Online Data Integrity Attacks Against Real-Time Electrical Market in Smart Grid
暂无分享,去创建一个
Song Tan | Wen-Zhan Song | Lang Tong | Junjie Yang | Michael Stewart | L. Tong | Wenzhan Song | Michael Stewart | Song Tan | Junjie Yang
[1] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[2] Zhu Han,et al. Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.
[3] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[4] Rong Zheng,et al. A Stealthy Attack Against Electricity Market Using Independent Component Analysis , 2018, IEEE Systems Journal.
[5] Mehul Motani,et al. Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.
[6] Yi Ma,et al. Robust principal component analysis? , 2009, JACM.
[7] Nikolaos V. Sahinidis,et al. Derivative-free optimization: a review of algorithms and comparison of software implementations , 2013, J. Glob. Optim..
[8] Emmanuel J. Candès,et al. Exact Matrix Completion via Convex Optimization , 2009, Found. Comput. Math..
[9] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[10] Lang Tong,et al. Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[11] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[12] Le Xie,et al. Sensitivity Analysis of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption , 2014, IEEE Transactions on Power Systems.
[13] Dick Duffey,et al. Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.
[14] Brian Vad Mathiesen,et al. From electricity smart grids to smart energy systems – A market operation based approach and understanding , 2012 .
[15] Lang Tong,et al. Impact of Data Quality on Real-Time Locational Marginal Price , 2012, IEEE Transactions on Power Systems.
[16] Jinping Hao,et al. Optimal malicious attack construction and robust detection in Smart Grid cyber security analysis , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[17] A. Ott,et al. Experience with PJM market operation, system design, and implementation , 2003 .
[18] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[19] David K. Y. Yau,et al. Impact of integrity attacks on real-time pricing in smart grids , 2013, CCS.
[20] B. Pasik-Duncan,et al. Adaptive Control , 1996, IEEE Control Systems.
[21] Zhu Han,et al. Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.
[22] Zuyi Li,et al. Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.
[23] Felix F. Wu,et al. Folk theorems on transmission access: Proofs and counterexamples , 1996 .
[24] Bin Yang,et al. Projection approximation subspace tracking , 1995, IEEE Trans. Signal Process..
[25] A. Robert Calderbank,et al. PETRELS: Parallel Subspace Estimation and Tracking by Recursive Least Squares From Partial Observations , 2012, IEEE Transactions on Signal Processing.
[26] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .