Risk Assessment of Cyber Attacks on Power Grids Considering the Characteristics of Attack Behaviors
暂无分享,去创建一个
Biyun Chen | Junhui Zhao | Yiyi Zhang | Zhihao Yang | Yanni Chen | Junhui Zhao | Zhihao Yang | Yiyi Zhang | Biyun Chen | Yanni Chen
[1] Jianhui Wang,et al. Cyber-Physical Modeling and Cyber-Contingency Assessment of Hierarchical Control Systems , 2015, IEEE Transactions on Smart Grid.
[2] Dusmanta Kumar Mohanta,et al. A review on synchrophasor communication system: communication technologies, standards and applications , 2018 .
[3] Walid Saad,et al. Stochastic Games for Power Grid Protection Against Coordinated Cyber-Physical Attacks , 2018, IEEE Transactions on Smart Grid.
[4] Chao Yang,et al. DoS attack in centralised sensor network against state estimation , 2018, IET Control Theory & Applications.
[5] Newton G. Bretas,et al. Further contributions to smart grids cyber-physical security as a malicious data attack: Proof and properties of the parameter error spreading out to the measurements and a relaxed correction model , 2019, International Journal of Electrical Power & Energy Systems.
[6] Arif I. Sarwat,et al. Defending mechanisms for protecting power systems against intelligent attacks , 2015, 2015 10th System of Systems Engineering Conference (SoSE).
[7] David L. Olson,et al. Multiattribute Utility Theory , 1996 .
[8] Zengji Liu,et al. The research on cyber-attack testbed with hardware-in-loop , 2017, 2017 IEEE Conference on Energy Internet and Energy System Integration (EI2).
[9] David K. Y. Yau,et al. Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation , 2013, IEEE Transactions on Power Systems.
[10] Reynaldo Nuqui,et al. Cyber Attack Resilient Distance Protection and Circuit Breaker Control for Digital Substations , 2019, IEEE Transactions on Industrial Informatics.
[11] Hanbo Zheng,et al. Identifying hotspots of sectors and supply chain paths for electricity conservation in China , 2020 .
[12] Zhao Yang Dong,et al. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks , 2017, IEEE Transactions on Power Systems.
[13] Mingjian Cui,et al. Flexible Machine Learning-Based Cyberattack Detection Using Spatiotemporal Patterns for Distribution Systems , 2020, IEEE Transactions on Smart Grid.
[14] Naresh Malla,et al. Real-time cyber physical system testbed for power system security and control , 2017 .
[15] Yijia Cao,et al. Cascading Failure Analysis Considering Interaction Between Power Grids and Communication Networks , 2016, IEEE Transactions on Smart Grid.
[16] Mingjian Cui,et al. Multilevel Programming-Based Coordinated Cyber Physical Attacks and Countermeasures in Smart Grid , 2019, IEEE Access.
[17] Lingfeng Wang,et al. Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems , 2016, IEEE Transactions on Smart Grid.
[18] Lingfeng Wang,et al. A game-theoretic study of load redistribution attack and defense in power systems , 2017 .
[19] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[20] Wutao Chen,et al. Distributed sensing and cooperative estimation/detection of ubiquitous power internet of things , 2019 .
[21] Lingfeng Wang,et al. Inclusion of SCADA Cyber Vulnerability in Power System Reliability Assessment Considering Optimal Resources Allocation , 2016, IEEE Transactions on Power Systems.
[22] Probability Subcommittee,et al. IEEE Reliability Test System , 1979, IEEE Transactions on Power Apparatus and Systems.
[23] Lingfeng Wang,et al. An Improved Defender–Attacker–Defender Model for Transmission Line Defense Considering Offensive Resource Uncertainties , 2019, IEEE Transactions on Smart Grid.
[24] Liangzhong Yao,et al. Electric grid vulnerability assessment under attack-defense scenario based on game theory , 2013, 2013 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC).
[25] Yiyi Zhang,et al. Risk Assessment for the Power Grid Dispatching Process Considering the Impact of Cyber Systems , 2019, Energies.
[26] Peter C. Fishburn,et al. Utility Theory and Decision Theory , 1990 .
[27] Nikolaos Gatsis,et al. Vulnerability Analysis of Smart Grids to GPS Spoofing , 2018, 2018 IEEE Power & Energy Society General Meeting (PESGM).
[28] Wenxia Liu,et al. Security Assessment for Communication Networks of Power Control Systems Using Attack Graph and MCDM , 2010, IEEE Transactions on Power Delivery.
[29] M. Pipattanasomporn,et al. Real-time co-simulation platform using OPAL-RT and OPNET for analyzing smart grid performance , 2015, 2015 IEEE Power & Energy Society General Meeting.
[30] Ciwei Gao,et al. Risk Assessment of Malicious Attacks Against Power Systems , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[31] Antonio J. Conejo,et al. An Efficient Tri-Level Optimization Model for Electric Grid Defense Planning , 2017, IEEE Transactions on Power Systems.
[32] Thoshitha T. Gamage,et al. Analyzing the Cyber-Physical Impact of Cyber Events on the Power Grid , 2015, IEEE Transactions on Smart Grid.
[33] T. G. Lewis,et al. A general defender-attacker risk model for networks , 2008 .
[34] Pramod P. Khargonekar,et al. Smart grids cyber-physical security as a malicious data attack: An innovation approach , 2017 .
[35] P P Garre. Multiattribute utility theory in decision-making. , 1992, Nursing management.
[36] Dong Yue,et al. Security Assessment for Cyber Physical Distribution Power System Under Intrusion Attacks , 2019, IEEE Access.