메뉴 건너뛰기




Volumn 2, Issue 2, 2011, Pages 382-390

Modeling load redistribution attacks in power systems

Author keywords

Delayed LR attacks; effective protection strategies; false data injection attacks; immediate LR attacks; load redistribution attacks; state estimation

Indexed keywords

DELAYED LR ATTACKS; EFFECTIVE PROTECTION STRATEGIES; FALSE DATA INJECTION ATTACKS; IMMEDIATE LR ATTACKS; LOAD REDISTRIBUTION ATTACKS;

EID: 79957758241     PISSN: 19493053     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSG.2011.2123925     Document Type: Article
Times cited : (478)

References (23)
  • 2
    • 2542628960 scopus 로고    scopus 로고
    • Analysis of electric grid security under terrorist threat
    • May
    • J. Salmeron, K.Wood, and R. Baldick, "Analysis of electric grid security under terrorist threat," IEEE Trans. Power Syst., vol. 19, no. 2, pp. 905-912, May 2004.
    • (2004) IEEE Trans. Power Syst. , vol.19 , Issue.2 , pp. 905-912
    • Salmeron, J.1    Wood, K.2    Baldick, R.3
  • 3
    • 18944385541 scopus 로고    scopus 로고
    • On the solution of the bilevel programming formulation of the terrorist threat problem
    • DOI 10.1109/TPWRS.2005.846198
    • J. M. Arroyo and F. D. Galiana, "On the solution of the bilevel programming formulation of the terrorist threat problem," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 789-797, May 2005. (Pubitemid 40699709)
    • (2005) IEEE Transactions on Power Systems , vol.20 , Issue.2 , pp. 789-797
    • Arroyo, J.M.1    Galiana, F.D.2
  • 4
    • 24944442583 scopus 로고    scopus 로고
    • A mixed-integer LP programming formulation of the terrorist threat problem
    • Aug.
    • A. L. Motto, J. M. Arroyo, and F. D. Galiana, "A mixed-integer LP programming formulation of the terrorist threat problem," IEEE Trans. Power Syst., vol. 20, no. 3, pp. 1357-1365, Aug. 2005.
    • (2005) IEEE Trans. Power Syst. , vol.20 , Issue.3 , pp. 1357-1365
    • Motto, A.L.1    Arroyo, J.M.2    Galiana, F.D.3
  • 5
    • 60149091834 scopus 로고    scopus 로고
    • Worst-case interdiction analysis of large-scale electric power grids
    • Feb.
    • J. Salmeron, K. Wood, and R. Baldick, "Worst-case interdiction analysis of large-scale electric power grids," IEEE Trans. Power Syst., vol. 24, no. 1, pp. 96-104, Feb. 2009.
    • (2009) IEEE Trans. Power Syst. , vol.24 , Issue.1 , pp. 96-104
    • Salmeron, J.1    Wood, K.2    Baldick, R.3
  • 7
    • 77951665596 scopus 로고    scopus 로고
    • Analysis of electric grid interdiction with line switching
    • May
    • A. Delgadillo, J.M. Arroyo, and N. Alguacil, "Analysis of electric grid interdiction with line switching," IEEE Trans. Power Syst., vol. 25, no. 2, pp. 633-641, May 2010.
    • (2010) IEEE Trans. Power Syst. , vol.25 , Issue.2 , pp. 633-641
    • Delgadillo, A.1    J.M. Arroyo2    Alguacil, N.3
  • 8
    • 77953342320 scopus 로고    scopus 로고
    • Bilevel programming applied to power system vulnerability analysis undermultiple contingencies
    • Feb.
    • J.M. Arroyo, "Bilevel programming applied to power system vulnerability analysis undermultiple contingencies," IETGener., Transm. Distrib., vol. 4, no. 2, pp. 178-190, Feb. 2010.
    • (2010) IETGener., Transm. Distrib. , vol.4 , Issue.2 , pp. 178-190
    • J.M. Arroyo1
  • 10
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Nov.
    • Y. Liu, P. Ning, and M. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Security, Nov. 2009, pp. 21-32.
    • (2009) Proc. 16th ACM Conf. Comput. Commun. Security , pp. 21-32
    • Liu, Y.1    Ning, P.2    Reiter, M.3
  • 11
    • 0022148881 scopus 로고
    • Bad data identification methods in power system state estimation-A comparative study
    • L. Mili, T. Cutsem, and M. Ribbens-Pavella, "Bad data identification methods in power system state estimation-A comparative study," IEEE Trans. Power App. Syst., vol. PAS-104, no. 11, pp. 3037-3049, Nov. 1985. (Pubitemid 16524642)
    • (1985) IEEE transactions on power apparatus and systems , vol.PAS-104 , Issue.11 , pp. 3037-3049
