Masking Transmission Line Outages via False Data Injection Attacks
暂无分享,去创建一个
[1] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[2] F.D. Galiana,et al. A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.
[3] G. Sheblé,et al. Power generation operation and control — 2nd edition , 1996 .
[4] Ying Jun Zhang,et al. Defending mechanisms against false-data injection attacks in the power system state estimation , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[5] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[6] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[7] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[8] Zuyi Li,et al. Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.
[9] Zuyi Li,et al. Trilevel Modeling of Cyber Attacks on Transmission Lines , 2017, IEEE Transactions on Smart Grid.
[10] Karen Miu,et al. Weighted least squares methods for load estimation in distribution networks , 2003 .
[11] Qun Li,et al. Defending against Unidentifiable Attacks in Electric Power Grids , 2013, IEEE Transactions on Parallel and Distributed Systems.
[12] Ian Dobson,et al. Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model , 2005 .
[13] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[14] Zuyi Li,et al. Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.
[15] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[16] H. Vincent Poor,et al. Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[17] Ali Abur,et al. External system line outage identification using phasor measurement units , 2013, IEEE Transactions on Power Systems.
[18] Zuyi Li,et al. Optimal Protection Strategy Against False Data Injection Attacks in Power Systems , 2017, IEEE Transactions on Smart Grid.
[19] J. Arroyo,et al. On the solution of the bilevel programming formulation of the terrorist threat problem , 2005, IEEE Transactions on Power Systems.
[20] Shouhuai Xu,et al. Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework and Case Study , 2013, IEEE Transactions on Information Forensics and Security.
[21] Hamed Mohsenian Rad,et al. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.
[22] Abdullah Abusorrah,et al. Bilevel Model for Analyzing Coordinated Cyber-Physical Attacks on Power Systems , 2016, IEEE Transactions on Smart Grid.
[23] Haibo He,et al. Multi-Contingency Cascading Analysis of Smart Grid Based on Self-Organizing Map , 2013, IEEE Transactions on Information Forensics and Security.
[24] Zuyi Li,et al. Local Topology Attacks in Smart Grids , 2017, IEEE Transactions on Smart Grid.
[25] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[26] H. Vincent Poor,et al. Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[27] Lang Tong,et al. On Topology Attack of a Smart Grid: Undetectable Attacks and Countermeasures , 2013, IEEE Journal on Selected Areas in Communications.
[28] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[29] Allen J. Wood,et al. Power Generation, Operation, and Control , 1984 .
[30] Yue Zhao,et al. On PMU location selection for line outage detection in wide-area transmission networks , 2012, 2012 IEEE Power and Energy Society General Meeting.
[31] Zuyi Li,et al. Local Load Redistribution Attacks in Power Systems With Incomplete Network Information , 2014, IEEE Transactions on Smart Grid.
[32] T.J. Overbye,et al. Line Outage Detection Using Phasor Angle Measurements , 2008, IEEE Transactions on Power Systems.
[33] Lang Tong,et al. Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[34] Hao Zhu,et al. Sparse Overcomplete Representations for Efficient Identification of Power Line Outages , 2012, IEEE Transactions on Power Systems.
[35] V. E. Lynch,et al. Critical points and transitions in an electric power transmission model for cascading failure blackouts. , 2002, Chaos.
[36] Xiaodong Wang,et al. Quickest Detection of False Data Injection Attack in Wide-Area Smart Grids , 2015, IEEE Transactions on Smart Grid.