Cybersecurity in Distributed Power Systems
暂无分享,去创建一个
[1] Peng Wang,et al. A Hybrid AC/DC Microgrid and Its Coordination Control , 2011, IEEE Transactions on Smart Grid.
[2] Farrokh Aminifar,et al. Microgrid Scheduling With Uncertainty: The Quest for Resilience , 2016, IEEE Transactions on Smart Grid.
[3] Abdullah Abusorrah,et al. Analyzing Locally Coordinated Cyber-Physical Attacks for Undetectable Line Outages , 2018, IEEE Transactions on Smart Grid.
[4] Abdullah Abusorrah,et al. Optimal Expansion Planning of Energy Hub With Multiple Energy Infrastructures , 2015, IEEE Transactions on Smart Grid.
[5] Bruno Sinopoli,et al. Detecting Integrity Attacks on SCADA Systems , 2014, IEEE Transactions on Control Systems Technology.
[6] Juan C. Vasquez,et al. Hierarchical Control of Droop-Controlled AC and DC Microgrids—A General Approach Toward Standardization , 2009, IEEE Transactions on Industrial Electronics.
[7] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[8] Harry Eugene Stanley,et al. Catastrophic cascade of failures in interdependent networks , 2009, Nature.
[9] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[10] Jianhui Wang,et al. Robust Optimization for Transmission Expansion Planning: Minimax Cost vs. Minimax Regret , 2014, IEEE Transactions on Power Systems.
[11] Yongpei Guan,et al. Two-Stage Minimax Regret Robust Unit Commitment , 2013, IEEE Transactions on Power Systems.
[12] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[13] Mohammad Shahidehpour,et al. Only Connect: Microgrids for Distribution System Restoration , 2014, IEEE Power and Energy Magazine.
[14] Shari Lawrence Pfleeger,et al. Going Spear Phishing: Exploring Embedded Training and Awareness , 2014, IEEE Security & Privacy.
[15] Scott Corzine,et al. Going Beyond Cybersecurity Compliance: What Power and Utility Companies Really Need To Consider , 2016, IEEE Power and Energy Magazine.
[16] Dong Jin,et al. DSSnet: A Smart Grid Modeling Platform Combining Electrical Power Distribution System Simulation and Software Defined Networking Emulation , 2016, SIGSIM-PADS.
[17] Zuyi Li,et al. Transmission Line Rating Attack in Two-Settlement Electricity Markets , 2016, IEEE Transactions on Smart Grid.
[18] Oriol Gomis-Bellmunt,et al. Operation of a Utility Connected Microgrid Using an IEC 61850-Based Multi-Level Management System , 2012, IEEE Transactions on Smart Grid.
[19] Alexis Kwasinski,et al. Japan's Pivot to Resilience: How Two Microgrids Fared After the 2011 Earthquake , 2015, IEEE Power and Energy Magazine.
[20] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[21] Jean-Philippe Vial,et al. Robust Optimization , 2021, ICORES.
[22] Sandeep K. Shukla,et al. GECO: Global Event-Driven Co-Simulation Framework for Interconnected Power System and Communication Network , 2012, IEEE Transactions on Smart Grid.
[23] Peter B. Luh,et al. Enabling Resilient Microgrid Through Programmable Network , 2017, IEEE Transactions on Smart Grid.
[24] Thomas Peltier,et al. Information Security Risk Analysis: A Pedagogic Model Based on a Teaching Hospital , 2006 .
[25] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[26] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[27] Zuyi Li,et al. Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.
[28] Yong Fu,et al. Reliability Assessment of Smart Grid Considering Direct Cyber-Power Interdependencies , 2012, IEEE Transactions on Smart Grid.
[29] Jianhui Wang,et al. Cyber-Physical Modeling and Cyber-Contingency Assessment of Hierarchical Control Systems , 2015, IEEE Transactions on Smart Grid.
[30] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[31] Mohammad E. Khodayar,et al. Resilient operation of multiple energy carrier microgrids , 2015, 2016 IEEE Power and Energy Society General Meeting (PESGM).
[32] Andrew Ginter,et al. Cyber-Based Contingency Analysis , 2016, IEEE Transactions on Power Systems.
[33] M. Wendy Hennequin,et al. The Future of the Internet and How to Stop It , 2011 .
[34] Naoki Tanaka,et al. A virtual time system for virtualization-based network emulations and simulations , 2012, J. Simulation.
[35] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[36] Ravishankar K. Iyer,et al. Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges , 2015, CPSS@ASIACSS.
[37] James A. Lewis. Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats , 2002 .
[38] Yongpei Guan,et al. Min-Max Regret Bidding Strategy for Thermal Generator Considering Price Uncertainty , 2014, IEEE Transactions on Power Systems.
