Stealth Attacks on the Smart Grid
暂无分享,去创建一个
H. Vincent Poor | Ke Sun | Samir Medina Perlaza | Inaki Esnaola | H. Poor | S. Perlaza | I. Esnaola | Ke Sun
[1] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[2] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[3] Franz Franchetti,et al. An Information-Theoretic Approach to PMU Placement in Electric Power Systems , 2012, IEEE Transactions on Smart Grid.
[4] Joe H. Chow,et al. Likelihood Analysis of Cyber Data Attacks to Power Systems With Markov Decision Processes , 2016, IEEE Transactions on Smart Grid.
[5] Gerhard Kramer,et al. Effective secrecy: Reliability, confusion and stealth , 2013, 2014 IEEE International Symposium on Information Theory.
[6] Siddharth Sridhar,et al. Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.
[7] Karl Henrik Johansson,et al. On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem , 2011, IEEE Transactions on Smart Grid.
[8] R D Zimmerman,et al. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education , 2011, IEEE Transactions on Power Systems.
[9] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[10] Ramin Moslemi,et al. A Fast, Decentralized Covariance Selection-Based Approach to Detect Cyber Attacks in Smart Grids , 2018, IEEE Transactions on Smart Grid.
[11] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[12] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[13] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[14] Henrik Sandberg,et al. Network-layer protection schemes against stealth attacks on state estimators in power systems , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[15] H. Vincent Poor,et al. Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.
[16] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[17] P. Massart,et al. Adaptive estimation of a quadratic functional by model selection , 2000 .
[18] Niall M. Adams,et al. A comparison of efficient approximations for a weighted sum of chi-squared random variables , 2016, Stat. Comput..
[19] John V. McCanny,et al. Progress and Research in Cybersecurity - Supporting a resilient and trustworthy system for the UK , 2016 .
[20] Luis F. Ochoa,et al. Recovering missing data via matrix completion in electricity distribution systems , 2016, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[21] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[22] H. Vincent Poor,et al. Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.
[23] E. S. Pearson,et al. On the Problem of the Most Efficient Tests of Statistical Hypotheses , 1933 .
[24] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[25] David P. Varodayan,et al. Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[26] Sham M. Kakade,et al. A tail inequality for quadratic forms of subgaussian random vectors , 2011, ArXiv.
[27] Inaki Esnaola,et al. Smart meter privacy via the trapdoor channel , 2017, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[28] Zuyi Li,et al. Mitigating False Data Attacks Induced Overloads Using a Corrective Dispatch Scheme , 2019, IEEE Transactions on Smart Grid.
[29] H. Vincent Poor,et al. Distributed joint cyber attack detection and state recovery in smart grids , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[30] Aditya Ashok,et al. Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation , 2018, IEEE Transactions on Smart Grid.
[31] Ilan Shomorony,et al. Worst-Case Additive Noise in Wireless Networks , 2012, IEEE Transactions on Information Theory.
[32] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[33] H. Vincent Poor,et al. Maximum Distortion Attacks in Electricity Grids , 2016, IEEE Transactions on Smart Grid.
[34] H. Vincent Poor,et al. Smart Meter Privacy: A Theoretical Framework , 2013, IEEE Transactions on Smart Grid.
[35] Bruce G. Lindsay,et al. Moment-Based Approximations of Distributions Using Mixtures: Theory and Applications , 2000 .
[36] H. Vincent Poor,et al. Information-theoretic attacks in the smart grid , 2017, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[37] Hao Liang,et al. False Data Injection Attacks Against State Estimation in Power Distribution Systems , 2019, IEEE Transactions on Smart Grid.