-
1
-
-
84155167085
-
Cyber-physical system se curity for the electric power grid
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-physical system se curity for the electric power grid," Proc. IEEE, vol. 100, no. 1, pp. 210-224, 2012.
-
(2012)
Proc. IEEE
, vol.100
, Issue.1
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
2
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Trans. Inf. Syst. Security, vol. 14, pp. 13:1-13:33, 2011.
-
(2011)
ACM Trans. Inf. Syst. Security
, vol.14
, pp. 131-1333
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
3
-
-
82155175605
-
Integrity data attacks in power market operations
-
L. Xie, Y. Mo, and B. Sinopoli, "Integrity data attacks in power market operations," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 659-666, 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 659-666
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
4
-
-
84857941849
-
Impacts of malicious data on realtime price of electricity market operations
-
L. Jia, R. J. Thomas, and L. Tong, "Impacts of malicious data on realtime price of electricity market operations," in Proc. HICSS, 2012, pp. 1907-1914.
-
(2012)
Proc. HICSS
, pp. 1907-1914
-
-
Jia, L.1
Thomas, R.J.2
Tong, L.3
-
5
-
-
84869427279
-
Optimal power flow: Closing the loop over corrupted data
-
A. Teixeira, H. Sandberg, G. Dan, and K.-H. Johansson, "Optimal power flow: Closing the loop over corrupted data," in Proc. Amer. Control Conf., 2012.
-
(2012)
Proc. Amer. Control Conf.
-
-
Teixeira, A.1
Sandberg, H.2
Dan, G.3
Johansson, K.-H.4
-
7
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
11
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. Conf. Comput. Commun. Security, 2009, pp. 21-32.
-
(2009)
Proc. Conf. Comput. Commun. Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
12
-
-
79955998041
-
False data injection attacks in electricity markets
-
L. Xie, Y. Mo, and B. Sinopoli, "False data injection attacks in electricity markets," in Proc. IEEE Int. Conf. Smart Grid Commun., 2010, pp. 226-231.
-
(2010)
Proc. IEEE Int. Conf. Smart Grid Commun.
, pp. 226-231
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
13
-
-
79953131246
-
Cyber security analysis of state estimators in electric power systems
-
A. Teixeira, S. Amin, H. Sandberg, K. Johansson, and S. Sastry, "Cyber security analysis of state estimators in electric power systems," in Proc. IEEE Conf. Decision Control, 2010, pp. 5991-5998.
-
(2010)
Proc. IEEE Conf. Decision Control
, pp. 5991-5998
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.4
Sastry, S.5
-
14
-
-
84857926085
-
Multiple bad data identification for state estimation by combinatorial optimization
-
A. Monticelli, F. F. Wu, and M. Yen, "Multiple bad data identification for state estimation by combinatorial optimization," IEEE Power Eng. Rev., vol. PER-6, no. 7, pp. 73-74, 1986.
-
(1986)
IEEE Power Eng. Rev.
, vol.6
, Issue.7
, pp. 73-74
-
-
Monticelli, A.1
Wu, F.F.2
Yen, M.3
-
15
-
-
84937995839
-
Direct solutions of sparse network equations by optimally ordered triangular factorization
-
W. Tinney and J. Walker, "Direct solutions of sparse network equations by optimally ordered triangular factorization," Proc. IEEE, vol. 55, no. 11, pp. 1801-1809, 1967.
-
(1967)
Proc. IEEE
, vol.55
, Issue.11
, pp. 1801-1809
-
-
Tinney, W.1
Walker, J.2
-
16
-
-
0022012702
-
Sparse vector methods
-
Feb
-
W. Tinney, V. Brandwajn, and S. Chan, "Sparse vector methods," IEEE Trans. Power App. Syst., vol. PAS-104, no. 2, pp. 295-301, Feb. 1985.
-
(1985)
IEEE Trans. Power App. Syst.
, vol.PAS-104
, Issue.2
, pp. 295-301
-
-
Tinney, W.1
Brandwajn, V.2
Chan, S.3
-
17
-
-
0029332887
-
Planning under time constraints in stochastic domains
-
T. Dean, L. Kaelbling, J. Kirman, and A. Nicholson, "Planning under time constraints in stochastic domains," Artif. Intell., vol. 76, pp. 35-74, 1995.
