Resilience Analysis of Power Grids Under the Sequential Attack
暂无分享,去创建一个
Haibo He | Jun Yan | Yan Lindsay Sun | Yufei Tang | Yihai Zhu | Haibo He | Yufei Tang | Y. Sun | Yihai Zhu | Jun Yan
[1] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[2] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[3] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] Réka Albert,et al. Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[5] Vito Latora,et al. Modeling cascading failures in the North American power grid , 2005 .
[6] D. L. Pepyne,et al. Topology and cascading line outages in power grids , 2007 .
[7] I. Dobson,et al. Initial review of methods for cascading failure analysis in electric power transmission systems IEEE PES CAMS task force on understanding, prediction, mitigation and restoration of cascading failures , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[8] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[9] Fei Xue,et al. Structural vulnerability of power systems: A topological approach , 2011 .
[10] Jian-Wei Wang,et al. Cascade-based attack vulnerability on the US power grid. , 2009 .
[11] Athanasios V. Vasilakos,et al. SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[12] P. Hines,et al. Do topological models provide good information about electricity infrastructure vulnerability? , 2010, Chaos.
[13] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.
[14] Gil Zussman,et al. Network vulnerability to single, multiple, and probabilistic physical attacks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.
[15] Haibo He,et al. Risk-Aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[16] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[17] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[18] Anna Filomena Carbone,et al. Power Grid Complexity , 2011 .
[19] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[20] Paul Hines,et al. A “Random Chemistry” Algorithm for Identifying Collections of Multiple Contingencies That Initiate Cascading Failure , 2012, IEEE Transactions on Power Systems.
[21] I. Dobson,et al. Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.
[22] J. Hale,et al. Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid , 2012, 2012 5th International Symposium on Resilient Control Systems.
[23] Haibo He,et al. Load distribution vector based attack strategies against power grid systems , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[24] Neng Fan,et al. N-1-1 contingency-constrained optimal power flow by interdiction methods , 2012, 2012 IEEE Power and Energy Society General Meeting.
[25] H. Ghasemi,et al. Optimal Transmission Switching Considering Voltage Security and N-1 Contingency Analysis , 2013, IEEE Transactions on Power Systems.
[26] Jun Yan,et al. Risk-aware vulnerability analysis of electric grids from attacker's perspective , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).
[27] Wolfgang Kröger,et al. Performance of Electric Power Systems Under Physical Malicious Attacks , 2013, IEEE Systems Journal.
[28] Jeff Tollefson,et al. US electrical grid on the edge of failure , 2013, Nature.
[29] Zuyi Li,et al. Optimal budget deployment strategy against power grid interdiction , 2013, 2013 Proceedings IEEE INFOCOM.
[30] Haibo He,et al. Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map , 2013, IEEE Transactions on Information Forensics and Security.
[31] Haibo He,et al. Revealing temporal features of attacks against smart grid , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).
[32] Jinyu Wen,et al. Energy-Storage-Based Low-Frequency Oscillation Damping Control Using Particle Swarm Optimization and Heuristic Dynamic Programming , 2014, IEEE Transactions on Power Systems.
[33] Athanasios V. Vasilakos,et al. Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.
[34] Haibo He,et al. Integrated Security Analysis on Cascading Failure in Complex Networks , 2014, IEEE Transactions on Information Forensics and Security.
[35] Haibo He,et al. The sequential attack against power grid networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[36] Haibo He,et al. Supplementary File : Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph , 2013 .
[37] Xiaolei Dong,et al. Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..
[38] Jun Yan,et al. Cascading Failure Analysis With DC Power Flow Model and Transient Stability Analysis , 2015, IEEE Transactions on Power Systems.