    • Mili, L.1    Cutsem, T.2    Ribbens-Pavella, M.3
  • 12
    • 0024612113 scopus 로고
    • Detection of topology errors by state estimation
    • Feb.
    • F. F. Wu and W.-H. E. Liu, "Detection of topology errors by state estimation," IEEE Trans. Power Syst., vol. 4, no. 1, pp. 176-183, Feb. 1989.
    • (1989) IEEE Trans. Power Syst. , vol.4 , Issue.1 , pp. 176-183
    • Wu, F.F.1    Liu, W.-H.E.2
  • 13
    • 77953719713 scopus 로고    scopus 로고
    • Limiting false data attacks on power system state estimation
    • Mar.
    • O. Kosut, L. Jia, R. Thomas, and L. Tong, "Limiting false data attacks on power system state estimation," in Proc. Conf. Inf. Sci. Syst., Mar. 2010, pp. 1-7.
    • (2010) Proc. Conf. Inf. Sci. Syst. , pp. 1-7
    • Kosut, O.1    Jia, L.2    Thomas, R.3    Tong, L.4
  • 15
    • 34248588340 scopus 로고    scopus 로고
    • A multiperiod energy acquisition model for a distribution company with distributed generation and interruptible load
    • DOI 10.1109/TPWRS.2007.894862
    • H. Li, Y. Li, and Z. Li, "A multiperiod energy acquisition model for a distribution company with distributed generation and interruptible load," IEEE Trans. Power Syst., vol. 22, no. 2, pp. 588-596,May 2007. (Pubitemid 46746220)
    • (2007) IEEE Transactions on Power Systems , vol.22 , Issue.2 , pp. 588-596
    • Li, H.1    Li, Y.2    Li, Z.3
  • 16
    • 18944390925 scopus 로고    scopus 로고
    • Risk-constrained FTR bidding strategy in transmission markets
    • DOI 10.1109/TPWRS.2005.846052
    • T. Li and M. Shahidehpour, "Risk-constrained FTR bidding strategy in transmission markets," IEEE Trans. Power Syst., vol. 20, no. 2, pp. 1014-1021, May 2005. (Pubitemid 40699733)
    • (2005) IEEE Transactions on Power Systems , vol.20 , Issue.2 , pp. 1014-1021
    • Li, T.1    Shahidehpour, M.2
  • 17
    • 13844306904 scopus 로고    scopus 로고
    • Strategic bidding of transmission-constrained GENCOs with incomplete information
    • DOI 10.1109/TPWRS.2004.840378
    • T. Li and M. Shahidehpour, "Strategic bidding of transmission-constrained GENCOS with incomplete information," IEEE Trans. Power Syst., vol. 20, no. 1, pp. 437-447, Feb. 2005. (Pubitemid 40259462)
    • (2005) IEEE Transactions on Power Systems , vol.20 , Issue.1 , pp. 437-447
    • Li, T.1    Shahidehpour, M.2
  • 18
    • 0019608634 scopus 로고
    • A representation and economic interpretation of a two-level programming problem
    • J. Fortuny-Amat and B. McCarl, "A representation and economic interpretation of a two-level programming problem," J. Oper. Res. Soc., vol. 32, pp. 783-792, Sep. 1981. (Pubitemid 12521956)
    • (1981) Journal of the Operational Research Society , vol.32 , Issue.9 , pp. 783-792
    • Fortuny-Amat, J.1    McCarl, B.2
  • 19
    • 74849091624 scopus 로고    scopus 로고
    • A bilevel optimization model and a PSO-based algorithm in day-ahead electricity markets
    • Oct.
    • G. Zhang, G. Zhang, Y. Gao, and J. Lu, "A bilevel optimization model and a PSO-based algorithm in day-ahead electricity markets," Proc. IEEE Int. Conf. Syst., Man, Cybern., pp. 611-616, Oct. 2009.
    • (2009) Proc. IEEE Int. Conf. Syst., Man, Cybern. , pp. 611-616
    • Zhang, G.1    Zhang, G.2    Gao, Y.3    Lu, J.4
  • 20
    • 67349177312 scopus 로고    scopus 로고
    • Strategic generation capacity expansion planning with incomplete information
    • May
    • J. Wang, M. Shahidehpour, Z. Li, and A. Botterud, "Strategic generation capacity expansion planning with incomplete information," IEEE Trans. Power Syst., vol. 24, no. 2, pp. 1002-1010, May 2009.
    • (2009) IEEE Trans. Power Syst. , vol.24 , Issue.2 , pp. 1002-1010
    • Wang, J.1    Shahidehpour, M.2    Li, Z.3    Botterud, A.4
  • 22
    • 79957701095 scopus 로고    scopus 로고
    • MATPOWER, A MATLAB Power System Simulation Package [Online]. Available
    • MATPOWER, A MATLAB Power System Simulation Package [Online]. Available: http://www.pserc.cornell.edu/matpower/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.