Joint Substation-Transmission Line Vulnerability Assessment Against the Smart Grid
暂无分享,去创建一个
Haibo He | Jun Yan | Yan Lindsay Sun | Yufei Tang | Yihai Zhu | Haibo He | Yufei Tang | Y. Sun | Yihai Zhu | Jun Yan
[1] I. Dobson,et al. A LOADING-DEPENDENT MODEL OF PROBABILISTIC CASCADING FAILURE , 2005, Probability in the Engineering and Informational Sciences.
[2] Shanchieh Jay Yang,et al. Projecting Cyberattacks Through Variable-Length Markov Models , 2008, IEEE Transactions on Information Forensics and Security.
[3] Réka Albert,et al. Structural vulnerability of the North American power grid. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] Wolfgang Kröger,et al. Performance of Electric Power Systems Under Physical Malicious Attacks , 2013, IEEE Systems Journal.
[5] P. Hines,et al. Do topological models provide good information about electricity infrastructure vulnerability? , 2010, Chaos.
[6] Massimo Marchiori,et al. Model for cascading failures in complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[7] Gang Wang,et al. A Study of Self-Organized Criticality of Power System Under Cascading Failures Based on AC-OPF With Voltage Stability Margin , 2008, IEEE Transactions on Power Systems.
[8] Ian Dobson,et al. Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model , 2005 .
[9] Henrik Sandberg,et al. Challenges in Power System Information Security , 2012, IEEE Security & Privacy.
[10] Haibo He,et al. Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map , 2013, IEEE Transactions on Information Forensics and Security.
[11] Beom Jun Kim,et al. Attack vulnerability of complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[12] Haibo He,et al. Load distribution vector based attack strategies against power grid systems , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[13] Liang Zhang,et al. Attack vulnerability of scale-free networks due to cascading failures , 2008 .
[14] P. Hines,et al. Cascading failures in power grids , 2009, IEEE Potentials.
[15] Haibo He,et al. Risk-Aware Attacks and Catastrophic Cascading Failures in U.S. Power Grid , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[16] Haibo He,et al. The sequential attack against power grid networks , 2014, 2014 IEEE International Conference on Communications (ICC).
[17] Jun Yan,et al. Risk-aware vulnerability analysis of electric grids from attacker's perspective , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).
[18] Pak Chung Wong,et al. A Novel Visualization Technique for Electric Power Grid Analytics , 2009, IEEE Transactions on Visualization and Computer Graphics.
[19] I. Dobson,et al. Risk Assessment of Cascading Outages: Methodologies and Challenges , 2012, IEEE Transactions on Power Systems.
[20] Xu Cheng,et al. PTDF-based power system equivalents , 2005, IEEE Transactions on Power Systems.
[21] Hamed Mohsenian Rad,et al. False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[22] Florian Dörfler,et al. Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.
[23] Haibo He,et al. Resilience Analysis of Power Grids Under the Sequential Attack , 2014, IEEE Transactions on Information Forensics and Security.
[24] Zuyi Li,et al. Optimal budget deployment strategy against power grid interdiction , 2013, 2013 Proceedings IEEE INFOCOM.
[25] Naima Kaabouch,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[26] Haibo He,et al. Supplementary File : Revealing Cascading Failure Vulnerability in Power Grids using Risk-Graph , 2013 .
[27] Daniel S. Kirschen,et al. Criticality in a cascading failure blackout model , 2006 .
[28] Gang Wang,et al. An Improved OPA Model and Blackout Risk Assessment , 2009, IEEE Transactions on Power Systems.
[29] Paul Hines,et al. A “Random Chemistry” Algorithm for Identifying Collections of Multiple Contingencies That Initiate Cascading Failure , 2012, IEEE Transactions on Power Systems.
[30] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[31] Vito Latora,et al. Modeling cascading failures in the North American power grid , 2005 .
[32] Jeff Tollefson,et al. US electrical grid on the edge of failure , 2013, Nature.
[33] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[34] Aranya Chakrabortty,et al. A graph-theoretic algorithm for disturbance localization in large power grids using residue estimation , 2013, 2013 American Control Conference.
[35] Fei Xue,et al. Structural vulnerability of power systems: A topological approach , 2011 .
[36] Ehab Al-Shaer,et al. A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Transactions on Smart Grid.
[37] Chen-Ching Liu,et al. Intruders in the Grid , 2012, IEEE Power and Energy Magazine.
[38] Haibo He,et al. Integrated Security Analysis on Cascading Failure in Complex Networks , 2014, IEEE Transactions on Information Forensics and Security.
[39] Babu Narayanan,et al. POWER SYSTEM STABILITY AND CONTROL , 2015 .
[40] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[41] Mathieu Bastian,et al. Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.
[42] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[43] S Arianos,et al. Power grid vulnerability: a complex network approach. , 2008, Chaos.