Cyber Cascades Screening Considering the Impacts of False Data Injection Attacks
暂无分享,去创建一个
Zuyi Li | Zhikang Shuai | Liang Che | Xuan Liu | Yunfeng Wen | Zuyi Li | Liang Che | Xuan Liu | Zhikang Shuai | Y. Wen
[1] Deepa Kundur,et al. A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.
[2] I. Dobson,et al. Initial review of methods for cascading failure analysis in electric power transmission systems IEEE PES CAMS task force on understanding, prediction, mitigation and restoration of cascading failures , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[3] Lingfeng Wang,et al. Power System Reliability Evaluation Considering Load Redistribution Attacks , 2017, IEEE Transactions on Smart Grid.
[4] Ian Dobson,et al. An Estimator of Propagation of Cascading Failure , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[5] Daniel Bienstock,et al. Optimal control of cascading power grid failures , 2011, IEEE Conference on Decision and Control and European Control Conference.
[6] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[7] A. Monticelli,et al. Electric power system state estimation , 2000, Proceedings of the IEEE.
[8] Haibo He,et al. Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..
[9] Zuyi Li,et al. Masking Transmission Line Outages via False Data Injection Attacks , 2016, IEEE Transactions on Information Forensics and Security.
[10] Zuyi Li,et al. Cyber Attacks Against the Economic Operation of Power Systems: A Fast Solution , 2017, IEEE Transactions on Smart Grid.
[11] J.D. McCalley,et al. Identifying high risk N-k contingencies for online security assessment , 2005, IEEE Transactions on Power Systems.
[12] R.C. Hardiman,et al. An advanced tool for analyzing multiple cascading failures , 2005, 2004 International Conference on Probabilistic Methods Applied to Power Systems.
[13] Jose M. Arroyo,et al. Bilevel programming applied to power system vulnerability analysis under multiple contingencies , 2010 .
[14] Zuyi Li,et al. False Data Attacks Against AC State Estimation With Incomplete Network Information , 2017, IEEE Transactions on Smart Grid.
[15] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[16] Zuyi Li,et al. Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.
[17] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[18] Massimo Marchiori,et al. Model for cascading failures in complex networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[19] Oliver Kosut,et al. Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation , 2015, IEEE Transactions on Power Systems.
[20] Adilson E Motter,et al. Cascade-based attacks on complex networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[21] Husheng Li,et al. Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.
[22] Reuven Cohen,et al. Spatio-temporal propagation of cascading overload failures in spatially embedded networks , 2016, Nature Communications.
[23] Zuyi Li,et al. Mitigating False Data Attacks Induced Overloads Using a Corrective Dispatch Scheme , 2019, IEEE Transactions on Smart Grid.
[24] Zhao Yang Dong,et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.
[25] Zuyi Li,et al. Trilevel Modeling of Cyber Attacks on Transmission Lines , 2017, IEEE Transactions on Smart Grid.