-
1
-
-
70549106029
-
Electricity grid in U.S. penetrated by spies
-
Apr. [Online]
-
S. Gorman, "Electricity grid in U.S. penetrated by spies," Wall St. J., Apr. 2009 [Online]. Available: http://online.wsj.com/article/ SB123914805204099085.html
-
(2009)
Wall St. J.
-
-
Gorman, S.1
-
2
-
-
0038519587
-
Experience with pjm market operation, system design, and implementation
-
May
-
A. L. Ott, "Experience with pjm market operation, system design, and implementation," IEEE Trans. Power Syst., vol. 18, no. 2, pp. 528-534, May 2003.
-
(2003)
IEEE Trans. Power Syst.
, vol.18
, Issue.2
, pp. 528-534
-
-
Ott, A.L.1
-
3
-
-
33847621698
-
Ex post pricing in the co-optimized energy and reserve market
-
DOI 10.1109/TPWRS.2006.882457
-
T. Zhang and E. Litvinov, "Ex-post pricing in the co-optimized energy and reserv markets," IEEE Trans. Power Syst., vol. 21, no. 4, pp. 1528-1538, Nov. 2006. (Pubitemid 46357750)
-
(2006)
IEEE Transactions on Power Systems
, vol.21
, Issue.4
, pp. 1528-1538
-
-
Zheng, T.1
Litvinov, E.2
-
4
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. ACM Conf. Comput. Commun. Security, 2009, pp. 21-32.
-
(2009)
Proc. ACM Conf. Comput. Commun. Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
5
-
-
0026913009
-
When is the generalized likelihood ratio test optimal
-
Mar.
-
O. Zeitouni, J. Ziv, and N. Merhav, "When is the generalized likelihood ratio test optimal," IEEE Trans. Inf. Theory, vol. 38, no. 3, pp. 1597-1602, Mar. 1991.
-
(1991)
IEEE Trans. Inf. Theory
, vol.38
, Issue.3
, pp. 1597-1602
-
-
Zeitouni, O.1
Ziv, J.2
Merhav, N.3
-
8
-
-
0014700838
-
Power system static state estimation, parts I, II, III
-
F. C. Schweppe, J. Wildes, and D. P. Rom, "Power system static state estimation, parts I, II, III," IEEE Tran. Power App. Syst., vol. PAS-89, pp. 120-135, 1970.
-
(1970)
IEEE Tran. Power App. Syst.
, vol.PAS-89
, pp. 120-135
-
-
Schweppe, F.C.1
Wildes, J.2
Rom, D.P.3
-
9
-
-
0016480359
-
Bad data analysis for power system state estimation
-
Mar./Apr.
-
E. Handschin, F. C. Schweppe, J. Kohlas, and A. Fiechter, "Bad data analysis for power system state estimation," IEEE Trans. Power App. Syst., vol. PAS-94, no. 2, pp. 329-337, Mar./Apr. 1975.
-
(1975)
IEEE Trans. Power App. Syst.
, vol.PAS-94
, Issue.2
, pp. 329-337
-
-
Handschin, E.1
Schweppe, F.C.2
Kohlas, J.3
Fiechter, A.4
-
10
-
-
0033881588
-
Electric power system state estimation
-
DOI 10.1109/5.824004
-
A. Monticelli, "Electric power system state estimation," Proc. IEEE, vol. 88, no. 2, pp. 262-282, 2000. (Pubitemid 30558114)
-
(2000)
Proceedings of the IEEE
, vol.88
, Issue.2
, pp. 262-282
-
-
Monticelli, A.1
-
11
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
Gaithersburg MD, Oct.
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in Proc. IEEE 2010 SmartGridComm, Gaithersburg, MD, Oct. 2010.
-
(2010)
Proc. IEEE 2010 SmartGridComm
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
12
-
-
84155170617
-
On security indices for state estimators in power networks
-
Stockholm, Sweden, Apr.
