-
3
-
-
84857230860
-
Detecting false data injection attacks on DC state estimation
-
CPS Week 2010, Stockholm, Sweden, Apr
-
R. B. Bobba, K. M. Rogers, Q.Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, "Detecting false data injection attacks on DC state estimation," in Proc. 1st Workshop Secure Control Systems, CPS Week 2010, Stockholm, Sweden, Apr. 2010, pp. 1-9.
-
(2010)
Proc. 1st Workshop Secure Control Systems
, pp. 1-9
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
4
-
-
33847645050
-
Placement of PMUs to enable bad data detection in state estimation
-
DOI 10.1109/TPWRS.2006.881149
-
J. Chen and A. Abur, "Placement of PMUs to enable bad data detection in state estimation," IEEE Trans. Power Syst., vol. 21, no. 4, pp. 1608-1615, Apr. 2006. (Pubitemid 46357759)
-
(2006)
IEEE Transactions on Power Systems
, vol.21
, Issue.4
, pp. 1608-1615
-
-
Chen, J.1
Abur, A.2
-
5
-
-
85032751507
-
Coordinated data injection attack and detection in smart grid
-
S. Cui, Z. Han, S. Kar, T. T. Kim, H. V. Poor, and A. Tajer, "Coordinated data injection attack and detection in smart grid," IEEE Signal Process. Mag., vol. 29, no. 5, pp. 106-115, 2012.
-
(2012)
IEEE Signal Process. Mag
, vol.29
, Issue.5
, pp. 106-115
-
-
Cui, S.1
Han, Z.2
Kar, S.3
Kim, T.T.4
Poor, H.V.5
Tajer, A.6
-
7
-
-
52949094873
-
-
NewYork, NY USA McGrawHill
-
S. Dasgupta, C. Papadimitriou, and U. Vazirani, Algorithms. NewYork, NY, USA: McGrawHill, 2006.
-
(2006)
Algorithms
-
-
Dasgupta, S.1
Papadimitriou, C.2
Vazirani, U.3
-
8
-
-
84883291042
-
-
Department of Energy. [Online] Available
-
Department of Energy. [Online]. Available: http://www.oe.energy. gov/DocumentsandMedia/02-1-11-OE-Press-Release-Risk-Management. pdf
-
-
-
-
9
-
-
76649127398
-
Robust measurement design by placing synchronized phasor measurements on network branches
-
Feb.
-
R. Emami and A. Abur, "Robust measurement design by placing synchronized phasor measurements on network branches," IEEE Trans. Power Syst., vol. 25, no. 1, pp. 38-43, Feb. 2010.
-
(2010)
IEEE Trans. Power Syst
, vol.25
, Issue.1
, pp. 38-43
-
-
Emami, R.1
Abur, A.2
-
10
-
-
84855828612
-
Securing the smart grid: Next generation power grid security
-
Amsterdam, The Netherlands
-
T. Flick and J. Morehouse, "Securing the smart grid: Next generation power grid security," in Proc. Syngress, Amsterdam, The Netherlands, 2010.
-
(2010)
Proc. Syngress
-
-
Flick, T.1
Morehouse, J.2
-
11
-
-
84855833052
-
Smart grid data integrity attacks: Characterizations and countermeasures
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, "Smart grid data integrity attacks: Characterizations and countermeasures," in Proc. 2nd IEEE Int. Conf. Smart Grid Communications (SmartGridComm), 2010, pp. 232-237.
-
(2010)
Proc. 2nd IEEE Int. Conf. Smart Grid Communications (SmartGridComm)
, pp. 232-237
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
12
-
-
70449670540
-
Estimation of faults in DC electrical power system
-
Dec
-
D. Gorinevsky, S. Boyd, and S. Poll, "Estimation of faults in DC electrical power system," in Proc. IEEE Conf. Decision Contr., Dec. 2009, pp. 4334-4339.
-
(2009)
Proc IEEE Conf. Decision Contr.
