Robust false data injection attacks in electricity markets by limited adversaries
暂无分享,去创建一个
[1] S. Hunt,et al. Making Competition Work in Electricity , 2002 .
[2] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[3] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[4] Le Xie,et al. Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets , 2013, IEEE Transactions on Smart Grid.
[5] A. Ott,et al. Experience with PJM market operation, system design, and implementation , 2003 .
[6] Fangxing Li,et al. Improving an Unjustified Common Practice in Ex Post LMP Calculation , 2010, IEEE Transactions on Power Systems.
[7] Zhu Han,et al. Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.
[8] Adnan Anwar,et al. Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements , 2016, PAISI.
[9] Xia Lei,et al. Research on Multistep Electricity Price Model with Bidirectional Regulation for Large Consumers , 2010, 2010 International Conference on Electrical and Control Engineering.
[10] M. Negrete-Pincetic,et al. Towards quantifying the impacts of cyber attacks in the competitive electricity market environment , 2009, 2009 IEEE Bucharest PowerTech.
[11] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[12] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[13] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[14] Xinyu Yang,et al. On false data injection attack against Multistep Electricity Price in electricity market in smart grid , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[15] Yurii Nesterov,et al. Interior-point polynomial algorithms in convex programming , 1994, Siam studies in applied mathematics.
[16] Lang Tong,et al. Impacts of Malicious Data on Real-Time Price of Electricity Market Operations , 2012, 2012 45th Hawaii International Conference on System Sciences.
[17] Dick Duffey,et al. Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.
[18] Lang Tong,et al. Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[19] H. Vincent Poor,et al. Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[20] Liyan Jia,et al. On the nonlinearity effects on malicious data attack on power system , 2012, 2012 IEEE Power and Energy Society General Meeting.
[21] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.