MODEL‐BASED ANOMALY DETECTION FOR POWER SYSTEM STATE ESTIMATION
暂无分享,去创建一个
Aditya Ashok | Venkataramana Ajjarapu | Manimaran Govindarasu | V. Ajjarapu | M. Govindarasu | A. Ashok
[1] Aditya Ashok,et al. Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation , 2018, IEEE Transactions on Smart Grid.
[2] L. Mili,et al. A Robust Iterated Extended Kalman Filter for Power System Dynamic State Estimation , 2017, IEEE Transactions on Power Systems.
[3] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[4] Hideaki Ishii,et al. Enhancing Robustness to Cyber-Attacks in Power Systems Through Multiple Least Trimmed Squares State Estimations , 2016, IEEE Transactions on Power Systems.
[5] Danda B. Rawat,et al. Detection of False Data Injection Attacks in Smart Grid Communication Systems , 2015, IEEE Signal Processing Letters.
[6] Mehul Motani,et al. Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.
[7] Ehab Al-Shaer,et al. Moving Target Defense for Hardening the Security of the Power System State Estimation , 2014, MTD '14.
[8] Bikash C. Pal,et al. Decentralized Dynamic State Estimation in Power Systems Using Unscented Transformation , 2014, IEEE Transactions on Power Systems.
[9] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[10] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[11] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[12] Shaobu Wang,et al. An Alternative Method for Power System Dynamic State Estimation Based on Unscented Transform , 2012, IEEE Transactions on Power Systems.
[13] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[14] I. Kamwa,et al. Dynamic State Estimation in Power System by Applying the Extended Kalman Filter With Unknown Inputs to Phasor Measurements , 2011, IEEE Transactions on Power Systems.
[15] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[16] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[17] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[18] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[19] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[20] A. Abur,et al. Robust Measurement Design by Placing Synchronized Phasor Measurements on Network Branches , 2010, IEEE Transactions on Power Systems.
[21] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[22] H.M. Ismail,et al. A Unified Approach for the Optimal PMU Location for Power System State Estimation , 2009, IEEE Transactions on Power Systems.
[23] B. Gou,et al. Generalized Integer Linear Programming Formulation for Optimal PMU Placement , 2008, IEEE Transactions on Power Systems.
[24] E. Kyriakides,et al. Optimal Placement of Phasor Measurement Units for Power System Observability , 2008, IEEE Transactions on Power Systems.
[25] A. Abur,et al. Placement of PMUs to Enable Bad Data Detection in State Estimation , 2006, IEEE Transactions on Power Systems.