Public Plug-in Electric Vehicles + Grid Data: Is a New Cyberattack Vector Viable?
暂无分享,去创建一个
[1] Roderick Currie. Hacking the CAN Bus: Basic Manipulation of a Modern Automobile Through CAN Bus Reverse Engineering , 2020 .
[2] Chen Chen,et al. Cyber-Constrained Optimal Power Flow Model for Smart Grid Resilience Enhancement , 2019, IEEE Transactions on Smart Grid.
[3] Raju Gottumukkala,et al. Cyber-physical System Security of Vehicle Charging Stations , 2019, 2019 IEEE Green Technologies Conference(GreenTech).
[4] Masoud Abbaszadeh,et al. Hierarchical Location Identification of Destabilizing Faults and Attacks in Power Systems: A Frequency-Domain Approach , 2019, IEEE Transactions on Smart Grid.
[5] Mihalis Yannakakis,et al. REACT to Cyber Attacks on Power Grids , 2019, IEEE Transactions on Network Science and Engineering.
[6] Richard M. Pratt,et al. Vehicle Charging Infrastructure Security , 2019, 2019 IEEE International Conference on Consumer Electronics (ICCE).
[7] W. Hager,et al. and s , 2019, Shallow Water Hydraulics.
[8] Hongtao Sun,et al. A Survey on Security Communication and Control for Smart Grids Under Malicious Cyber Attacks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[9] Yue Xu,et al. Petri Net-based Power CPS Network Attack and Impact Modeling , 2018, 2018 5th IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS).
[10] Lamia Ben Azzouz,et al. Cyber security issues of Internet of electric vehicles , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[11] Graham Watson,et al. DOE/DHS/DOT Volpe Technical Meeting on Electric Vehicle and Charging Station Cybersecurity Report , 2018 .
[12] Mihalis Yannakakis,et al. Power Grid State Estimation Following a Joint Cyber and Physical Attack , 2018, IEEE Transactions on Control of Network Systems.
[13] Golshan Madraki,et al. Cyber-Physical Resilience of Electrical Power Systems Against Malicious Attacks: a Review , 2018 .
[14] Athanasios V. Vasilakos,et al. Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems , 2018, IEEE Transactions on Smart Grid.
[15] Carlos Murguia,et al. On Reachable Sets of Hidden CPS Sensor Attacks , 2017, 2018 Annual American Control Conference (ACC).
[16] H. Vincent Poor,et al. BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid , 2018, USENIX Security Symposium.
[17] Hamed Mohsenian-Rad,et al. Dynamic Load Altering Attacks Against Power System Stability: Attack Models and Protection Schemes , 2017, IEEE Transactions on Smart Grid.
[18] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[19] Parimal Saraf,et al. Power system damping analysis on large power system networks: An entergy case study , 2017, 2017 IEEE Power & Energy Society General Meeting.
[20] Zhao Yang Dong,et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.
[21] Siddharth Garg,et al. IoT-enabled distributed cyber-attacks on transmission and distribution grids , 2017, 2017 North American Power Symposium (NAPS).
[22] Haibo He,et al. Cyber-physical attacks and defences in the smart grid: a survey , 2016, IET Cyper-Phys. Syst.: Theory & Appl..
[23] S. Ahmed,et al. Electric vehicle technology as an exploit for cyber attacks on the next generation of electric power systems , 2016, 2016 4th International Conference on Control Engineering & Information Technology (CEIT).
[24] Tin Yu Wu,et al. Multilayered Impact Evaluation Model for Attacking Missions , 2016, IEEE Systems Journal.
[25] Abdullah Abusorrah,et al. Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.
[26] Manimaran Govindarasu,et al. Stealthy cyber attacks and impact analysis on wide-area protection of smart grid , 2016, 2016 North American Power Symposium (NAPS).
[27] Flavio D. Garcia,et al. Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.
[28] Lalitha Sankar,et al. Physical System Consequences of Unobservable State-and-Topology Cyber-Physical Attacks , 2016, IEEE Transactions on Smart Grid.
[29] Craig A. Smith,et al. The Car Hacker's Handbook: A Guide for the Penetration Tester , 2016 .
[30] Dong Hoon Lee,et al. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.
[31] D. Lowe-Wincentsen. Alternative Fuels Data Center , 2013 .
[32] Balarko Chaudhuri,et al. Partial Pole Placement with Controller Optimization , 2012, IEEE Transactions on Automatic Control.
[33] Vijay Modi,et al. Spatial distribution of urban building energy consumption by end use , 2012 .
[34] W. Marsden. I and J , 2012 .
[35] Lisa Turner,et al. Applications of Second Order Cone Programming , 2012 .
[36] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[37] J. Steinbruner,et al. Beyond Nuclear Deterrence: Transforming the U.S.-Russian Equation , 2011 .
[38] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[39] Fred Denny,et al. Distribution System Modeling and Analysis , 2001 .
[40] Hadi Saadat,et al. Power System Analysis , 1998 .
[41] P. Kundur,et al. Power system stability and control , 1994 .
[42] S. Liberty,et al. Linear Systems , 2010, Scientific Parallel Computing.
[43] H. H. Happ,et al. Power System Control and Stability , 1979, IEEE Transactions on Systems, Man, and Cybernetics.