The IEC 61850 Sampled Measured Values Protocol: Analysis, Threat Identification, and Feasibility of Using NN Forecasters to Detect Spoofed Packets
暂无分享,去创建一个
Mohamad El Hariri | Osama A. Mohammed | Eric Harmon | Hany F. Habib | Tarek Youssef | Mahmoud Saleh | O. Mohammed | H. Habib | Mohamad El Hariri | T. Youssef | E. Harmon | Mahmoud Saleh
[1] Ravishankar K. Iyer,et al. Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids , 2018, IEEE Transactions on Smart Grid.
[2] Vladimiro Miranda,et al. Spatial-Temporal Solar Power Forecasting for Smart Grids , 2015, IEEE Transactions on Industrial Informatics.
[3] T S Sidhu,et al. Performance of IEC 61850-9-2 Process Bus and Corrective Measure for Digital Relaying , 2011, IEEE Transactions on Power Delivery.
[4] Osama A. Mohammed,et al. Development and application of a real-time testbed for multiagent system interoperability: A case study on hierarchical microgrid control , 2017, 2017 IEEE Power & Energy Society General Meeting.
[5] G. Manimaran,et al. Integrated Anomaly Detection for Cyber Security of the Substations , 2014, IEEE Transactions on Smart Grid.
[6] Wei Zhao,et al. Bad Data Detection Using Linear WLS and Sampled Values in Digital Substations , 2018, IEEE Transactions on Power Delivery.
[7] Mohamad El Hariri,et al. On the Implementation of the IEC 61850 Standard: Will Different Manufacturer Devices Behave Similarly under Identical Conditions? , 2016 .
[8] Siddharth Sridhar,et al. Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.
[9] Duncan A. Campbell,et al. Performance Analysis of IEC 61850 Sampled Value Process Bus Networks , 2013, IEEE Transactions on Industrial Informatics.
[10] K. McLaughlin,et al. Multiattribute SCADA-Specific Intrusion Detection System for Power Networks , 2014, IEEE Transactions on Power Delivery.
[11] Nei Kato,et al. An early warning system against malicious activities for smart grid communications , 2011, IEEE Network.
[12] Burton S. Kaliski. A Layman's Guide to a Subset of ASN.1, BER, and DER , 2002 .
[13] Kun-Lin Tsai,et al. An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques , 2017, IEEE Systems Journal.
[14] Chen-Ching Liu,et al. Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.
[15] John R. Williams,et al. Data-Stream-Based Intrusion Detection System for Advanced Metering Infrastructure in Smart Grid: A Feasibility Study , 2015, IEEE Systems Journal.
[16] Junbo Zhao,et al. Short-Term State Forecasting-Aided Method for Detection of Smart Grid General False Data Injection Attacks , 2017, IEEE Transactions on Smart Grid.
[17] H. Vincent Poor,et al. Machine Learning Methods for Attack Detection in the Smart Grid , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[18] Yoseba K. Penya,et al. Evaluating Combined Load Forecasting in Large Power Systems and Smart Grids , 2013, IEEE Transactions on Industrial Informatics.
[19] Thomas H. Morris,et al. Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems , 2015, IEEE Transactions on Smart Grid.
[20] J. Visumathi,et al. A Secured Key Distribution for Effective File Transfer Using HMAC-SHA Algorithm with Self-Healing Property , 2015 .