An Overview About Detection of Cyber-Attacks on Power SCADA Systems
暂无分享,去创建一个
[1] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[2] Akanksha Singh,et al. A review of possibilities and solutions of cyber attacks in smart grids , 2016, 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH).
[3] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[4] Jian Fu,et al. A Novel Data Analytical Approach for False Data Injection Cyber-Physical Attack Mitigation in Smart Grids , 2017, IEEE Access.
[5] Xiaojiang Du,et al. Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid , 2017, IEEE Access.
[6] Yanfei Sun,et al. Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid , 2017, IEEE Transactions on Smart Grid.
[7] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[8] Rajendra Kumar Pandey,et al. Cyber security threats — Smart grid infrastructure , 2016, 2016 National Power Systems Conference (NPSC).
[9] Naganand Doraswamy,et al. Ipsec: the new security standard for the internet , 1999 .
[10] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[11] Toru Namerikawa,et al. Detection of replay attack on smart grid with code signal and bargaining game , 2017, 2017 American Control Conference (ACC).
[12] Jin Wei,et al. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism , 2017, IEEE Transactions on Smart Grid.
[13] Hamzah Hilal,et al. Network security analysis SCADA system automation on industrial process , 2017, 2017 International Conference on Broadband Communication, Wireless Sensors and Powering (BCWSP).
[14] K. McLaughlin,et al. Multiattribute SCADA-Specific Intrusion Detection System for Power Networks , 2014, IEEE Transactions on Power Delivery.
[15] Rong Zheng,et al. Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.
[16] Jaime Zuniga-Mejia,et al. A Linear Systems Perspective on Intrusion Detection for Routing in Reconfigurable Wireless Networks , 2019, IEEE Access.
[17] Rajesh Kalluri,et al. Simulation and impact analysis of denial-of-service attacks on power SCADA , 2016, 2016 National Power Systems Conference (NPSC).
[18] Tiago Antonio Rizzetti,et al. Cyber security and communications network on SCADA systems in the context of Smart Grids , 2015, 2015 50th International Universities Power Engineering Conference (UPEC).
[19] Ralph Langner. To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .
[20] G. Manimaran,et al. Data integrity attacks and their impacts on SCADA control system , 2010, IEEE PES General Meeting.
[21] Esraa Alomari,et al. Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art , 2012, ArXiv.
[22] Leandros A. Maglaras,et al. A Cybersecurity Detection Framework for Supervisory Control and Data Acquisition Systems , 2016, IEEE Transactions on Industrial Informatics.
[23] A. P. A. D. Silva,et al. State forecasting in electric power systems , 1983 .
[24] Zhao Yang Dong,et al. A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.
[25] R. C. Diovu,et al. A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks , 2017, 2017 IEEE PES PowerAfrica.
[26] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[27] Ahmad Lotfi,et al. Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET , 2015, 2015 European Intelligence and Security Informatics Conference.
[28] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[29] Junbo Zhao,et al. Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks , 2017, IEEE Transactions on Smart Grid.
[30] Panagiotis G. Sarigiannidis,et al. Securing the Smart Grid: A Comprehensive Compilation of Intrusion Detection and Prevention Systems , 2019, IEEE Access.
[31] Ramesh C. Bansal,et al. Analytical strategies for renewable distributed generation integration considering energy loss minimization , 2013 .
[32] Tzu-Liang Tseng,et al. Secure SCADA communication network for detecting and preventing cyber-attacks on power systems , 2016, 2016 Clemson University Power Systems Conference (PSC).
[33] Leandros A. Maglaras,et al. Combining ensemble methods and social network metrics for improving accuracy of OCSVM on intrusion detection in SCADA systems , 2015, J. Inf. Secur. Appl..
[34] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[35] P. Rodriguez,et al. Local Reactive Power Control Methods for Overvoltage Prevention of Distributed Solar Inverters in Low-Voltage Grids , 2011, IEEE Journal of Photovoltaics.
[36] Frederick T. Sheldon,et al. Detecting Stealthy False Data Injection Attacks in Power Grids Using Deep Learning , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).
[37] R. C. Diovu,et al. Quantitative analysis of firewall security under DDoS attacks in smart grid AMI networks , 2017, 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON).
[38] Vishwa Teja Alaparthy,et al. A Multi-Level Intrusion Detection System for Wireless Sensor Networks Based on Immune Theory , 2018, IEEE Access.
[39] Lucie Langer,et al. Analysing cyber-physical attacks to a Smart Grid: A voltage control use case , 2016, 2016 Power Systems Computation Conference (PSCC).
[40] Thomas M. Chen,et al. Lessons from Stuxnet , 2011, Computer.
[41] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[42] Bill Rose,et al. Microgrids , 2018, Smart Grids.
[43] Peter Maynard,et al. Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations , 2015, 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA).
[44] Zahir Tari,et al. An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems , 2016, IEEE Transactions on Information Forensics and Security.
[45] Kit Po Wong,et al. Forecasting-Aided Imperfect False Data Injection Attacks Against Power System Nonlinear State Estimation , 2016, IEEE Transactions on Smart Grid.
[46] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[47] Stefano Panzieri,et al. From Detecting Cyber-Attacks to Mitigating Risk Within a Hybrid Environment , 2019, IEEE Systems Journal.
[48] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[49] Xiaodong Wang,et al. Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.
[50] Peter Willett,et al. Feature article: security of SCADA systems against cyber–physical attacks , 2017, IEEE Aerospace and Electronic Systems Magazine.
[51] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[52] Delly Oliveira Filho,et al. Distributed photovoltaic generation and energy storage systems: A review , 2010 .
[53] Guoqiang Hu,et al. Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks , 2018, IEEE Transactions on Cybernetics.