Security games for voltage control in smart grid
暂无分享,去创建一个
[1] Pravin Varaiya,et al. Smart Operation of Smart Grid: Risk-Limiting Dispatch , 2011, Proceedings of the IEEE.
[2] Tansu Alpcan,et al. Network Security , 2010 .
[3] J.J. Paserba,et al. Secondary voltage-VAr controls applied to static compensators (STATCOMs) for fast voltage control and long term VAr management , 2002, IEEE Power Engineering Society Summer Meeting,.
[4] Chen-Ching Liu,et al. Risk Analysis of Coordinated Cyber Attacks on Power Grid , 2012 .
[5] Douglas W. Hubbard,et al. The Failure of Risk Management: Why It's Broken and How to Fix It , 2009 .
[6] Yoav Shoham,et al. Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .
[7] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[8] Richard Kissel,et al. Glossary of Key Information Security Terms , 2014 .
[9] G. Manimaran,et al. Data integrity attack and its impacts on voltage control loop in power grid , 2011, 2011 IEEE Power and Energy Society General Meeting.
[10] Jack Wiles. Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure , 2008 .
[11] Deepa Kundur,et al. Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.
[12] Wenxia Liu,et al. Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM , 2010, IEEE Transactions on Power Delivery.
[13] Thierry Van Cutsem,et al. Voltage Stability of Electric Power Systems , 1998 .
[14] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[15] John Lygeros,et al. A robust policy for Automatic Generation Control cyber attack in two area power network , 2010, 49th IEEE Conference on Decision and Control (CDC).
[16] Matthew Leitch,et al. ISO 31000:2009—The New International Standard on Risk Management , 2010, Risk analysis : an official publication of the Society for Risk Analysis.
[17] L. Nordstrom,et al. Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams , 2009, IEEE Transactions on Power Delivery.
[18] Tansu Alpcan,et al. Security Risk Management via Dynamic Games with Learning , 2011, 2011 IEEE International Conference on Communications (ICC).
[19] Tansu Alpcan,et al. Dynamic Control and Mitigation of Interdependent IT Security Risks , 2010, 2010 IEEE International Conference on Communications.
[20] R. Belmans,et al. Penetration level of distributed energy resources with anti-islanding criteria and secure operation of power system , 2006, 2006 IEEE Power Engineering Society General Meeting.
[21] G. Manimaran,et al. Cyber Attack Exposure Evaluation Framework for the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[22] Xiao-Ping Zhang,et al. Flexible AC Transmission Systems: Modelling and Control , 2006 .
[23] G. Sybille,et al. Modeling and simulation of a distribution STATCOM using Simulink's Power System Blockset , 2001, IECON'01. 27th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.37243).
[24] Marimuthu Palaniswami,et al. Security Games and Risk Minimization for Automatic Generation Control in Smart Grid , 2012, GameSec.
[25] T. Van Cutsem,et al. Undervoltage load shedding scheme for the Hydro-Quebec system , 2004, IEEE Power Engineering Society General Meeting, 2004..
[26] P. Kundur,et al. Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions , 2004, IEEE Transactions on Power Systems.
[27] Jason Stamp,et al. Reliability impacts from cyber attack on electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.