暂无分享,去创建一个
[1] Jianhui Wang,et al. Real-time intrusion detection in power system operations , 2013, IEEE Transactions on Power Systems.
[2] Laurence R. Phillips,et al. Analysis of operations and cyber security policies for a system of cooperating Flexible Alternating Current Transmission System (FACTS) devices. , 2005 .
[3] John Lygeros,et al. Cyber attack in a two-area power system: Impact identification using reachability , 2010, Proceedings of the 2010 American Control Conference.
[4] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[5] Zuyi Li,et al. Quantitative Analysis of Load Redistribution Attacks in Power Systems , 2012, IEEE Transactions on Parallel and Distributed Systems.
[6] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[7] Kun Yu,et al. The Control and Analysis of Self-Healing Urban Power Grid , 2012, IEEE Transactions on Smart Grid.
[8] William H. Sanders,et al. Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[9] Junshan Zhang,et al. Optimal Allocation of Interconnecting Links in Cyber-Physical Systems: Interdependence, Cascading Failures, and Robustness , 2012, IEEE Transactions on Parallel and Distributed Systems.
[10] Hadi Saadat,et al. Power System Analysis , 1998 .
[11] Zeng Xiangjun,et al. Context Information-Based Cyber Security Defense of Protection System , 2007, IEEE Transactions on Power Delivery.
[12] Mariesa L. Crow,et al. Mitigating Event Confidentiality Violations in Smart Grids: An Information Flow Security-Based Approach , 2013, IEEE Transactions on Smart Grid.
[13] G. Manimaran,et al. Cybersecurity for electric power control and automation systems , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.
[14] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[15] Dong Wei,et al. On Protecting Industrial Automation and Control Systems against Electronic Attacks , 2007, 2007 IEEE International Conference on Automation Science and Engineering.
[16] Thomas H. Morris,et al. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information , 2013, IEEE Transactions on Smart Grid.
[17] G. Lambert-Torres,et al. Anomaly detection in power system control center critical infrastructures using rough classification algorithm , 2009, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies.
[18] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[19] G. Manimaran,et al. Data integrity attacks and their impacts on SCADA control system , 2010, IEEE PES General Meeting.
[20] Luiz Eduardo Borges da Silva,et al. Improving Detection Attacks in Electric Power System Critical Infrastructure Usign Rough Classification Algorith , 2007 .
[21] Yoshikazu Fukuyama,et al. A hybrid particle swarm optimization for distribution state estimation , 2003, 2003 IEEE Power Engineering Society General Meeting (IEEE Cat. No.03CH37491).
[22] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[23] Farhad Nabhani,et al. Power system DNP3 data object security using data sets , 2010, Comput. Secur..
[24] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[25] R. C. Desai,et al. Modern power system analysis , 1982, Proceedings of the IEEE.
[26] G. Manimaran,et al. Cybersecurity for Critical Infrastructures: Attack and Defense Modeling , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[27] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[28] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[29] Annabelle Lee,et al. Guidelines for Smart Grid Cyber Security , 2010 .
[30] Zahir Tari,et al. SCADASim—A Framework for Building SCADA Simulations , 2011, IEEE Transactions on Smart Grid.
[31] Dong Wei,et al. Protecting Smart Grid Automation Systems Against Cyberattacks , 2011, IEEE Transactions on Smart Grid.
[32] Rakesh Bobba,et al. Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[33] Laura Hussey. Requirements or Recommendations ? Sorting Out NERC CIP , 2015 .
[34] S. Shankar Sastry,et al. Understanding the physical and economic consequences of attacks on control systems , 2009, Int. J. Crit. Infrastructure Prot..
[35] H. H. Happ,et al. Power System Operation , 1970 .