False-Data Injection Attack in Electricity Generation System Subject to Actuator Saturation: Analysis and Design
暂无分享,去创建一个
Tianju Sui | Xi-Ming Sun | Liang Yu | Ximing Sun | Tianju Sui | Liang Yu
[1] Mani B. Srivastava,et al. Design considerations for solar energy harvesting wireless embedded systems , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[2] A. Mullane,et al. Modeling of the wind turbine with a doubly fed induction generator for grid integration studies , 2006, IEEE Transactions on Energy Conversion.
[3] Ling Shi,et al. Optimal Linear Cyber-Attack on Remote State Estimation , 2017, IEEE Transactions on Control of Network Systems.
[4] Paulo Tabuada,et al. Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.
[5] Josep M. Guerrero,et al. A Multiagent-Based Consensus Algorithm for Distributed Coordinated Control of Distributed Generators in the Energy Internet , 2015, IEEE Transactions on Smart Grid.
[6] Fushuan Wen,et al. From Smart Grid to Energy Internet:Basic Concept and Research Framework , 2014 .
[7] Qing-Long Han,et al. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[8] L.H. Tsoukalas,et al. From smart grids to an energy internet: Assumptions, architectures and requirements , 2008, 2008 Third International Conference on Electric Utility Deregulation and Restructuring and Power Technologies.
[9] Zhe Chen,et al. Overview of different wind generator systems and their comparisons , 2008 .
[10] Soummya Kar,et al. Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.
[11] Junwei Cao,et al. Energy Internet -- Towards Smart Grid 2.0 , 2013, 2013 Fourth International Conference on Networking and Distributed Computing.
[12] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[13] Ruochi Zhang,et al. Stealthy Control Signal Attacks in Linear Quadratic Gaussian Control Systems: Detectability Reward Tradeoff , 2017, IEEE Transactions on Information Forensics and Security.
[14] Radha Poovendran,et al. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.
[15] J. Sasiadek,et al. Linearization of nonlinear MIMO model of large power plant station , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).
[16] Haibo He,et al. Event-Triggered Robust Stabilization of Nonlinear Input-Constrained Systems Using Single Network Adaptive Critic Designs , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[17] A Q Huang,et al. The Future Renewable Electric Energy Delivery and Management (FREEDM) System: The Energy Internet , 2011, Proceedings of the IEEE.
[18] Tomonobu Senjyu,et al. Output power leveling of wind turbine Generator for all operating regions by pitch angle control , 2006 .
[19] Changyin Sun,et al. Adaptive Neural Impedance Control of a Robotic Manipulator With Input Saturation , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[20] Ming Cheng,et al. Pitch angle control for variable speed wind turbines , 2008, 2008 Third International Conference on Electric Utility Deregulation and Restructuring and Power Technologies.
[21] Naixue Xiong,et al. Design and Analysis of Multimodel-Based Anomaly Intrusion Detection Systems in Industrial Process Automation , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[22] Subhashish Bhattacharya,et al. Energy router: Architectures and functionalities toward Energy Internet , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[23] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[24] Song Guo,et al. A Survey on Energy Internet: Architecture, Approach, and Emerging Technologies , 2018, IEEE Systems Journal.
[25] Qing-Long Han,et al. State estimation under false data injection attacks: Security analysis and system protection , 2018, Autom..
[26] Terry L King. A Guide to Chi-Squared Testing , 1997 .
[27] Bruno Sinopoli,et al. On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.
[28] Maureen Hand,et al. Multivariable control strategy for variable speed, variable pitch wind turbines , 2007 .
[29] Jonathan Miller,et al. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.