-
(1995)
Artif. Intell.
, vol.76
, pp. 35-74
-
-
Dean, T.1
Kaelbling, L.2
Kirman, J.3
Nicholson, A.4
-
18
-
-
0003989210
-
-
Ph.D. dissertation, Brown Univ., Providence, RI
-
A. Cassandra, "Exact and approximate algorithms for partially observable Markov decision processes," Ph.D. dissertation, Brown Univ., Providence, RI, 1998.
-
(1998)
Exact and Approximate Algorithms for Partially Observable Markov Decision Processes
-
-
Cassandra, A.1
-
19
-
-
58849130197
-
Usable global network access policy for process control systems
-
D. M. Nicol, W. H. Sanders, S. Singh, and M. Seri, "Usable global network access policy for process control systems," IEEE Security Privacy, vol. 6, pp. 30-36, 2008.
-
(2008)
IEEE Security Privacy
, vol.6
, pp. 30-36
-
-
Nicol, D.M.1
Sanders, W.H.2
Singh, S.3
Seri, M.4
-
20
-
-
84872068545
-
-
UMDHMM Tool
-
UMDHMM Tool [Online]. Available: http://www.kanungo.com/soft-ware/ software.html
-
-
-
-
21
-
-
84856549878
-
-
Toronto, ON Canada: Thomson
-
J. Glover, M. Sarma, and T. Overbye, Power System Analysis and Design. Toronto, ON, Canada: Thomson, 2008.
-
(2008)
Power System Analysis and Design
-
-
Glover, J.1
Sarma, M.2
Overbye, T.3
-
22
-
-
79151479984
-
MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education
-
R. Zimmerman, C. Murillo-Sanchez, and R. Thomas, "MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education," IEEE Trans. Power Syst., vol. 26, no. 1, pp. 12-19, 2011.
-
(2011)
IEEE Trans. Power Syst.
, vol.26
, Issue.1
, pp. 12-19
-
-
Zimmerman, R.1
Murillo-Sanchez, C.2
Thomas, R.3
-
23
-
-
84872079809
-
-
SimAuto Overview PowerWorld Corporation
-
SimAuto Overview PowerWorld Corporation [Online]. Available: http://www.powerworld.com
-
-
-
-
24
-
-
0018544097
-
IEEE reliability test system
-
"IEEE reliability test system," IEEE Trans. Power App. Syst., vol. PAS-98, no. 6, pp. 2047-2054, 1979.
-
(1979)
IEEE Trans. Power App. Syst.
, vol.PAS-98
, Issue.6
, pp. 2047-2054
-
-
-
25
-
-
0014700838
-
Power system static-state estimation, part i: Exact model
-
F. C. Schweppe and J. Wildes, "Power system static-state estimation, part i: Exact model," IEEE Trans. Power App. Syst., vol. PAS-89, no. 1, pp. 120-125, 1970.
-
(1970)
IEEE Trans. Power App. Syst.
, vol.PAS-89
, Issue.1
, pp. 120-125
-
-
Schweppe, F.C.1
Wildes, J.2
-
26
-
-
70450092394
-
RRE: A game-theoretic intrusion response and recovery engine
-
S. A. Zonouz, H. Khurana, W. H. Sanders, and T. M. Yardley, "RRE: A game-theoretic intrusion response and recovery engine," in Proc. IEEE/IFIP Int. Conf. Dependable Syst. Netw., 2009, pp. 439-448.
-
(2009)
Proc. IEEE/IFIP Int. Conf. Dependable Syst. Netw.
, pp. 439-448
-
-
Zonouz, S.A.1
Khurana, H.2
Sanders, W.H.3
Yardley, T.M.4
-
27
-
-
51449093591
-
A Kalman-based coordination for hierarchical state estimation: Algorithm and analysis
-
S. Zonouz and W. Sanders, "A Kalman-based coordination for hierarchical state estimation: Algorithm and analysis," in Proc. Hawaii Int. Conf. Syst. Sci., 2008, pp. 187-187.
-
(2008)
Proc. Hawaii Int. Conf. Syst. Sci.
