메뉴 건너뛰기




Volumn , Issue , 2012, Pages 3534-3540

Optimal power flow: Closing the loop over corrupted data

Author keywords

Data Corruption; Optimal Power Flow; Power Systems; Security

Indexed keywords

ACOUSTIC GENERATORS; STANDBY POWER SYSTEMS;

EID: 84869427279     PISSN: 07431619     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/acc.2012.6315557     Document Type: Conference Paper
Times cited : (25)

References (18)
  • 3
    • 70549106029 scopus 로고    scopus 로고
    • Electricity grid in U.S. penetrated by spies
    • April 8th
    • "Electricity grid in U.S. penetrated by spies," The Wall Street Journal, p. A1, April 8th 2009.
    • (2009) The Wall Street Journal
  • 4
    • 79953152553 scopus 로고    scopus 로고
    • Cyber war: Sabotaging the system
    • November 8th
    • "Cyber war: Sabotaging the system," CBSNews, November 8th 2009. [Online]. Available: http://www.cbsnews.com/stories/2009/11/06/60minutes/ main5555565.shtml
    • (2009) CBSNews
  • 10
    • 84866769548 scopus 로고    scopus 로고
    • Cyber security study of a scada energy management system: Stealthy deception attacks on the state estimator
    • Milan, Italy, Aug.
    • A. Teixeira, G. Dán, H. Sandberg, and K. H. Johansson, "Cyber security study of a scada energy management system: stealthy deception attacks on the state estimator," in Proc. of 18th IFAC World Congress, Milan, Italy, Aug. 2011.
    • (2011) Proc. of 18th IFAC World Congress
    • Teixeira, A.1    Dán, G.2    Sandberg, H.3    Johansson, K.H.4
  • 11
    • 84885756672 scopus 로고    scopus 로고
    • Stealth attacks and protection schemes for state estimators in power systems
    • Gaithersburg, MD, USA, Oct.
    • G. Dán and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. of IEEE SmartGridComm, Gaithersburg, MD, USA, Oct. 2010.
    • (2010) Proc. of IEEE SmartGridComm
    • Dán, G.1    Sandberg, H.2
  • 12
    • 79954575826 scopus 로고    scopus 로고
    • Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
    • Gaithersburg, MD, USA, Oct.
    • O. Kosut, L. Jia, R. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in Proc. of IEEE SmartGridComm, Gaithersburg, MD, USA, Oct. 2010.
    • (2010) Proc. of IEEE SmartGridComm
    • Kosut, O.1    Jia, L.2    Thomas, R.3    Tong, L.4
  • 14
    • 79955998041 scopus 로고    scopus 로고
    • False data injection attacks in electricity markets
    • Gaithersburg, MD, USA, Oct.
    • L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in Proc. of IEEE SmartGridComm, Gaithersburg, MD, USA, Oct. 2010.
    • (2010) Proc. of IEEE SmartGridComm
    • Xie, L.1    Mo, Y.2    Sinopoli, B.3
  • 15
    • 80051642194 scopus 로고    scopus 로고
    • Malicious data attack on real-time electricity market
    • May
    • L. Jia, R. J. Thomas, and L. Tong, "Malicious data attack on real-time electricity market," in Proc. of IEEE ICASSP, May 2011.
    • (2011) Proc. of IEEE ICASSP
    • Jia, L.1    Thomas, R.J.2    Tong, L.3
  • 16
    • 79957758241 scopus 로고    scopus 로고
    • Modeling load redistribution attacks in power systems
    • Jun.
    • Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems," IEEE Trans. Smart Grid, no. 2, Jun. 2011.
    • (2011) IEEE Trans. Smart Grid , Issue.2
    • Yuan, Y.1    Li, Z.2    Ren, K.3
  • 17
    • 0033881588 scopus 로고    scopus 로고
    • Electric power system state estimation
    • Feb.
    • A. Monticelli, "Electric power system state estimation," in Proc. IEEE, vol. 88, no. 2, Feb. 2000.
    • (2000) Proc. IEEE , vol.88 , Issue.2
    • Monticelli, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.