Prevention and detection of FDIA on power-network protection scheme using multiple support set
暂无分享,去创建一个
[1] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[2] Zuyi Li,et al. False data attack models, impact analyses and defense strategies in the electricity grid , 2017 .
[3] Zhoujun Li,et al. Improved-ELM method for detecting false data attack in smart grid , 2017 .
[4] Fei Hu,et al. Detection of Faults and Attacks Including False Data Injection Attack in Smart Grid Using Kalman Filter , 2014, IEEE Transactions on Control of Network Systems.
[5] Rongxing Lu,et al. Defending Against False Data Injection Attacks on Power System State Estimation , 2017, IEEE Transactions on Industrial Informatics.
[6] Mehul Motani,et al. Detecting False Data Injection Attacks in AC State Estimation , 2015, IEEE Transactions on Smart Grid.
[7] Munevver Mine Subasi,et al. Logical analysis of multi-class data , 2015, CLEI.
[8] Farhad Mehdipour,et al. Fog Computing Realization for Big Data Analytics , 2019, Fog and Edge Computing.
[9] Tongwen Chen,et al. False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis , 2018, IEEE Transactions on Automatic Control.
[10] Jinping Hao,et al. Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids , 2015, IEEE Transactions on Industrial Informatics.
[11] Zuyi Li,et al. Optimal Protection Strategy Against False Data Injection Attacks in Power Systems , 2017, IEEE Transactions on Smart Grid.
[12] Xinyu Yang,et al. On Optimal PMU Placement-Based Defense Against Data Integrity Attacks in Smart Grid , 2017, IEEE Transactions on Information Forensics and Security.
[13] Le Xie,et al. Sensitivity Analysis of Real-Time Locational Marginal Price to SCADA Sensor Data Corruption , 2014, IEEE Transactions on Power Systems.
[14] Lamine Mili,et al. A Generalized False Data Injection Attacks Against Power System Nonlinear State Estimator and Countermeasures , 2018, IEEE Transactions on Power Systems.
[15] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[16] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[17] Mohiuddin Ahmed,et al. False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure , 2020, Complex Adapt. Syst. Model..
[18] Zhu Han,et al. Real-Time Detection of False Data Injection in Smart Grid Networks: An Adaptive CUSUM Method and Analysis , 2016, IEEE Systems Journal.
[19] Aniket Mahanti,et al. Heuristics-Based Detection of Abnormal Energy Consumption , 2018, SmartGIFT.
[20] Zhu Han,et al. Detecting False Data Injection Attacks on Power Grid by Sparse Optimization , 2014, IEEE Transactions on Smart Grid.
[21] Alexander Kogan,et al. Logical analysis of data – the vision of Peter L. Hammer , 2007, Annals of Mathematics and Artificial Intelligence.
[22] Ying Jun Zhang,et al. Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.
[23] Thomas G. Dietterich,et al. Learning Boolean Concepts in the Presence of Many Irrelevant Features , 1994, Artif. Intell..
[24] Y. Crama,et al. Cause-effect relationships and partially defined Boolean functions , 1988 .
[25] Toshihide Ibaraki,et al. An Implementation of Logical Analysis of Data , 2000, IEEE Trans. Knowl. Data Eng..
[26] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[27] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[28] Ying Jun Zhang,et al. Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation , 2014, IEEE Journal on Selected Areas in Communications.
[29] Wei Yu,et al. On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures , 2014, IEEE Transactions on Parallel and Distributed Systems.
[30] Aniket Mahanti,et al. A Framework of Automation on Context-Aware Internet of Things (IoT) Systems , 2019, UCC Companion.
[31] Aniket Mahanti,et al. Detecting anomalous energy consumption using contextual analysis of smart meter data , 2019, Wireless Networks.