Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation
暂无分享,去创建一个
Ying Jun Zhang | Suzhi Bi | S. Bi | Y. Zhang
[1] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[2] Karl Henrik Johansson,et al. A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator , 2010, ArXiv.
[3] Hadi Saadat,et al. Power System Analysis , 1998 .
[4] Karl Henrik Johansson,et al. Computing Critical $k$-Tuples in Power Networks , 2012, IEEE Transactions on Power Systems.
[5] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[6] G. Krumpholz,et al. Power System Observability: A Practical Algorithm Using Network Topology , 1980, IEEE Transactions on Power Apparatus and Systems.
[7] Zuyi Li,et al. Modeling Load Redistribution Attacks in Power Systems , 2011, IEEE Transactions on Smart Grid.
[8] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[9] Munish Kumar,et al. Optimal Placement of Phasor Measurement Units for Power System Observability , 2015 .
[10] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[11] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[12] M. R. Irving,et al. Observability Determination in Power System State Estimation Using a Network Flow Technique , 1986, IEEE Transactions on Power Systems.
[13] Gabriela Hug,et al. Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks , 2012, IEEE Transactions on Smart Grid.
[14] Kameshwar Poolla,et al. Building Efficiency and Sustainability in the Tropics ( SinBerBEST ) , 2012 .
[15] Hans Jürgen Prömel,et al. The Steiner Tree Problem , 2002 .
[16] Bruno Sinopoli,et al. Integrity Data Attacks in Power Market Operations , 2011, IEEE Transactions on Smart Grid.
[17] Rastko Zivanovic,et al. Implementation of PMU technology in state estimation: an overview , 1996, Proceedings of IEEE. AFRICON '96.
[18] Lang Tong,et al. Impacts of Malicious Data on Real-Time Price of Electricity Market Operations , 2012, 2012 45th Hawaii International Conference on System Sciences.
[19] Henrik Sandberg,et al. Network-Aware Mitigation of Data Integrity Attacks on Power System State Estimation , 2012, IEEE Journal on Selected Areas in Communications.
[20] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[21] Karl Henrik Johansson,et al. Electric power network security analysis via minimum cut relaxation , 2011, IEEE Conference on Decision and Control and European Control Conference.
[22] Rajat Saini,et al. OPTIMAL PLACEMENT OF PHASOR MEASUREMENT UNITS FOR POWER SYSTEM OBSERVABILITY , 2013 .
[23] Le Xie,et al. Malicious ramp-induced temporal data attack in power market with look-ahead dispatch , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).
[24] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[25] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[26] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[27] Ying Jun Zhang,et al. Defending mechanisms against false-data injection attacks in the power system state estimation , 2011, 2011 IEEE GLOBECOM Workshops (GC Wkshps).
[28] H.M. Ismail,et al. A Unified Approach for the Optimal PMU Location for Power System State Estimation , 2009, IEEE Transactions on Power Systems.
[29] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2009, CCS.
[30] Ali Abur,et al. On the use of PMUs in power system state estimation , 2011 .