, pp. 4334-4339
-
-
Gorinevsky, D.1
Boyd, S.2
Poll, S.3
-
13
-
-
39749180953
-
Identification of interacting bad data in the framework of the weighted least square method
-
DOI 10.1016/j.epsr.2007.05.021, PII S0378779607001393
-
G. P. Granelli andM.Montagna, "Identification of interacting bad data in the framework of the weighted least square method," Electric Power Syst. Res., vol. 78, no. 5, pp. 806-814, 2008. (Pubitemid 351305437)
-
(2008)
Electric Power Systems Research
, vol.78
, Issue.5
, pp. 806-814
-
-
Granelli, G.P.1
Montagna, M.2
-
14
-
-
84976669902
-
Efficient algorithms for graph manipulation
-
J. Hopcroft and R. Tarjan, "Efficient algorithms for graph manipulation," Commun. ACM, vol. 16, no. 6, pp. 372-378, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.6
, pp. 372-378
-
-
Hopcroft, J.1
Tarjan, R.2
-
15
-
-
78649657353
-
Bad data analysis in power system measurement estimation
-
C.-H. Huang, C.-H. Lee, K.-R. Shih, and Y.-J. Wang, "Bad data analysis in power system measurement estimation," Eur. Trans. Electr. Power, vol. 20, pp. 1082-1100, 2010.
-
(2010)
Eur. Trans. Electr. Power
, vol.20
, pp. 1082-1100
-
-
Huang, C.-H.1
Lee, C.-H.2
Shih, K.-R.3
Wang, Y.-J.4
-
16
-
-
0025417993
-
Bad data detection and identification
-
DOI 10.1016/0142-0615(90)90005-V
-
H.-J. Koglin, T. Neisius, G. Beissler, and K. D. Schmitt, "Bad data detection and identification," Int. J. Electric Power, vol. 12, no. 2, pp. 94-103, 1990. (Pubitemid 20720384)
-
(1990)
International Journal of Electrical Power and Energy System
, vol.12
, Issue.2
, pp. 94-103
-
-
Koglin, H.-J.1
Neisius, Th.2
Beissler, G.3
Schmitt, K.D.4
-
17
-
-
33750405289
-
Security issues in SCADA networks
-
DOI 10.1016/j.cose.2006.03.001, PII S0167404806000514
-
V. Igure, S. Laughtera, and R. Williams, "Security issues in SCADA networks," Comput. Security, vol. 25, no. 7, pp. 498-506, 2006. (Pubitemid 44637241)
-
(2006)
Computers and Security
, vol.25
, Issue.7
, pp. 498-506
-
-
Igure, V.M.1
Laughter, S.A.2
Williams, R.D.3
-
18
-
-
0042526133
-
Numerical observability analysis based on network graph theory
-
G. N. Korres et al., "Numerical observability analysis based on network graph theory," IEEE Trans. Power Syst., vol. 18, no. 3, pp. 1035-1045, 2003.
-
(2003)
IEEE Trans. Power Syst
, vol.18
, Issue.3
, pp. 1035-1045
-
-
Korres, G.N.1
-
19
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
T. T. Kim and H. V. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
20
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and counter measures
-
O. Kosut, L. Jia, R. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and counter measures," in Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), 2010, pp. 220-225.
-
(2010)
Proc. 1st IEEE Int. Conf. Smart Grid Commun. (SmartGridComm)
, pp. 220-225
-
-
Kosut, O.1
Jia, L.2
Thomas, R.3
Tong, L.4
-
21
-
-
84962228823
-
Network observability: Identification of the measurements redundancy level
-
J. London, J. B. A. L. Alberto, and N. Bretas, "Network observability: Identification of the measurements redundancy level," in Proc. Power Syst. Technol. Conf., 2000, vol. 2, pp. 577-582.
-
(2000)
Proc. Power Syst. Technol. Conf
, vol.2
, pp. 577-582
-
-
London, J.1
Alberto, J.B.A.L.2
Bretas, N.3
-
22
-
-
82855167209
-
Phasor measurement units placement for power system state estimation: A greedy approach
-
Q. Li, R. Negi, and M. D. Ilíc, "Phasor measurement units placement for power system state estimation: A greedy approach," in Proc. IEEE Power Energy Soc. General Meeting, 2011, pp. 1-8.
-
(2011)
Proc. IEEE Power Energy Soc. General Meeting
, pp. 1-8
-
-
Li, Q.1
Negi, R.2
Ilíc, M.D.3
-
23
-
-
33745604920
-
Transmission network fault location observability with minimal PMU placement
-
DOI 10.1109/TPWRD.2005.858806
-
K.-P. Lien et al., "Transmission network fault location observability with minimal PMU placement," IEEE Trans. Power Del., vol. 21, no. 3, pp. 1128-1136, 2006. (Pubitemid 43983635)
-
(2006)
IEEE Transactions on Power Delivery
, vol.21
, Issue.3
, pp. 1128-1136
-
-
Lien, K.-P.1
Liu, C.-W.2
Yu, C.-S.3
Jiang, J.-A.4
-
24
-
-
42549104118
-
A static state estimation approach including bad data detection and identification in power systems
-
J. Lin and H. Pan, "A static state estimation approach including bad data detection and identification in power systems," in Proc. IEEE Power Energy Society General Meeting, 2007, pp. 1-7.
