MODEL‐BASED ANOMALY DETECTION FOR POWER SYSTEM STATE ESTIMATION

[1]  Aditya Ashok,et al.  Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation , 2018, IEEE Transactions on Smart Grid.

[2]  L. Mili,et al.  A Robust Iterated Extended Kalman Filter for Power System Dynamic State Estimation , 2017, IEEE Transactions on Power Systems.

[3]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[4]  Hideaki Ishii,et al.  Enhancing Robustness to Cyber-Attacks in Power Systems Through Multiple Least Trimmed Squares State Estimations , 2016, IEEE Transactions on Power Systems.

[5]  Danda B. Rawat,et al.  Detection of False Data Injection Attacks in Smart Grid Communication Systems , 2015, IEEE Signal Processing Letters.

[6]  Mehul Motani,et al.  Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.

[7]  Ehab Al-Shaer,et al.  Moving Target Defense for Hardening the Security of the Power System State Estimation , 2014, MTD '14.

[8]  Bikash C. Pal,et al.  Decentralized Dynamic State Estimation in Power Systems Using Unscented Transformation , 2014, IEEE Transactions on Power Systems.

[9]  Lang Tong,et al.  On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.

[10]  Kameshwar Poolla,et al.  Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .

[11]  Gabriela Hug,et al.  Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.

[12]  Shaobu Wang,et al.  An Alternative Method for Power System Dynamic State Estimation Based on Unscented Transform , 2012, IEEE Transactions on Power Systems.

[13]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[14]  I. Kamwa,et al.  Dynamic State Estimation in Power System by Applying the Extended Kalman Filter With Unknown Inputs to Phasor Measurements , 2011, IEEE Transactions on Power Systems.

[15]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[16]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[17]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[18]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[19]  Henrik Sandberg,et al.  Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[20]  A. Abur,et al.  Robust Measurement Design by Placing Synchronized Phasor Measurements on Network Branches , 2010, IEEE Transactions on Power Systems.

[21]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[22]  H.M. Ismail,et al.  A Unified Approach for the Optimal PMU Location for Power System State Estimation , 2009, IEEE Transactions on Power Systems.

[23]  B. Gou,et al.  Generalized Integer Linear Programming Formulation for Optimal PMU Placement , 2008, IEEE Transactions on Power Systems.

[24]  E. Kyriakides,et al.  Optimal Placement of Phasor Measurement Units for Power System Observability , 2008, IEEE Transactions on Power Systems.

[25]  A. Abur,et al.  Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.