Maximum Distortion Attacks in Electricity Grids
暂无分享,去创建一个
H. Vincent Poor | Oliver Kosut | Samir M. Perlaza | Iñaki Esnaola | H. Poor | O. Kosut | S. Perlaza | I. Esnaola
[1] H. Vincent Poor,et al. Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models , 2013, IEEE Journal on Selected Areas in Communications.
[2] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[3] Ali Tajer,et al. Energy grid state estimation under random and structured bad data , 2014, 2014 IEEE 8th Sensor Array and Multichannel Signal Processing Workshop (SAM).
[4] H. Vincent Poor,et al. Decentralized Maximum Distortion MMSE Attacks in Electricity Grids , 2015 .
[5] L. Shapley,et al. Potential Games , 1994 .
[6] Karl Henrik Johansson,et al. Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).
[7] G. Andersson,et al. Multiple Bad Data Identification Considering Measurement Dependencies , 2011, IEEE Transactions on Power Systems.
[8] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[9] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[10] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[11] Zuyi Li,et al. Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.
[12] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[13] H. Vincent Poor,et al. Competitive privacy in the smart grid: An information-theoretic approach , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[14] Zhu Han,et al. Defending false data injection attack on smart grid network using adaptive CUSUM test , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[15] L. Shapley,et al. REGULAR ARTICLEPotential Games , 1996 .
[16] Robert M. Gray,et al. Toeplitz and Circulant Matrices: A Review , 2005, Found. Trends Commun. Inf. Theory.
[17] J. Nash. Equilibrium Points in N-Person Games. , 1950, Proceedings of the National Academy of Sciences of the United States of America.
[18] Walid Saad,et al. Game-Theoretic Methods for the Smart Grid: An Overview of Microgrid Systems, Demand-Side Management, and Smart Grid Communications , 2012, IEEE Signal Processing Magazine.
[19] Zhu Han,et al. Bad Data Injection Attack and Defense in Electricity Market Using Game Theory Study , 2012, IEEE Transactions on Smart Grid.
[20] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[21] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[22] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[23] Yun Gu,et al. A novel method to detect bad data injection attack in smart grid , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[24] H. Vincent Poor,et al. Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[25] H. Vincent Poor,et al. Equilibria in data injection attacks , 2014, 2014 IEEE Global Conference on Signal and Information Processing (GlobalSIP).