-
1
-
-
0014700838
-
Power system static-state estimation, part i: Exact model
-
F. C. Schweppe and J. Wildes, "Power System Static-State Estimation, Part I: Exact Model, " IEEE Transactions on Power Apparatus and Systems, vol. PAS-89, pp. 120-125, 1970.
-
(1970)
IEEE Transactions on Power Apparatus and Systems
, vol.PAS-89
, pp. 120-125
-
-
Schweppe, F.C.1
Wildes, J.2
-
2
-
-
0020091768
-
A new approach for detection and identification of multiple bad data in power system state estimation
-
N. Xiang, S. Wang and E. Yu, "A New Approach for Detection and Identification of Multiple Bad Data in Power System State Estimation, " IEEE Transactions on Power Apparatus and Systems, vol. PAS-101, pp. 454-462, 1982.
-
(1982)
IEEE Transactions on Power Apparatus and Systems
, vol.PAS-101
, pp. 454-462
-
-
Xiang, N.1
Wang, S.2
Yu, E.3
-
3
-
-
0021529208
-
Hypothesis testing identification: A new method for bad data analysis in power system state estimation
-
T. Van Cutsem, M. Ribbens-Pavella and L. Mili, "Hypothesis Testing Identification: A New Method For Bad Data Analysis In Power System State Estimation, " IEEE Transactions on Power Apparatus and Systems, vol. PAS-103, pp. 3239-3252, 1984.
-
(1984)
IEEE Transactions on Power Apparatus and Systems
, vol.PAS-103
, pp. 3239-3252
-
-
Van Cutsem, T.1
Ribbens-Pavella, M.2
Mili, L.3
-
4
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " in Proc. ACM Conf. Computer Communication Security, 2009, pp. 21-32.
-
(2009)
Proc. ACM Conf. Computer Communication Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
5
-
-
82155162476
-
Malicious data attacks on the smart grid
-
O. Kosut, J. Liyan, R. J. Thomas, and T. Lang, "Malicious Data Attacks on the Smart Grid, " IEEE Transactions on Smart Grid, vol. 2, pp. 645-658, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, pp. 645-658
-
-
Kosut, O.1
Liyan, J.2
Thomas, R.J.3
Lang, T.4
-
7
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
F. Pasqualetti, F. Dorfler and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design, " in 50th IEEE Conference on Decision and Control and European Control Conference, 2011, pp. 2195-2201.
-
(2011)
50th IEEE Conference on Decision and Control and European Control Conference
, pp. 2195-2201
-
-
Pasqualetti, F.1
Dorfler, F.2
Bullo, F.3
-
9
-
-
84872315313
-
A gradient information based real time pricing mechanism for microgrid in energy intensive enterprise
-
Beijing
-
Zhaojie Wang, et al., "A gradient information based real time pricing mechanism for microgrid in energy intensive enterprise", in the 10th World Congress on Intelligent Control and Automation, Beijing, 2012.
-
(2012)
The 10th World Congress on Intelligent Control and Automation
-
-
Wang, Z.1
-
11
-
-
77649317126
-
MAT-POWER'S extensible optimal power flow architecture
-
July
-
R. D. Zimmerman, C. E. Murillo-S'anchez, and R. J. Thomas, "MAT-POWER's extensible optimal power flow architecture, " in IEEE Power and Energy Society General Meeting, July 2009, pp. 1-7.
-
(2009)
IEEE Power and Energy Society General Meeting
, pp. 1-7
-
-
Zimmerman, R.D.1
Murillo-S'Anchez, C.E.2
Thomas, R.J.3
|