-
1
-
-
0014700838
-
Power system static-state estimation, Part I II & III
-
F. Schweppe and J. Wildes, "Power system static-state estimation, Part I II & III," IEEE Trans. on Power Apparatus and Systems, vol. 89, no. 1, 1970.
-
(1970)
IEEE Trans. on Power Apparatus and Systems
, vol.89
, Issue.1
-
-
Schweppe, F.1
Wildes, J.2
-
2
-
-
0016480359
-
Bad data analysis for power system state estimation
-
E. Handschin, F. Schweppe, J. Kohlas, and A. Fiechter, "Bad data analysis for power system state estimation," IEEE Trans. on Power Apparatus and Systems, vol. 94, no. 2, 1975.
-
(1975)
IEEE Trans. on Power Apparatus and Systems
, vol.94
, Issue.2
-
-
Handschin, E.1
Schweppe, F.2
Kohlas, J.3
Fiechter, A.4
-
4
-
-
0021529208
-
Hypothesis testing identification: A new method for bad data analysis in power system state estimation
-
T. Van Cutsem, M. Ribbens-Pavella, and L. Mili, "Hypothesis testing identification: a new method for bad data analysis in power system state estimation," IEEE Trans. on Power Apparatus and Systems, vol. 103, no. 11, 1984.
-
(1984)
IEEE Trans. on Power Apparatus and Systems
, vol.103
, Issue.11
-
-
Van Cutsem, T.1
Ribbens-Pavella, M.2
Mili, L.3
-
6
-
-
79151471611
-
Multiple bad data processing by genetic algorithms
-
S. Gastoni, G. Granelli, and M. Montagna, "Multiple bad data processing by genetic algorithms," in IEEE Power Tech Conference, vol. 1, 2003.
-
(2003)
IEEE Power Tech Conference
, vol.1
-
-
Gastoni, S.1
Granelli, G.2
Montagna, M.3
-
7
-
-
0022095903
-
Mutiple Bad Data Identification for State Estimation by Combinatorial Optimization
-
A. Monticelli, F. Wu, and M. Yen, "Mutiple Bad Data Identification for State Estimation by Combinatorial Optimization," IEEE Trans. on Power Delivery, vol. 1, no. 3, 1986.
-
(1986)
IEEE Trans. on Power Delivery
, vol.1
, Issue.3
-
-
Monticelli, A.1
Wu, F.2
Yen, M.3
-
8
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, M. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," Proceedings of ACM CCS, 2009.
-
Proceedings of ACM CCS, 2009
-
-
Liu, Y.1
Reiter, M.2
Ning, P.3
-
9
-
-
79957758241
-
Modeling load redistribution attacks in power system
-
Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power system," IEEE Trans. on Smart Grid, vol. 2, no. 2, 2011.
-
(2011)
IEEE Trans. on Smart Grid
, vol.2
, Issue.2
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
10
-
-
79954575826
-
Malicious data attacks on SmartGrid state estimation: Attack strategies and countermeasures
-
O. Kosut, L. Jia, R. Thomas, and L. Tong, "Malicious data attacks on SmartGrid state estimation: Attack strategies and countermeasures,"Proc. of IEEE SmartGridComm, 2010.
-
Proc. of IEEE SmartGridComm, 2010
-
-
Kosut, O.1
Jia, L.2
Thomas, R.3
Tong, L.4
-
11
-
-
80052076498
-
Strategic protection against data injection attacks on power grids
-
T. Kim and H. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. on Smart Grid, vol. 2, no. 2, 2011.
-
(2011)
IEEE Trans. on Smart Grid
, vol.2
, Issue.2
-
-
Kim, T.1
Poor, H.2
-
12
-
-
0022148881
-
Bad data identification methods in power system state estimation-a comparative study
-
L. Mili, M. Ribbens-Pavella, and T. Van Cutsem, "Bad data identification methods in power system state estimation-a comparative study," IEEE Trans. on Power Apparatus and Systems, no. 11, 1985.
