomaly detection in PMU-based state estimator using convolutional neural network
暂无分享,去创建一个
[1] K. Zou,et al. Correlation and simple linear regression. , 2003, Radiology.
[2] T. H. Morris,et al. Cyber security recommendations for wide area monitoring, protection, and control systems , 2012, 2012 IEEE Power and Energy Society General Meeting.
[3] Sukumar Brahma,et al. Efficient Compression of PMU Data in WAMS , 2016, IEEE Transactions on Smart Grid.
[4] Stéphane Mallat,et al. A Theory for Multiresolution Signal Decomposition: The Wavelet Representation , 1989, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Vijay Vittal,et al. PMU Data Buffering for Power System State Estimators , 2015, IEEE Power and Energy Technology Systems Journal.
[6] Husheng Li,et al. Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.
[7] Zuyi Li,et al. Cyber Cascades Screening Considering the Impacts of False Data Injection Attacks , 2018, IEEE Transactions on Power Systems.
[8] Victor O. K. Li,et al. Online False Data Injection Attack Detection With Wavelet Transform and Deep Neural Networks , 2018, IEEE Transactions on Industrial Informatics.
[9] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[10] Amr M. Youssef,et al. Detection of false data injection attacks in smart grids using Recurrent Neural Networks , 2018, 2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).
[11] Sukumar Brahma,et al. Characterizing and quantifying noise in PMU data , 2016, 2016 IEEE Power and Energy Society General Meeting (PESGM).
[12] Yoav Freund,et al. A decision-theoretic generalization of on-line learning and an application to boosting , 1997, EuroCOLT.
[13] Scott A. Wallace,et al. Rule-Based Data-Driven Analytics for Wide-Area Fault Detection Using Synchrophasor Data , 2017, IEEE Transactions on Industry Applications.
[14] Nikolaos M. Manousakis,et al. State estimation and bad data processing for systems including PMU and SCADA measurements , 2011 .
[15] Thomas H. Morris,et al. Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems , 2015, IEEE Transactions on Smart Grid.
[16] Jin Wei,et al. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.
[17] Sara Eftekharnejad,et al. Impact of false data injection attacks on PMU-based state estimation , 2017, 2017 North American Power Symposium (NAPS).
[18] George Michailidis,et al. Correlative monitoring for detection of false data injection attacks in smart grids , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[19] V. Madani,et al. Development of power system test bed for data mining of synchrophasors data, cyber-attack and relay testing in RTDS , 2012, 2012 IEEE Power and Energy Society General Meeting.
[20] Leo Breiman,et al. Bagging Predictors , 1996, Machine Learning.
[21] Thomas H. Morris,et al. Machine learning for power system disturbance and cyber-attack discrimination , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).
[22] Thomas J. Overbye,et al. Real-time detection of malicious PMU data , 2017, 2017 19th International Conference on Intelligent System Application to Power Systems (ISAP).
[23] Jian Fu,et al. A Novel Data Analytical Approach for False Data Injection Cyber-Physical Attack Mitigation in Smart Grids , 2017, IEEE Access.
[24] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[25] Kuldip K. Paliwal,et al. Bidirectional recurrent neural networks , 1997, IEEE Trans. Signal Process..
[26] Bo Tang,et al. Detection of false data attacks in smart grid with supervised learning , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[27] Tao Jiang,et al. Blind False Data Attacks Against AC State Estimation Based on Geometric Approach in Smart Grid Communications , 2018, IEEE Transactions on Smart Grid.
[28] Thomas H. Morris,et al. Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification , 2018, IEEE Transactions on Smart Grid.
[29] Jianhui Wang,et al. Real-time intrusion detection in power system operations , 2013, IEEE Transactions on Power Systems.
[30] Taghi M. Khoshgoftaar,et al. RUSBoost: A Hybrid Approach to Alleviating Class Imbalance , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[31] Xiaohua Ge,et al. Distributed Attack Detection and Secure Estimation of Networked Cyber-Physical Systems Against False Data Injection Attacks and Jamming Attacks , 2018, IEEE Transactions on Signal and Information Processing over Networks.
[32] Zuyi Li,et al. Mitigating False Data Attacks Induced Overloads Using a Corrective Dispatch Scheme , 2019, IEEE Transactions on Smart Grid.
[33] Yoshua Bengio,et al. Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.
[34] Xiaojiang Du,et al. Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid , 2017, IEEE Access.
[35] Lars Nordström,et al. Synchrophasor-based data mining for power system fault analysis , 2012, 2012 3rd IEEE PES Innovative Smart Grid Technologies Europe (ISGT Europe).
[36] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[37] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[38] Yannis Soupionis,et al. Faults and Cyber Attacks Detection in Critical Infrastructures , 2014, CRITIS.
[39] Ronald J. Williams,et al. A Learning Algorithm for Continually Running Fully Recurrent Neural Networks , 1989, Neural Computation.
[40] Min Xia,et al. Fault Diagnosis for Rotating Machinery Using Multiple Sensors and Convolutional Neural Networks , 2018, IEEE/ASME Transactions on Mechatronics.
[41] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[42] Wei Ren,et al. Effects of Switching Network Topologies on Stealthy False Data Injection Attacks Against State Estimation in Power Networks , 2017, IEEE Systems Journal.
[43] Marti A. Hearst. Trends & Controversies: Support Vector Machines , 1998, IEEE Intell. Syst..
[44] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[45] Fred C. Schweppe,et al. Power System Static-State Estimation, Part I: Exact Model , 1970 .
[46] Deepa Kundur,et al. Implementing a real-time cyber-physical system test bed in RTDS and OPNET , 2014, 2014 North American Power Symposium (NAPS).
[47] Joe H. Chow,et al. Defending Synchrophasor Data Networks Against Traffic Analysis Attacks , 2011, IEEE Transactions on Smart Grid.
[48] Rong Zheng,et al. Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Syst. J..
[49] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.