[39] Abdullah Abusorrah,et al. Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.
[40] Douglas J. Landoll,et al. The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments , 2005 .
[41] Mohammad Shahidehpour,et al. Power System Risk Assessment in Cyber Attacks Considering the Role of Protection Systems , 2017, IEEE Transactions on Smart Grid.
[42] Thomas H. Morris,et al. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.
[43] Zuyi Li,et al. Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.
[44] Rocky K. C. Chang,et al. Defending against flooding-based distributed denial-of-service attacks: a tutorial , 2002, IEEE Commun. Mag..
[45] Göran N Ericsson,et al. Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.
[46] Ravishankar K. Iyer,et al. Self-Healing Attack-Resilient PMU Network for Power System Operation , 2018, IEEE Transactions on Smart Grid.
[47] Michael S. Hsiao,et al. Hardware Trojan Attacks: Threat Analysis and Countermeasures , 2014, Proceedings of the IEEE.
[48] Alexis Kwasinski,et al. Powering Through the Storm: Microgrids Operation for More Efficient Disaster Recovery , 2014, IEEE Power and Energy Magazine.
[49] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[50] Ravishankar K. Iyer,et al. Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.
[51] Jianhui Wang,et al. Coordinated Energy Management of Networked Microgrids in Distribution Systems , 2015, IEEE Transactions on Smart Grid.
[52] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[53] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[54] Yong Fu,et al. Reliability Assessment of Smart Grids Considering Indirect Cyber-Power Interdependencies , 2014, IEEE Transactions on Smart Grid.
[55] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[56] Zuyi Li,et al. Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.
[57] Mohammad Shahidehpour,et al. Cutting Campus Energy Costs with Hierarchical Control: The Economical and Reliable Operation of a Microgrid , 2013, IEEE Electrification Magazine.
[58] R. Iyer,et al. Software-Defined Networking for Smart Grid Resilience : Opportunities and Challenges [ Position Paper ] , 2015 .
[59] M. Shahidehpour,et al. Microgrid Planning Under Uncertainty , 2015, IEEE Transactions on Power Systems.
[60] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[61] Josephst . Clair,et al. A Functional Microgrid for Enhancing Reliability, Sustainability, and Energy Efficiency , 2012 .
[62] Mohammad Shahidehpour,et al. DC Microgrids: Economic Operation and Enhancement of Resilience by Hierarchical Control , 2014, IEEE Transactions on Smart Grid.
[63] Junbo Zhao,et al. Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks , 2017, IEEE Transactions on Smart Grid.
[64] Mohammad Shahidehpour,et al. Microgrids for Enhancing the Power Grid Resilience in Extreme Conditions , 2017, IEEE Transactions on Smart Grid.
[65] Amin Khodaei,et al. Resiliency-Oriented Microgrid Optimal Scheduling , 2014, IEEE Transactions on Smart Grid.
[66] Mahmud Fotuhi-Firuzabad,et al. Enhancing Power System Resilience Through Hierarchical Outage Management in Multi-Microgrids , 2016, IEEE Transactions on Smart Grid.
[67] William Shaw,et al. Cybersecurity for SCADA Systems , 2006 .
[68] Le Xie,et al. Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets , 2013, IEEE Transactions on Smart Grid.
[69] Mark Zeller,et al. Myth or reality — Does the Aurora vulnerability pose a risk to my generator? , 2011, 2011 64th Annual Conference for Protective Relay Engineers.
[70] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[71] Jianhui Wang,et al. Networked Microgrids for Self-Healing Power Systems , 2016, IEEE Transactions on Smart Grid.
[72] Mohammad Shahidehpour,et al. Applications of Wireless Sensor Networks for Area Coverage in Microgrids , 2017, IEEE Transactions on Smart Grid.
[73] Yusuf Al-Turki,et al. Hierarchical Coordination of a Community Microgrid With AC and DC Microgrids , 2015, IEEE Transactions on Smart Grid.
[74] Scott F. Midkiff,et al. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.
[75] Zuyi Li,et al. Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.
[76] Ali Davoudi,et al. Hierarchical Structure of Microgrids Control System , 2012, IEEE Transactions on Smart Grid.
[77] Ettore Francesco Bompard,et al. Classification and trend analysis of threats origins to the security of power systems , 2013 .
[78] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[79] Chen Chen,et al. Bronzeville Community Microgrids: A Reliable, Resilient and Sustainable Solution for Integrated Energy Management with Distribution Systems , 2015 .
[80] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[81] G. Andersson,et al. Energy hubs for the future , 2007, IEEE Power and Energy Magazine.
[82] Aditya Ashok,et al. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[83] Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.