Deducing cascading failures caused by cyberattacks based on attack gains and cost principle in cyber-physical power systems
暂无分享,去创建一个
Yufei WANG | Yanli LIU | Jun’e LI | Yufei Wang | Yanli Liu | Jun'e Li
[1] Su Shen,et al. Attacker's Perspective Based Analysis on Cyber Attack Mode to Cyber-Physical System , 2014 .
[2] Li Wengu. Defense Strategy of Cascading Failures Between Information Network and Physical Power Grid , 2013 .
[3] S. Evans,et al. Risk-based security engineering through the eyes of the adversary , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[4] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[5] Uttam Adhikari,et al. A cyber-physical power system test bed for intrusion detection systems , 2014, 2014 IEEE PES General Meeting | Conference & Exposition.
[6] Xue Li,et al. Cyber Physical Power Systems: Architecture,Implementation Techniques and Challenges , 2010 .
[7] Bao Zhejing. Analysis of cascading failures under interactions between power grid and communication network , 2013 .
[8] Panganamala Ramana Kumar,et al. Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.
[9] Deepa Kundur,et al. Impact analysis of transient stability due to cyber attack on FACTS devices , 2013, 2013 North American Power Symposium (NAPS).
[10] Saman A. Zonouz,et al. CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.
[11] Thomas M. Chen,et al. Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.
[12] Chen Laijun. Overviews and Prospects of the Cyber Security of Smart Grid from the View of Complex Network Theory , 2011 .
[13] Mark Zeller,et al. Myth or reality — Does the Aurora vulnerability pose a risk to my generator? , 2011, 2011 64th Annual Conference for Protective Relay Engineers.
[14] Jing Wang,et al. The cross space transmission of cyber risks in electric cyber-physical systems , 2015, 2015 11th International Conference on Natural Computation (ICNC).
[15] Wang Yufe. An Intrusion Detection Method for Electric Power Information Network Based on Improved Minimum Enclosing Ball Vector Machine , 2013 .
[16] Marimuthu Palaniswami,et al. Security Games for Risk Minimization in Automatic Generation Control , 2015, IEEE Transactions on Power Systems.
[17] José M. F. Moura,et al. Modeling of Future Cyber–Physical Energy Systems for Distributed Sensing and Control , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[18] Radu Marculescu,et al. Cyberphysical Systems: Workload Modeling and Design Optimization , 2011, IEEE Design & Test of Computers.
[19] Yibing Liu,et al. A Fully Distributed Reactive Power Optimization and Control Method for Active Distribution Networks , 2014, IEEE Transactions on Smart Grid.
[20] Thomas H. Morris,et al. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.
[21] Deepa Kundur,et al. A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.
[22] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.