Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information
暂无分享,去创建一个
Thomas H. Morris | Uttam Adhikari | Shengyi Pan | Anurag Srivastava | Timothy Ernster | Ceeman Vellaithurai | T. Morris | S. Pan | U. Adhikari | A. Srivastava | Timothy Ernster | Ceeman Vellaithurai
[1] Don Libes. expect: Scripts for Controlling Interactive Processes , 1991, Comput. Syst..
[2] Deepa Kundur,et al. Switched system models for coordinated cyber-physical attack construction and simulation , 2011, 2011 IEEE First International Workshop on Smart Grid Modeling and Simulation (SGMS).
[3] Stephen Warshall,et al. A Theorem on Boolean Matrices , 1962, JACM.
[4] J. Salmeron,et al. Analysis of electric grid security under terrorist threat , 2004, IEEE Transactions on Power Systems.
[5] Hal Berghel. Wireless infidelity I: war driving , 2004, CACM.
[6] Kevin Tomsovic,et al. Power System Security , 1999 .
[7] Li Fu,et al. Vulnerability Assessment for Power Grid Based on Small-world Topological Model , 2010, 2010 Asia-Pacific Power and Energy Engineering Conference.
[8] Rayford B. Vaughn,et al. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems , 2012, 2012 45th Hawaii International Conference on System Sciences.
[9] Karen Scarfone,et al. Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.
[10] Jill Slay,et al. Lessons Learned from the Maroochy Water Breach , 2007, Critical Infrastructure Protection.
[11] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[12] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[13] Bradley Reaves,et al. Engineering future cyber-physical energy systems: Challenges, research needs, and roadmap , 2009, 41st North American Power Symposium.
[14] Martin D. Seyer. RS-232 made easy: connecting computers, printers, terminals, and modems , 2000 .
[15] Donald B. Johnson,et al. Efficient Algorithms for Shortest Paths in Sparse Networks , 1977, J. ACM.
[16] Mark Zeller,et al. Myth or reality — Does the Aurora vulnerability pose a risk to my generator? , 2011, 2011 64th Annual Conference for Protective Relay Engineers.
[17] A. K. Srivastava,et al. Power system vulnerability analysis - towards validation of centrality measures , 2012, PES T&D 2012.
[18] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[19] Anna Scaglione,et al. Electrical centrality measures for electric power grid vulnerability analysis , 2010, 49th IEEE Conference on Decision and Control (CDC).
[20] T. Lindvall. ON A ROUTING PROBLEM , 2004, Probability in the Engineering and Informational Sciences.
[21] Angela Orebaugh,et al. Wireshark & Ethereal Network Protocol Analyzer Toolkit , 2007 .
[22] Jeffrey B. Roberts,et al. Safeguarding IEDs, Substations, and SCADA Systems Against Electronic Intrusions , 2001 .
[23] Liu Hong,et al. Vulnerability analysis of interdependent infrastructure systems: A methodological framework , 2012 .
[24] Mark Lutz,et al. Learning Python , 1999 .
[25] B.F. Wollenberg,et al. Toward a smart grid: power delivery for the 21st century , 2005, IEEE Power and Energy Magazine.
[26] John Zaborszky,et al. Fast Contingency Evaluation Using Concentric Relaxation , 1980, IEEE Transactions on Power Apparatus and Systems.
[27] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[28] D. R. Fulkerson,et al. Maximal Flow Through a Network , 1956 .
[29] Bimal Parmar,et al. Protecting against spear-phishing , 2012 .
[30] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[31] J. Giesbrecht,et al. A real time digital simulator for testing relays , 1992 .
[32] Bradley Reaves,et al. Discovery, infiltration, and denial of service in a process control system wireless network , 2009, 2009 eCrime Researchers Summit.
[33] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[34] Jason Stamp,et al. Reliability impacts from cyber attack on electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.
[35] Thomas Garrity,et al. Getting Smart , 2008, IEEE Power and Energy Magazine.