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," in Proc. 1st Workshop Secure Control Syst. (CPSWEEK), Stockholm, Sweden, Apr. 2010.
-
(2010)
Proc. 1st Workshop Secure Control Syst. (CPSWEEK)
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
13
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
Gaithersburg MD, Oct.
-
G. Dán and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. IEEE 2010 SmartGrid-Comm, Gaithersburg, MD, Oct. 2010.
-
(2010)
Proc. IEEE 2010 SmartGrid-Comm
-
-
Dán, G.1
Sandberg, H.2
-
14
-
-
84155170617
-
On security indices for state estimators in power networks
-
Stockholm, Sweden, Apr.
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," in Proc. 1st Workshop Secure Control Syst. (CPSWEEK), Stockholm, Sweden, Apr. 2010.
-
(2010)
Proc. 1st Workshop Secure Control Syst. (CPSWEEK)
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
15
-
-
0019042727
-
Power system observability: A practical algorithm using network topology
-
G. R. Krumpholz, K. A. Clements, and P. W. Davis, "Power system observability: A practical algorithm using network topology," IEEE Trans. Power App. Syst., vol. PAS-99, no. 4, pp. 1534-1542, Jul. 1980. (Pubitemid 11472481)
-
(1980)
IEEE transactions on power apparatus and systems
, vol.PAS-99
, Issue.4
, pp. 1534-1542
-
-
Krumpholz, G.R.1
Clements, K.A.2
David, P.W.3
-
16
-
-
84857230860
-
Detecting false data injection attacks on dc state estimation
-
Stockholm, Sweden, Apr.
-
R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, "Detecting false data injection attacks on dc state estimation," in Proc. 1st Workshop Secure Control Syst. (CPSWEEK), Stockholm, Sweden, Apr. 2010.
-
(2010)
Proc. 1st Workshop Secure Control Syst. (CPSWEEK)
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
17
-
-
77953719713
-
Limiting false data attacks on power system state estimation
-
Mar.
-
O.Kosut, L. Jia, R. J. Thomas, and L. Tong, "Limiting false data attacks on power system state estimation," in Proc. 2010 Conf. Inf. Sciences Syst., Mar. 2010.
-
(2010)
Proc. 2010 Conf. Inf. Sciences Syst.
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
18
-
-
78651420105
-
On malicious data attacks on power system state estimation
-
Cardiff, U.K., Aug.
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "On malicious data attacks on power system state estimation," in Proc. 45th Int. Univ. Power Eng. Conf., Cardiff, U.K., Aug. 2010.
-
(2010)
Proc. 45th Int. Univ. Power Eng. Conf.
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
19
-
-
78651458587
-
Bad data identification methods in power system state estimation-A comparative study
-
Aug.
-
L. Mili, T. V. Cutsem, and M. Ribbens-Pavalla, "Bad data identification methods in power system state estimation-A comparative study," IEEE J. Select. Areas Commun., vol. 16, no. 6, pp. 953-972, Aug. 1998.
-
(1998)
IEEE J. Select. Areas Commun.
, vol.16
, Issue.6
, pp. 953-972
-
-
Mili, L.1
Cutsem, T.V.2
Ribbens-Pavalla, M.3
-
20
-
-
0022095903
-
Multiple bad data identification for state estimation by combinatorial optimization
-
Jul.
-
A. Monticelli, F.Wu, and M. Yen, "Multiple bad data identification for state estimation by combinatorial optimization," IEEE Trans. Power Syst., vol. PWRD-1, no. 3, pp. 361-369, Jul. 1986.
-
(1986)
IEEE Trans. Power Syst.