-
(2007)
Proc. IEEE Power Energy Society General Meeting
, pp. 1-7
-
-
Lin, J.1
Pan, H.2
-
25
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 21-32.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
26
-
-
0022148881
-
Bad data identification methods in power system state estimation - A comparative study
-
L. Mili, T. Van Cutsem, and M. Ribbens-Pavella, "Bad data identification methods in power systems state estimation," IEEE Trans. Power Apparatus Syst., vol. 103, no. 11, pp. 3037-3049, 1985. (Pubitemid 16524642)
-
(1985)
IEEE transactions on power apparatus and systems
, vol.PAS-104
, Issue.11
, pp. 3037-3049
-
-
Mili, L.1
Van Cutsem, Th.2
Ribbens-Pavella, M.3
-
27
-
-
79952030111
-
Observability analysis for power systems including conventional and phasor measurements
-
N. M. Manousakis and G. N. Korres, "Observability Analysis for Power Systems Including Conventional and Phasor Measurements," in Proc. 7th Mediterranean Conf. Power Generation, Transmission, Distribution Energy Conversion, 2010, pp. 1-8.
-
(2010)
Proc. 7th Mediterranean Conf. Power Generation, Transmission, Distribution Energy Conversion
, pp. 1-8
-
-
Manousakis, N.M.1
Korres, G.N.2
-
29
-
-
72449191827
-
NIST framework and roadmap for smart grid interoperability standards
-
NIST Framework and Roadmap for Smart Grid Interoperability Standards, "NIST Special Publication 1108,", Jan. 2010.
-
(2010)
NIST Special Publication
, vol.1108
-
-
-
30
-
-
84883266173
-
-
[Online] Available
-
[Online]. Available: http://www.naspi.org/naspinet.stm
-
-
-
-
32
-
-
84947668221
-
State estimation with phasor measurements
-
A. G. Phadke, J. S. Thorp, and K. Karimi, "State estimation with phasor measurements," IEEE Trans. Power Syst., vol. 1, pp. 233-241, 1986.
-
(1986)
IEEE Trans. Power Syst
, vol.1
, pp. 233-241
-
-
Phadke, A.G.1
Thorp, J.S.2
Karimi, K.3
-
33
-
-
0015772414
-
A note on finding the bridges of a graph
-
Apr
-
R. Tarjan, "A note on finding the bridges of a graph," in Proc. Inf. Process. Lett., Apr. 1974, pp. 160-161.
-
(1974)
Proc. Inf. Process. Lett
, pp. 160-161
-
-
Tarjan, R.1
-
34
-
-
79953131246
-
Cyber-security analysis of state estimators in electric power systems
-
A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. S. Sastry, "Cyber-security analysis of state estimators in electric power systems," in Proc. IEEE Conf. Decision Contr., 2010, pp. 5991-5998.
-
(2010)
Proc. IEEE Conf. Decision Contr
, pp. 5991-5998
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.H.4
Sastry, S.S.5
-
35
-
-
84988253234
-
A cyber security study of a SCADA energy management system
-
A.Teixeira, G. Dan, H.Sandberg, andK.H. Johansson, "A Cyber Security Study of a SCADA Energy Management System," ArXiv e-prints, 2010.
-
(2010)
ArXiv E-prints
-
-
Teixeira, A.1
Dan, G.2
Sandberg, H.3
Johansson, K.H.4
-
36
-
-
0012575271
-
The primal-dual method for approximation algorithms
-
DOI 10.1007/s101070100262
-
D. P. Williamson, "The primal-dual method for approximation algorithms," Math Programming Series B, vol. 91, pp. 447-478, 2002. (Pubitemid 44769750)
-
(2002)
Mathematical Programming, Series B
, vol.91
, Issue.3
, pp. 447-478
-
-
Williamson, D.P.1
-
37
-
-
34250171205
-
PMU impact on state estimation reliability for improved grid security
-
H. Wu, "PMU impact on state estimation reliability for improved grid security," in Proc. IEEE Transm. Distrib. Conf. Exhibition, PES, 2006, vol. 25, no. 1, pp. 1349-1351.
-
(2006)
Proc IEEE Transm. Distrib. Conf. Exhibition, PES
, vol.25
, Issue.1
, pp. 1349-1351
-
-
Wu, H.1
|