Optimal Attack Strategy for Multi-Transmission Line Congestion in Cyber-Physical Smart Grids
暂无分享,去创建一个
M. Hadi Amini | Javad Khazaei | Dariush Khezrimotlagh | Mohammed Alkaf | J. Khazaei | M. Amini | Mohammed Alkaf | D. Khezrimotlagh
[1] Mahmoud-Reza Haghifam,et al. Load management using multi-agent systems in smart distribution network , 2013, 2013 IEEE Power & Energy Society General Meeting.
[2] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[3] Mehul Motani,et al. Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.
[4] Yong Fu,et al. Optimal Operation of Active Distribution Grids: A System of Systems Framework , 2014, IEEE Transactions on Smart Grid.
[5] Farrokh Aminifar,et al. Toward a Consensus on the Definition and Taxonomy of Power System Resilience , 2018, IEEE Access.
[6] Zhu Han,et al. Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.
[7] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[8] Arif I. Sarwat,et al. Smart Grid reliability assessment utilizing Boolean Driven Markov Process and variable weather conditions , 2015, 2015 North American Power Symposium (NAPS).
[9] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[10] I. Pearson. Smart grid cyber security for Europe , 2011 .
[11] Mario Paolone,et al. Undetectable Timing-Attack on Linear State-Estimation by Using Rank-1 Approximation , 2018, IEEE Transactions on Smart Grid.
[12] Javad Khazaei,et al. MILP Modeling of Targeted False Load Data Injection Cyberattacks to Overflow Transmission Lines in Smart Grids , 2019, 2019 North American Power Symposium (NAPS).
[13] Georgios B. Giannakis,et al. Distributed Optimal Power Flow for Smart Microgrids , 2012, IEEE Transactions on Smart Grid.
[14] Soummya Kar,et al. Optimal Sensor Placement for Topology Identification in Smart Power Grids , 2019, 2019 53rd Annual Conference on Information Sciences and Systems (CISS).
[15] George B. Dantzig,et al. Linear programming and extensions , 1965 .
[16] Zuyi Li,et al. Trilevel Modeling of Cyber Attacks on Transmission Lines , 2017, IEEE Transactions on Smart Grid.
[17] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[18] O. Alsac,et al. Optimal Load Flow with Steady-State Security , 1974 .
[19] Karl Henrik Johansson,et al. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.
[20] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.