Prevention and detection of FDIA on power-network protection scheme using multiple support set

[1]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[2]  Zuyi Li,et al.  False data attack models, impact analyses and defense strategies in the electricity grid , 2017 .

[3]  Zhoujun Li,et al.  Improved-ELM method for detecting false data attack in smart grid , 2017 .

[4]  Fei Hu,et al.  Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.

[5]  Rongxing Lu,et al.  Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.

[6]  Mehul Motani,et al.  Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.

[7]  Munevver Mine Subasi,et al.  Logical analysis of multi-class data , 2015, CLEI.

[8]  Farhad Mehdipour,et al.  Fog Computing Realization for Big Data Analytics , 2019, Fog and Edge Computing.

[9]  Tongwen Chen,et al.  False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis , 2018, IEEE Transactions on Automatic Control.

[10]  Jinping Hao,et al.  Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.

[11]  Zuyi Li,et al.  Optimal Protection Strategy Against False Data Injection Attacks in Power Systems , 2017, IEEE Transactions on Smart Grid.

[12]  Xinyu Yang,et al.  On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.

[13]  Le Xie,et al.  Sensitivity Analysis of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption , 2014, IEEE Transactions on Power Systems.

[14]  Lamine Mili,et al.  A Generalized False Data Injection Attacks Against Power System Nonlinear State Estimator and Countermeasures , 2018, IEEE Transactions on Power Systems.

[15]  Athanasios V. Vasilakos,et al.  False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.

[16]  Bruno Sinopoli,et al.  Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.

[17]  Mohiuddin Ahmed,et al.  False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure , 2020, Complex Adapt. Syst. Model..

[18]  Zhu Han,et al.  Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.

[19]  Aniket Mahanti,et al.  Heuristics-Based Detection of Abnormal Energy Consumption , 2018, SmartGIFT.

[20]  Zhu Han,et al.  Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.

[21]  Alexander Kogan,et al.  Logical analysis of data – the vision of Peter L. Hammer , 2007, Annals of Mathematics and Artificial Intelligence.

[22]  Ying Jun Zhang,et al.  Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.

[23]  Thomas G. Dietterich,et al.  Learning Boolean Concepts in the Presence of Many Irrelevant Features , 1994, Artif. Intell..

[24]  Y. Crama,et al.  Cause-effect relationships and partially defined Boolean functions , 1988 .

[25]  Toshihide Ibaraki,et al.  An Implementation of Logical Analysis of Data , 2000, IEEE Trans. Knowl. Data Eng..

[26]  Zuyi Li,et al.  Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.

[27]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2009, CCS.

[28]  Ying Jun Zhang,et al.  Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation , 2014, IEEE Journal on Selected Areas in Communications.

[29]  Wei Yu,et al.  On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.

[30]  Aniket Mahanti,et al.  A Framework of Automation on Context-Aware Internet of Things (IoT) Systems , 2019, UCC Companion.

[31]  Aniket Mahanti,et al.  Detecting anomalous energy consumption using contextual analysis of smart meter data , 2019, Wireless Networks.