Data Injection Attacks on Electricity Markets by Limited Adversaries: Worst-Case Robustness
暂无分享,去创建一个
[1] S. Hunt,et al. Making Competition Work in Electricity , 2002 .
[2] Adnan Anwar,et al. Data-Driven Stealthy Injection Attacks on Smart Grid with Incomplete Measurements , 2016, PAISI.
[3] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[4] Dick Duffey,et al. Power Generation , 1932, Transactions of the American Institute of Electrical Engineers.
[5] A. Ott,et al. Experience with PJM market operation, system design, and implementation , 2003 .
[6] Lang Tong,et al. Impacts of Malicious Data on Real-Time Price of Electricity Market Operations , 2012, 2012 45th Hawaii International Conference on System Sciences.
[7] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[8] Charles R. Johnson,et al. Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.
[9] Le Xie,et al. Sensitivity Analysis of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption , 2014, IEEE Transactions on Power Systems.
[10] Philip G. Hill,et al. Power generation , 1927, Journal of the A.I.E.E..
[11] Hamed Mohsenian Rad,et al. False data injection attacks with incomplete information against smart power grids , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[12] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[13] Felix F. Wu,et al. Folk theorems on transmission access: Proofs and counterexamples , 1996 .
[14] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[15] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[16] Dimitrios Zissis,et al. Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..
[17] Thomas B. Smith,et al. Electricity theft: a comparative analysis , 2004 .
[18] Zhu Han,et al. Multiact Dynamic Game Strategy for Jamming Attack in Electricity Market , 2015, IEEE Transactions on Smart Grid.
[19] Yonina C. Eldar,et al. A competitive minimax approach to robust estimation of random parameters , 2004, IEEE Transactions on Signal Processing.
[20] Ali Abur,et al. A bad data identification method for linear programming state estimation , 1990 .
[21] Yurii Nesterov,et al. Interior-point polynomial algorithms in convex programming , 1994, Siam studies in applied mathematics.
[22] Florian Dörfler,et al. Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design , 2011, IEEE Conference on Decision and Control and European Control Conference.
[23] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[24] Fred C. Schweppe,et al. Power System Static-State Estimation, Part III: Implementation , 1970 .
[25] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[26] Zhu Han,et al. Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.
[27] M. Negrete-Pincetic,et al. Towards quantifying the impacts of cyber attacks in the competitive electricity market environment , 2009, 2009 IEEE Bucharest PowerTech.
[28] Tongxin Zheng,et al. Ex post pricing in the co-optimized energy and reserve market , 2012, 2012 IEEE Power and Energy Society General Meeting.
[29] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[30] Xinyu Yang,et al. On false data injection attack against Multistep Electricity Price in electricity market in smart grid , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[31] Lang Tong,et al. Malicious data attack on real-time electricity market , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[32] Fábio Borges,et al. On privacy-preserving protocols for smart metering systems , 2015 .
[33] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[34] Xia Lei,et al. Research on Multistep Electricity Price Model with Bidirectional Regulation for Large Consumers , 2010, 2010 International Conference on Electrical and Control Engineering.
[35] Zhu Han,et al. Manipulating the electricity power market via jamming the price signaling in smart grid , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[36] Le Xie,et al. Ramp-Induced Data Attacks on Look-Ahead Dispatch in Real-Time Power Markets , 2013, IEEE Transactions on Smart Grid.
[37] H. Vincent Poor,et al. Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[38] Liyan Jia,et al. On the nonlinearity effects on malicious data attack on power system , 2012, 2012 IEEE Power and Energy Society General Meeting.