Fast sequence component analysis for attack detection in smart grid
暂无分享,去创建一个
Scott A. Wallace | Jordan Landford | Rich Meier | Richard Barella | Xinghui Zhao | Eduardo Cotilla Sanchez | Robert B. Bass | R. Bass | Xinghui Zhao | E. C. Sanchez | S. Wallace | Richard Barella | Jordan Landford | Rich Meier
[1] Lang Tong,et al. Subspace Methods for Data Attack on State Estimation: A Data Driven Approach , 2014, IEEE Transactions on Signal Processing.
[2] Lori Ross O'Neil,et al. Attacks on GPS Time Reliability , 2014, IEEE Security & Privacy.
[3] Changxing Pei,et al. Time Stamp Attack on Wide Area Monitoring System in Smart Grid , 2011, ArXiv.
[4] Eduardo Cotilla-Sanchez,et al. Managing PMU data sets with bitmap indexes , 2014, 2014 IEEE Conference on Technologies for Sustainability (SusTech).
[5] James S. Thorp,et al. IEEE Standard for Synchrophasors for Power Systems , 1998 .
[6] James S. Thorp,et al. Synchronized Phasor Measurement Applications in Power Systems , 2010, IEEE Transactions on Smart Grid.
[7] M. Begovic,et al. Use of local measurements to estimate voltage-stability margin , 1997, Proceedings of the 20th International Conference on Power Industry Computer Applications.
[8] Todd E. Humphreys,et al. GPS Spoofing Detection via Dual-Receiver Correlation of Military Signals , 2013, IEEE Transactions on Aerospace and Electronic Systems.
[9] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[10] Arun G. Phadke,et al. Synchronized phasor measurements-a historical overview , 2002, IEEE/PES Transmission and Distribution Conference and Exhibition.
[11] Ryszard J. Katulski,et al. Accuracy of differential phase delay estimation for GPS spoofing detection , 2013, 2013 36th International Conference on Telecommunications and Signal Processing (TSP).
[12] D. Dasgupta,et al. A detection model for anomalies in smart grid with sensor network , 2012, 2012 Future of Instrumentation International Workshop (FIIW) Proceedings.
[13] Husheng Li,et al. Time Synchronization Attack in Smart Grid: Impact and Analysis , 2013, IEEE Transactions on Smart Grid.
[14] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[15] Lang Tong,et al. Data Framing Attack on State Estimation , 2013, IEEE Journal on Selected Areas in Communications.
[16] Thomas M. Chen,et al. Lessons from Stuxnet , 2011, Computer.
[17] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[18] Ing-Ray Chen,et al. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.
[19] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[20] Todd E. Humphreys,et al. Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks , 2012, Int. J. Crit. Infrastructure Prot..
[21] J. S. Warner,et al. A Simple Demonstration that the Global Positioning System ( GPS ) is Vulnerable to Spoofing , 2012 .
[22] Alejandro D. Dominguez-Garcia,et al. Spoofing GPS Receiver Clock Offset of Phasor Measurement Units , 2013, IEEE Transactions on Power Systems.
[23] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[24] T. Humphreys,et al. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .
[25] Zied Elouedi,et al. Naive Bayes vs decision trees in intrusion detection systems , 2004, SAC '04.
[26] Frank Kargl,et al. Spoofed data detection in VANETs using dynamic thresholds , 2011, 2011 IEEE Vehicular Networking Conference (VNC).