-
(1985)
IEEE Trans. on Power Apparatus and Systems
, Issue.11
-
-
Mili, L.1
Ribbens-Pavella, M.2
Van Cutsem, T.3
-
13
-
-
33746093936
-
-
College of William and Mary, Tech. Rep. WM-CS-2005-12, October
-
H. Wang, B. Sheng, and Q. Li, "TelosB implementation of elliptic curve cryptography over primary field," College of William and Mary, Tech. Rep. WM-CS-2005-12, October 2005.
-
(2005)
TelosB Implementation of Elliptic Curve Cryptography over Primary Field
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
15
-
-
51349093348
-
-
College of William and Mary, Tech. Rep. WM-CS-2007-11
-
H. Wang, B. Sheng, C. C. Tan, and Q. Li, "WM-ECC: an elliptic curve cryptography suite on sensor motes," College of William and Mary, Tech. Rep. WM-CS-2007-11, 2007.
-
(2007)
WM-ECC: An Elliptic Curve Cryptography Suite on Sensor Motes
-
-
Wang, H.1
Sheng, B.2
Tan, C.C.3
Li, Q.4
-
18
-
-
33845531097
-
Analyzing object detection quality under probabilistic coverage in sensor networks
-
S. Ren, Q. Li, H. Wang, X. Chen, and X. Zhang, "Analyzing object detection quality under probabilistic coverage in sensor networks," Int'l Workshop Quality of Service (IWQoS), 2005.
-
Int'l Workshop Quality of Service (IWQoS), 2005
-
-
Ren, S.1
Li, Q.2
Wang, H.3
Chen, X.4
Zhang, X.5
-
19
-
-
74049162773
-
A new cell counter based attack against Tor
-
Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan, and W. Jia, "A new cell counter based attack against Tor," Proceedings of ACM CCS, 2009.
-
Proceedings of ACM CCS, 2009
-
-
Ling, Z.1
Luo, J.2
Yu, W.3
Fu, X.4
Xuan, D.5
Jia, W.6
-
20
-
-
33644700515
-
A gateway-based defense system for distributed DoS attacks in high-speed networks
-
D. Xuan, R. Bettati, and W. Zhao, "A gateway-based defense system for distributed DoS attacks in high-speed networks," Workshop on Information Assurance and Security, vol. 1, 2001.
-
(2001)
Workshop on Information Assurance and Security
, vol.1
-
-
Xuan, D.1
Bettati, R.2
Zhao, W.3
-
21
-
-
33846849357
-
Fault-tolerant target localization in sensor networks
-
M. Ding, F. Liu, A. Thaeler, D. Chen, and X. Cheng, "Fault-tolerant target localization in sensor networks," EURASIP Journal on Wireless Communications and Networking, vol. 2007, no. 1, 2007.
-
(2007)
EURASIP Journal on Wireless Communications and Networking
, vol.2007
, Issue.1
-
-
Ding, M.1
Liu, F.2
Thaeler, A.3
Chen, D.4
Cheng, X.5
-
22
-
-
24944505196
-
Safety warning based on highway sensor networks
-
K. Xing, M. Ding, X. Cheng, and S. Rotenstreich, "Safety warning based on highway sensor networks," IEEE Wireless Communications and Networking Conference, vol. 4, 2005.
-
(2005)
IEEE Wireless Communications and Networking Conference
, vol.4
-
-
Xing, K.1
Ding, M.2
Cheng, X.3
Rotenstreich, S.4
-
23
-
-
79151479984
-
MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education
-
R. Zimmerman, C. Murillo-Sánchez, and R. Thomas, "MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education," IEEE Trans. on Power Systems, no. 99, 2011.
-
(2011)
IEEE Trans. on Power Systems
, Issue.99
-
-
Zimmerman, R.1
Murillo-Sánchez, C.2
Thomas, R.3
-
24
-
-
29144523061
-
On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming
-
A. Wachter and L. Biegler, "On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming,"Mathematical Programming, vol. 106, no. 1, 2006.
-
(2006)
Mathematical Programming
, vol.106
, Issue.1
-
-
Wachter, A.1
Biegler, L.2
|