Optimum node selection for protection under power grid state estimation
暂无分享,去创建一个
Qian He | Rick S. Blum | Duo Bai | Qian He | Duo Bai
[1] Ying Jun Zhang,et al. Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation , 2013, IEEE Transactions on Smart Grid.
[2] Ray D. Zimmerman,et al. MATPOWER User's Manual , 2020 .
[3] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[4] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[5] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[6] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[7] Rong Zheng,et al. Bad data injection in smart grid: attack and defense mechanisms , 2013, IEEE Communications Magazine.
[8] E. Handschin,et al. Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.
[9] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[10] Qun Li,et al. Defending against Unidentifiable Attacks in Electric Power Grids , 2013, IEEE Transactions on Parallel and Distributed Systems.
[11] Henrik Sandberg,et al. Network-layer protection schemes against stealth attacks on state estimators in power systems , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).