Network-based multidimensional moving target defense against false data injection attack in power system
暂无分享,去创建一个
Peidong Zhu | Peng Xun | Yinqiao Xiong | Yufei Zhu | Yi-Fan Hu | Weiheng Shi | Chenxi Hu
[1] Kan Chen,et al. A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure , 2015, IEEE Transactions on Smart Grid.
[2] Xiangyu Niu,et al. Dynamic Detection of False Data Injection Attack in Smart Grid using Deep Learning , 2018, 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).
[3] D. Kewley,et al. Dynamic approaches to thwart adversary intelligence gathering , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[4] Ananthram Swami,et al. A signaling game model for moving target defense , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[5] A. Lodi,et al. Solving Mixed-Integer Quadratic Programming problems with IBM-CPLEX : a progress report , 2014 .
[6] Deepa Kundur,et al. Reactance Perturbation for Detecting and Identifying FDI Attacks in Power System State Estimation , 2018, IEEE Journal of Selected Topics in Signal Processing.
[7] Karen A. Scarfone,et al. SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) , 2011 .
[8] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[9] Guohua Wang,et al. Analysis of The Relationship between Electric Cyber-Physical Systems and Ubiquitous Electric Internet of Things , 2019, 2019 IEEE 3rd Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC).
[10] Yong Wang,et al. SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA , 2014, ESORICS.
[11] Hao Liang,et al. False Data Injection Attacks With Limited Susceptance Information and New Countermeasures in Smart Grid , 2019, IEEE Transactions on Industrial Informatics.
[12] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[13] David K. Y. Yau,et al. Cost-Benefit Analysis of Moving-Target Defense in Power Grids , 2018, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[14] Evangelos P. Markatos,et al. Defending against hitlist worms using network address space randomization , 2007, Comput. Networks.
[15] Yilin Mo,et al. False Data Injection Attacks in Control Systems , 2010 .
[16] Thomas J. Overbye,et al. Topology Perturbation for Detecting Malicious Data Injection , 2012, 2012 45th Hawaii International Conference on System Sciences.
[17] Ravishankar K. Iyer,et al. Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.
[18] Victor O. K. Li,et al. Online False Data Injection Attack Detection With Wavelet Transform and Deep Neural Networks , 2018, IEEE Transactions on Industrial Informatics.
[19] Raheem A. Beyah,et al. An Empirical Study of TCP Vulnerabilities in Critical Power System Devices , 2014, SEGS@CCS.
[20] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[21] Haoyu Song,et al. Protocol-oblivious forwarding: unleash the power of SDN through a future-proof forwarding plane , 2013, HotSDN '13.
[22] David K. Y. Yau,et al. Analysis of Moving Target Defense Against False Data Injection Attacks on Power Grid , 2019, IEEE Transactions on Information Forensics and Security.
[23] Mohamed Azab,et al. Honeypot-like Moving-target Defense for secure IoT Operation , 2018, 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON).
[24] Narsingh Deo,et al. Shortest-path algorithms: Taxonomy and annotation , 1984, Networks.
[25] Mohamed Azab,et al. Benign false-data injection as a moving-target defense to secure mobile wireless communications , 2020, Ad Hoc Networks.
[26] George Varghese,et al. P4: programming protocol-independent packet processors , 2013, CCRV.
[27] Ehab Al-Shaer,et al. Moving Target Defense for Hardening the Security of the Power System State Estimation , 2014, MTD '14.
[28] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[29] Ricardo M. Czekster,et al. Modelling Load-Changing Attacks in Cyber-Physical Systems , 2019, PASM.
[30] Soummya Kar,et al. Distributed detection and isolation of topology attacks in power networks , 2012, HiCoNS '12.