, pp. 187-187
-
-
Zonouz, S.1
Sanders, W.2
-
28
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in Proc. IEEE Int. Conf. Smart Grid Commun., 2010, pp. 220-225.
-
(2010)
Proc. IEEE Int. Conf. Smart Grid Commun.
, pp. 220-225
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
29
-
-
61349163558
-
Application of the fault tree analysis for assessment of power system reliability
-
A. Volkanovski, M. Cepin, and B. Mavko, "Application of the fault tree analysis for assessment of power system reliability," Rel. Eng. Syst. Safety, vol. 94, no. 6, pp. 1116-1127, 2009.
-
(2009)
Rel. Eng. Syst. Safety
, vol.94
, Issue.6
, pp. 1116-1127
-
-
Volkanovski, A.1
Cepin, M.2
Mavko, B.3
-
30
-
-
33847674499
-
An alternative for including phasor measurements in state estimators
-
DOI 10.1109/TPWRS.2006.881112
-
M. Zhou, V. Centeno, J. Thorp, and A. Phadke, "An alternative for including phasor measurements in state estimators," IEEE Trans. Power Syst., vol. 21, no. 4, pp. 1930-1937, 2006. (Pubitemid 46357795)
-
(2006)
IEEE Transactions on Power Systems
, vol.21
, Issue.4
, pp. 1930-1937
-
-
Zhou, M.1
Centeno, V.A.2
Thorp, J.S.3
Phadke, A.G.4
-
31
-
-
0026927912
-
New bad-data detection and identification technique based on rotation of measurement order for sequential state estimation
-
K. Lo, P. Zeng, E. Marchand, and A. Pinkerton, "New bad-data detection and identification technique based on rotation of measurement order for sequential state estimation," IEE Proc. C Gener., Transm., Distrib., vol. 139, no. 5, pp. 387-401, 1992. (Pubitemid 23558280)
-
(1992)
IEE Proceedings C: Generation Transmission and Distribution
, vol.139
, Issue.5
, pp. 387-401
-
-
Lo, K.L.1
Zeng, P.L.2
Marchand, E.3
Pinkerton, A.4
-
32
-
-
84857926085
-
Multiple bad data identification for state estimation by combinatorial optimization
-
A. Monticelli, F. F. Wu, and M. Yen, "Multiple bad data identification for state estimation by combinatorial optimization," IEEE Power Eng. Rev., vol. PER-6, no. 7, pp. 73-74, 1986.
-
(1986)
IEEE Power Eng. Rev.
, vol.6
, Issue.7
, pp. 73-74
-
-
Monticelli, A.1
Wu, F.F.2
Yen, M.3
-
34
-
-
84857230860
-
Detecting false data injection attacks on DC state estimation
-
Apr.
-
R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, "Detecting false data injection attacks on DC state estimation," in Proc. Workshop Secure Control Syst., Apr. 2010.
-
(2010)
Proc. Workshop Secure Control Syst.
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
35
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. IEEE SmartGridComm, 2010.
-
(2010)
Proc. IEEE SmartGridComm
-
-
Dan, G.1
Sandberg, H.2
-
36
-
-
84855833052
-
Smart grid data integrity attacks: Characterizations and coun-termeasures
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, "Smart grid data integrity attacks: Characterizations and coun-termeasures," in Proc. IEEE Int. Conf. Smart Grid Commun., 2011, pp. 232-237.
-
(2011)
Proc. IEEE Int. Conf. Smart Grid Commun.
, pp. 232-237
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
37
-
-
78650164959
-
Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment
-
S. A. Zonouz, K. R. Joshi, and W. H. Sanders, "Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment," in Proc. ACM Workshop Assurable Usable Security Configuration, 2010, pp. 71-74.
-
(2010)
Proc. ACM Workshop Assurable Usable Security Configuration
, pp. 71-74
-
-
Zonouz, S.A.1
Joshi, K.R.2
Sanders, W.H.3
-
38
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "Bothunter: Detecting malware infection through IDS-driven dialog correlation," in Proc. USENIX Security Symp., 2007.
-
(2007)
Proc. USENIX Security Symp.
