Adequacy evaluation of electric power grids considering substation cyber vulnerabilities
暂无分享,去创建一个
[1] Wenyuan Li,et al. Reliability Assessment of Electric Power Systems Using Monte Carlo Methods , 1994 .
[2] Tansu Alpcan,et al. Network Security , 2010 .
[3] David K. Y. Yau,et al. Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.
[4] Marimuthu Palaniswami,et al. Security Games and Risk Minimization for Automatic Generation Control in Smart Grid , 2012, GameSec.
[5] Mahmud Fotuhi-Firuzabad,et al. Toward a Comprehensive Model of Large-Scale DFIG-Based Wind Farms in Adequacy Assessment of Power Systems , 2014, IEEE Transactions on Sustainable Energy.
[6] Lin Zhu,et al. A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart Grid , 2013, IEEE Trans. Ind. Electron..
[7] Li Yong,et al. Cyber attack impact on power system blackout , 2011 .
[8] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[9] Bruno Gonçalves,et al. Human dynamics revealed through Web analytics , 2008, Physical review. E, Statistical, nonlinear, and soft matter physics.
[10] Hannes Holm. A Large-Scale Study of the Time Required to Compromise a Computer System , 2014, IEEE Transactions on Dependable and Secure Computing.
[11] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[12] Paul Hines,et al. A “Random Chemistry” Algorithm for Identifying Collections of Multiple Contingencies That Initiate Cascading Failure , 2012, IEEE Transactions on Power Systems.
[13] Marimuthu Palaniswami,et al. Security games for voltage control in smart grid , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[14] G.N. Ericsson. Toward a Framework for Managing Information Security for an Electric Power Utility—CIGRÉ Experiences , 2007, IEEE Transactions on Power Delivery.
[15] Di Shi,et al. Optimal allocation of static var compensator via mixed integer conic programming , 2017, 2017 IEEE Power & Energy Society General Meeting.
[16] Deepa Kundur,et al. A Framework for Modeling Cyber-Physical Switching Attacks in Smart Grid , 2013, IEEE Transactions on Emerging Topics in Computing.
[17] F Aminifar,et al. Probabilistic Multistage PMU Placement in Electric Power Systems , 2011, IEEE Transactions on Power Delivery.
[18] Wenxia Liu,et al. Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM , 2010, IEEE Transactions on Power Delivery.
[19] Kevin Tomsovic,et al. Security Constrained Multi-Stage Transmission Expansion Planning Considering a Continuously Variable Series Reactor , 2017, IEEE Transactions on Power Systems.
[20] Alexei Vazquez. Impact of memory on human dynamics , 2007 .
[21] William H. Sanders,et al. SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.
[22] N. Johnson,et al. From old wars to new wars and global terrorism , 2005 .
[23] Jason Stamp,et al. Reliability impacts from cyber attack on electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.
[24] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[25] Farrokh Aminifar,et al. Impact of WAMS Malfunction on Power System Reliability Assessment , 2012, IEEE Transactions on Smart Grid.
[26] Lingfeng Wang,et al. Inclusion of SCADA Cyber Vulnerability in Power System Reliability Assessment Considering Optimal Resources Allocation , 2016, IEEE Transactions on Power Systems.
[27] Yang Wang,et al. Reliability Analysis of Wide-Area Measurement System , 2010, IEEE Transactions on Power Delivery.
[28] Albert-László Barabási,et al. The origin of bursts and heavy tails in human dynamics , 2005, Nature.
[29] Beom Jun Kim,et al. Role of activity in human dynamics , 2007, EPL (Europhysics Letters).
[30] Probability Subcommittee,et al. IEEE Reliability Test System , 1979, IEEE Transactions on Power Apparatus and Systems.
[31] Yu Liu,et al. A Game Theoretic Approach to Efficient Mixed Strategies for Intrusion Detection , 2006, 2006 IEEE International Conference on Communications.
[32] Wang Bing-Hong,et al. Statistical Property and Model for the Inter-Event Time of Terrorism Attacks , 2010 .
[33] M. Fotuhi-Firuzabad,et al. Observability enhancement by optimal PMU placement considering random power system outages , 2011 .
[34] Yang Wang,et al. Evaluating multiple reliability indices of regional networks in wide area measurement system , 2009 .
[35] Xiao-Pu Han,et al. Scaling property and opinion model for interevent time of terrorism attack , 2009 .
[36] Zhu Han,et al. Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.