, vol.PWRD-1
, Issue.3
, pp. 361-369
-
-
Monticelli, A.1
Wu, F.2
Yen, M.3
-
21
-
-
0030215904
-
Identification of multiple interacting bad data via power system decomposition
-
M. G. Cheniae, L. Mili, and P. Rousseeuw, "Identification of multiple interacting bad data via power system decomposition," IEEE Trans. Power Syst., vol. 11, no. 3, pp. 1555-1563, Aug. 1996. (Pubitemid 126781311)
-
(1996)
IEEE Transactions on Power Systems
, vol.11
, Issue.3
, pp. 1555-1563
-
-
Cheniae, M.G.1
Mili, L.2
-
23
-
-
82155179405
-
Some economic impacts of bad and malicious data
-
Portland, ME, Jul.
-
R. J. Thomas, L. Tong, L. Jia, and O. E. Kosut, "Some economic impacts of bad and malicious data," in Proc. PSerc 2010 Workshop, Portland, ME, Jul. 2010, vol. 1.
-
(2010)
Proc. PSerc 2010 Workshop
, vol.1
-
-
Thomas, R.J.1
Tong, L.2
Jia, L.3
Kosut, O.E.4
-
24
-
-
79955998041
-
False data injection attacks in electricity markets
-
MD, Oct.
-
L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in Proc. IEEE 2010 SmartGridComm, Gaithersburg, MD, Oct. 2010.
-
(2010)
Proc. IEEE 2010 SmartGridComm, Gaithersburg
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
25
-
-
0022059192
-
Network observability: Theory
-
May
-
A. Monticelli and F. Wu, "Network observability: Theory," IEEE Trans. Power App. Syst., vol. PAS-104, no. 5, pp. 1042-1048, May 1985.
-
(1985)
IEEE Trans. Power App. Syst.
, vol.PAS-104
, Issue.5
, pp. 1042-1048
-
-
Monticelli, A.1
Wu, F.2
-
26
-
-
51249185617
-
The ellipsoid method and its consequences in combinatorial optimization
-
Jun.
-
A. S. M. Grötschel and L. Lovász, "The ellipsoid method and its consequences in combinatorial optimization," Combinatorica, vol. 1, no. 2, pp. 169-197, Jun. 1981.
-
(1981)
Combinatorica
, vol.1
, Issue.2
, pp. 169-197
-
-
Grötschel, A.S.M.1
Lovász, L.2
-
27
-
-
51249177040
-
On submodular function minimization
-
Sept.
-
W. H. Cunningham, "On submodular function minimization," Combinatorica, vol. 5, no. 3, pp. 185-192, Sept. 1985.
-
(1985)
Combinatorica
, vol.5
, Issue.3
, pp. 185-192
-
-
Cunningham, W.H.1
-
28
-
-
0034311821
-
A combinatorial algorithm minimizing submodular functions in strongly polynomial time
-
Nov.
-
A. Schrijver, "A combinatorial algorithm minimizing submodular functions in strongly polynomial time," J. Combinatorial Theory Series B, vol. 80, no. 2, pp. 346-355, Nov. 2000.
-
(2000)
J. Combinatorial Theory Series B
, vol.80
, Issue.2
, pp. 346-355
-
-
Schrijver, A.1
-
29
-
-
0039457365
-
A large deviation result for the likelihood ratio statistic in exponential families
-
S. Kourouklis, "A large deviation result for the likelihood ratio statistic in exponential families," Ann. Stat., vol. 12, no. 4, pp. 1510-1521, 1984.
-
(1984)
Ann. Stat.
, vol.12
, Issue.4
, pp. 1510-1521
-
-
Kourouklis, S.1
-
30
-
-
70449670540
-
Estimation of faults in DC electrical power systems
-
Jun.
-
D. Gorinevsky, S. Boyd, and S. Poll, "Estimation of faults in DC electrical power systems," in Proc. 2009 Amer. Control Conf., St. Louis, MO., Jun. 2009, pp. 4334-4339.
-
(2009)
Proc. 2009 Amer. Control Conf., St. Louis, MO.
, pp. 4334-4339
-
-
Gorinevsky, D.1
Boyd, S.2
Poll, S.3
|