CYBER-POWER SYSTEM ANALYSIS USING A REAL TIME TEST BED
暂无分享,去创建一个
[1] Saugata S. Biswas,et al. Development and real time implementation of a synchrophasor based fast voltage stability monitoring algorithm with consideration of load models , 2013, 2013 IEEE Industry Applications Society Annual Meeting.
[2] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[3] Mark Zeller,et al. Myth or reality — Does the Aurora vulnerability pose a risk to my generator? , 2011, 2011 64th Annual Conference for Protective Relay Engineers.
[4] Kameshwar Poolla,et al. Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[5] A. K. Srivastava,et al. Power system vulnerability analysis - towards validation of centrality measures , 2012, PES T&D 2012.
[6] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[7] R. Kuffel,et al. Real time digital simulation for control and protection system testing , 2004, 2004 IEEE 35th Annual Power Electronics Specialists Conference (IEEE Cat. No.04CH37551).
[8] Saugata S. Biswas,et al. A novel method for distributed real time voltage stability monitoring using synchrophasor measurements , 2013, 2013 IREP Symposium Bulk Power System Dynamics and Control - IX Optimization, Security and Control of the Emerging Power Grid.
[9] Richard Bellman,et al. ON A ROUTING PROBLEM , 1958 .
[10] Jeong Hun Kim,et al. Development of a smart grid test bed and applications in PMU and PDC testing , 2012, 2012 North American Power Symposium (NAPS).
[11] Saman A. Zonouz,et al. SECPSIM: A Training Simulator for cyber-power infrastructure security , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[12] Gary W. Chang,et al. Power System Analysis , 1994 .
[13] Anjan Bose,et al. Bandwidth and Latency Requirements for Smart Transmission Grid Applications , 2012, IEEE Transactions on Smart Grid.
[14] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[15] D M Faissol,et al. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches , 2009 .
[16] H. H. Happ,et al. Power System Control and Stability , 1979, IEEE Transactions on Systems, Man, and Cybernetics.
[17] Anjan Bose,et al. Smart grid communication requirements for the high voltage power system , 2011, 2011 IEEE Power and Energy Society General Meeting.
[18] Thomas H. Morris,et al. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.
[19] Laszlo Gyugyi,et al. Understanding FACTS: Concepts and Technology of Flexible AC Transmission Systems , 1999 .
[20] Mourad Debbabi,et al. Communication security for smart grid distribution networks , 2013, IEEE Communications Magazine.
[21] Dana A. Shea. Critical Infrastructure: Control Systems and the Terrorist Threat [Updated October 1, 2002] , 2002 .
[22] Pierluigi Siano,et al. Smart Operation of Wind Turbines and Diesel Generators According to Economic Criteria , 2011, IEEE Transactions on Industrial Electronics.
[23] Taskin Koçak,et al. Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.
[24] N. Hadjsaid,et al. Overview of the power systems security with regard to cyberattacks , 2009, 2009 Fourth International Conference on Critical Infrastructures.
[25] A. Bose,et al. A failure to communicate: next generation communication requirements, technologies, and architecture for the electric power grid , 2005, IEEE Power and Energy Magazine.
[26] Marcus K. Rogers,et al. A two-dimensional circumplex approach to the development of a hacker taxonomy , 2006, Digit. Investig..