A Risk-Based Optimization Model for Electric Vehicle Infrastructure Response to Cyber Attacks
暂无分享,去创建一个
Lei Wu | Melike Erol-Kantarci | Seyedamirabbas Mousavian | Thomas Ortmeyer | M. Erol-Kantarci | Lei Wu | T. Ortmeyer | S. Mousavian
[1] Filipe Joel Soares,et al. Integration of Electric Vehicles in the Electric Power System , 2011, Proceedings of the IEEE.
[2] Deepa Kundur,et al. A game-theoretic control approach to mitigate cyber switching attacks in Smart Grid systems , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[3] Hamid Sharif,et al. A Survey on Cyber Security for Smart Grid Communications , 2012, IEEE Communications Surveys & Tutorials.
[4] Zhu Han,et al. Smart grid sensor data collection, communication, and networking: a tutorial , 2014, Wirel. Commun. Mob. Comput..
[5] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[6] Hamed Mohsenian Rad,et al. Vehicle-to-Aggregator Interaction Game , 2012, IEEE Transactions on Smart Grid.
[7] Marco Fiore,et al. Synthetic Mobility Traces for Vehicular Networking , 2013 .
[8] Ian A. Hiskens,et al. Achieving Controllability of Electric Loads This paper discusses actively involving highly distributed loads in power system control actions; an overview of system control objectives is provided. , 2011 .
[9] Melike Erol-Kantarci,et al. Cyber Attack Protection for a Resilient Electric Vehicle Infrastructure , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[10] Hamed Mohsenian Rad,et al. Distributed Internet-Based Load Altering Attacks Against Smart Power Grids , 2011, IEEE Transactions on Smart Grid.
[11] Weihua Zhuang,et al. Stochastic Modeling and Optimization in a Microgrid: A Survey , 2014 .
[12] Rong Zheng,et al. Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid , 2017, IEEE Systems Journal.
[13] Jianying Zhou,et al. Cyber–Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem , 2014, IEEE Journal on Selected Areas in Communications.
[14] F.D. Galiana,et al. A mixed-integer LP procedure for the analysis of electric grid security under disruptive threat , 2005, IEEE Transactions on Power Systems.
[15] Zhao Yang Dong,et al. Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks , 2011, IEEE Transactions on Power Systems.
[16] Euijin Choo,et al. Identifying Malicious Metering Data in Advanced Metering Infrastructure , 2014, 2014 IEEE 8th International Symposium on Service Oriented System Engineering.
[17] Ufuk Topcu,et al. Optimal decentralized protocol for electric vehicle charging , 2011, IEEE Transactions on Power Systems.
[18] Mo-Yuen Chow,et al. A Survey on the Electrification of Transportation in a Smart Grid Environment , 2012, IEEE Transactions on Industrial Informatics.
[19] Walid Saad,et al. Resilient PHEV charging policies under price information attacks , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[20] Mohammad Ilyas,et al. The PEV security challenges to the smart grid: Analysis of threats and mitigation strategies , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).
[21] William H. Sanders,et al. SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures , 2014, IEEE Transactions on Smart Grid.
[22] Zhen Xie,et al. Optimal response to attacks on the open science grid , 2011, Comput. Networks.
[23] Jianhui Wang,et al. A Probabilistic Risk Mitigation Model for Cyber-Attacks to PMU Networks , 2015, IEEE Transactions on Power Systems.
[24] Chris Develder,et al. Optimizing smart energy control strategies for plug-in hybrid electric vehicle charging , 2010, 2010 IEEE/IFIP Network Operations and Management Symposium Workshops.
[25] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[26] Zhu Han,et al. Effect of stealthy bad data injection on network congestion in market based power system , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[27] Johan Driesen,et al. Coordinated charging of multiple plug-in hybrid electric vehicles in residential distribution grids , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.
[28] Meikang Qiu,et al. Secure wireless communication system for smart grid with rechargeable electric vehicles , 2012, IEEE Communications Magazine.
[29] Zhao Yang Dong,et al. Attack structural vulnerability of power grids: A hybrid approach based on complex networks , 2010 .
[30] R. Alvarez,et al. Trilevel Optimization in Power Network Defense , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[31] F.M. Cleveland,et al. Cyber security issues for Advanced Metering Infrasttructure (AMI) , 2008, 2008 IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century.
[32] Yang Xiao,et al. Self-Propagate Mal-Packets in Wireless Sensor Networks: Dynamics and Defense Implications , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[33] Neng Fan,et al. Two-stage stochastic optimal islanding operations under severe multiple contingencies in power grids , 2014 .
[34] Saahil Shenoy,et al. Stochastic optimization of power market forecast using non-parametric regression models , 2015, 2015 IEEE Power & Energy Society General Meeting.
[35] Jianying Zhou,et al. On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628 , 2013, IEEE Communications Magazine.
[36] Natalia Alguacil,et al. A trilevel programming approach for electric grid defense planning , 2014, Comput. Oper. Res..
[37] Amit Kumar Tamang. Coordinated Charging of Plug-in Hybrid Electric Vehicles to Minimize Distribution System Losses , 2013 .