Power flow cyber attacks and perturbation-based defense
暂无分享,去创建一个
[1] Karl Henrik Johansson,et al. Optimal power flow: Closing the loop over corrupted data , 2012, 2012 American Control Conference (ACC).
[2] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[3] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[4] William H. Sanders,et al. SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.
[5] Thierry Van Cutsem,et al. State estimation in electric power systems , 1982 .
[6] Kameshwar Poolla,et al. Smart grid data integrity attacks: characterizations and countermeasuresπ , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[7] Philip G. Hill,et al. Power generation , 1927, Journal of the A.I.E.E..
[8] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[9] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[10] Katherine M. Rogers,et al. Power System Control with Distributed Flexible AC Transmission System Devices , 2009 .
[11] Thomas J. Overbye,et al. Topology Perturbation for Detecting Malicious Data Injection , 2012, 2012 45th Hawaii International Conference on System Sciences.
[12] Anjan Bose,et al. On-line power system security analysis , 1992, Proc. IEEE.
[13] L. Tong,et al. Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[14] Peter W. Sauer,et al. Power System Dynamics and Stability , 1997 .
[15] Thomas J. Overbye,et al. Power flow control with Distributed Flexible AC Transmission System (D-FACTS) devices , 2009, 41st North American Power Symposium.
[16] Karl Henrik Johansson,et al. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.
[17] Liyan Jia,et al. On the nonlinearity effects on malicious data attack on power system , 2012, 2012 IEEE Power and Energy Society General Meeting.
[18] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[19] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[20] Lang Tong,et al. Impacts of Malicious Data on Real-Time Price of Electricity Market Operations , 2012, 2012 45th Hawaii International Conference on System Sciences.
[21] D.M. Divan,et al. A distributed static series compensator system for realizing active power flow control on existing power lines , 2004, IEEE PES Power Systems Conference and Exposition, 2004..
[22] Mulukutla S. Sarma,et al. Power System Analysis and Design , 1993 .
[23] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.