The impact of false data injection attacks against remedial action schemes
暂无分享,去创建一个
Sara Eftekharnejad | Brian K. Johnson | Sagnik Basumallik | S. Basumallik | S. Eftekharnejad | B. Johnson
[1] Katherine R. Davis,et al. Analytic corrective control selection for online remedial action scheme design in a cyber adversarial environment , 2017, IET Cyper-Phys. Syst.: Theory & Appl..
[2] Elias Kyriakides,et al. A Real-Time Controlled Islanding and Restoration Scheme Based on Estimated States , 2019, IEEE Transactions on Power Systems.
[3] Xinyu Yang,et al. On Distributed Energy Routing Protocols in the Smart Grid , 2013 .
[4] Naima Kaabouch,et al. Cyber-security in smart grid: Survey and challenges , 2018, Comput. Electr. Eng..
[5] Wen-Long Chin,et al. Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid , 2015, IEEE Transactions on Smart Grid.
[6] Saman A. Zonouz,et al. CPIndex: Cyber-Physical Vulnerability Assessment for Power-Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.
[7] G. Manimaran,et al. Cyber Attack Exposure Evaluation Framework for the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[8] Kishor S. Trivedi,et al. Non‐Markovian State‐Space Models in Dependability Evaluation , 2013, Qual. Reliab. Eng. Int..
[9] Youping Fan,et al. A Method for Identifying Critical Elements of a Cyber-Physical System Under Data Attack , 2018, IEEE Access.
[10] Deepa Kundur,et al. Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.
[11] Abdullah Abusorrah,et al. Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.
[12] Qing Zhu,et al. Forewarned Is Forearmed: An Automated System for Remedial Action Schemes , 2014, IEEE Power and Energy Magazine.
[13] Anupam Joshi,et al. Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow , 2017 .
[14] Thomas M. Chen,et al. Petri Net Modeling of Cyber-Physical Attacks on Smart Grid , 2011, IEEE Transactions on Smart Grid.
[15] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[16] Katherine R. Davis,et al. A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures , 2015, IEEE Transactions on Smart Grid.
[17] E. Mathieu,et al. Parametric and Non Homogeneous Semi-Markov Process for HIV Control , 2007 .
[18] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[19] Zuyi Li,et al. Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.
[20] Yong Fu,et al. Reliability Assessment of Smart Grid Considering Direct Cyber-Power Interdependencies , 2012, IEEE Transactions on Smart Grid.
[21] Lei Huang,et al. Optimal PMU Placement Considering Controlled Islanding of Power System , 2014, IEEE Transactions on Power Systems.
[22] Jean-Claude Laprie,et al. Modelling Interdependencies Between the Electricity and Information Infrastructures , 2007, SAFECOMP.
[23] Zuyi Li,et al. False Data Attacks Against AC State Estimation With Incomplete Network Information , 2017, IEEE Transactions on Smart Grid.
[24] Mohammad Shahidehpour,et al. Power System Risk Assessment in Cyber Attacks Considering the Role of Protection Systems , 2017, IEEE Transactions on Smart Grid.
[25] Avinash Kumar Sinha,et al. Standing phase angle reduction for power system restoration , 1998 .
[26] Robin Podmore,et al. Real-Time Contingency Analysis With Corrective Transmission Switching , 2016, IEEE Transactions on Power Systems.
[27] Jianhui Wang,et al. A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks , 2015, IEEE Transactions on Power Systems.
[28] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[29] Peter Palensky,et al. Cyber Risk Analysis of Combined Data Attacks Against Power System State Estimation , 2017, IEEE Transactions on Smart Grid.
[30] Zuyi Li,et al. Masking Transmission Line Outages via False Data Injection Attacks , 2016, IEEE Transactions on Information Forensics and Security.
[31] Lingfeng Wang,et al. Inclusion of SCADA Cyber Vulnerability in Power System Reliability Assessment Considering Optimal Resources Allocation , 2016, IEEE Transactions on Power Systems.
[32] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[33] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[34] Rui Ma,et al. A PMU-based Multivariate Model for Classifying Power System Events , 2018, ArXiv.
[35] Shuai Wang,et al. Paradigm and Paradox in Topology Control of Power Grids , 2018, 2018 IEEE Conference on Decision and Control (CDC).
[36] Oliver Kosut,et al. Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation , 2015, IEEE Transactions on Power Systems.
[37] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[38] Hao Liang,et al. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.
[39] Sara Eftekharnejad,et al. Packet-data anomaly detection in PMU-based state estimator using convolutional neural network , 2019, International Journal of Electrical Power & Energy Systems.
[40] B. Wollenberg,et al. Analysis of Massive Measurement Loss in Large-Scale Power System State Estimation , 2001, IEEE Power Engineering Review.
[41] Tyler H. Summers,et al. Security analysis of cyber-physical systems using H 2 norm , 2017 .
[42] Jovica V. Milanović,et al. Interdepedency modeling of cyber-physical systems using a weighted complex network approach , 2017, 2017 IEEE Manchester PowerTech.
[43] Zuyi Li,et al. Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.
[44] Kai Sun,et al. Splitting strategies for islanding operation of large-scale power systems using OBDD-based methods , 2003 .
[45] Gang Wang,et al. An Improved OPA Model and Blackout Risk Assessment , 2009, IEEE Transactions on Power Systems.
[46] Deepa Kundur,et al. A Coordinated Multi-Switch Attack for Cascading Failures in Smart Grid , 2014, IEEE Transactions on Smart Grid.