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
39
-
-
84947603083
-
Probabilistic Alert Correlation
-
Recent Advances in Intrusion Detection
-
A. Valdes and K. Skinner, "Probabilistic alert correlation," in Proc. Int. Symp. Recent Adv. Intrusion Detection, 2001, pp. 54-68. (Pubitemid 33352000)
-
(2001)
Lecture Notes in Computer Science
, Issue.2212
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
40
-
-
67349092535
-
Vulnerability assessment of cybersecurity for SCADA systems
-
C.-W. Ten, C.-C. Liu, and G. Manimaran, "Vulnerability assessment of cybersecurity for SCADA systems," IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1836-1846, 2008.
-
(2008)
IEEE Trans. Power Syst.
, vol.23
, Issue.4
, pp. 1836-1846
-
-
Ten, C.-W.1
Liu, C.-C.2
Manimaran, G.3
-
41
-
-
77954785753
-
Cyber-related risk assessment and critical asset identification within the power grid
-
Z. Mohajerani, F. Farzan, M. Jafary, Y. Lu, D. Wei, N. Kalenchits, B. Boyer, M. Muller, and P. Skare, "Cyber-related risk assessment and critical asset identification within the power grid," in Proc. IEEE PES Transm. Distrib. Conf. Expo., 2010, pp. 1-4.
-
(2010)
Proc. IEEE PES Transm. Distrib. Conf. Expo.
, pp. 1-4
-
-
Mohajerani, Z.1
Farzan, F.2
Jafary, M.3
Lu, Y.4
Wei, D.5
Kalenchits, N.6
Boyer, B.7
Muller, M.8
Skare, P.9
-
42
-
-
0031125761
-
Concurrent detection of software and hardware data-access faults
-
K. D. Wilken and T. Kong, "Concurrent detection of software and hardware data-access faults," IEEE Trans. Comput., vol. 46, pp. 412-424, 1997. (Pubitemid 127760469)
-
(1997)
IEEE Transactions on Computers
, vol.46
, Issue.4
, pp. 412-424
-
-
Wilken, K.D.1
Kong, T.2
-
43
-
-
84902511451
-
Dependability and its threats: A taxonomy
-
A. Avizienis, J.-C. Laprie, and B. Randell, "Dependability and its threats: A taxonomy," in Proc. IFIP Congr. Topical Sessions, 2004, pp. 91-120.
-
(2004)
Proc. IFIP Congr. Topical Sessions
, pp. 91-120
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
-
44
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
-
A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Comput. Netw., vol. 51, pp. 3448-3470, 2007. (Pubitemid 46921030)
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
45
-
-
79951758639
-
An intrinsic graphical signature based on alert correlation analysis for intrusion detection
-
H.-K. Pao, C.-H. Mao, H.-M. Lee, C.-D. Chen, and C. Faloutsos, "An intrinsic graphical signature based on alert correlation analysis for intrusion detection," in Proc. Int. Conf. Technol. Appl. Artif. Intell., 2010, pp. 102-109.
-
(2010)
Proc. Int. Conf. Technol. Appl. Artif. Intell.
, pp. 102-109
-
-
Pao, H.-K.1
Mao, C.-H.2
Lee, H.-M.3
Chen, C.-D.4
Faloutsos, C.5
-
46
-
-
78249287519
-
Toward specification-based intrusion detection for web applications
-
S. Niksefat, M. M. Ahaniha, B. Sadeghiyan, and M. Shajari, "Toward specification-based intrusion detection for web applications," in Proc. Int. Conf. Recent Adv. Intrusion Detection, 2010, pp. 510-511.
-
(2010)
Proc. Int. Conf. Recent Adv. Intrusion Detection
, pp. 510-511
-
-
Niksefat, S.1
Ahaniha, M.M.2
Sadeghiyan, B.3
Shajari, M.4
-
47
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
C. V. Zhou, C. Leckie, and S. Karunasekera, "A survey of coordinated attacks and collaborative intrusion detection," Comput. Security, vol. 29, no. 1, pp. 124-140, 2010.
-
(2010)
Comput. Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
48
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry, "Attacks against process control systems: Risk assessment, detection, and response," in Proc. ACM Symp. Inf., Comput. Commun. Security, 2011, pp. 355-366.
-
(2011)
Proc. ACM Symp. Inf., Comput. Commun. Security
, pp. 355-366
-
-
Cárdenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Sastry, S.6
|