-
2
-
-
67349092535
-
Vulnerability assessment of cybersecurity for SCADA systems
-
C. W. Ten, C. C. Liu, and G. Manimaran, "Vulnerability assessment of cybersecurity for SCADA systems," IEEE Trans. Power Syst., vol. 23, no. 4, pp. 1836-1846, 2008.
-
(2008)
IEEE Trans. Power Syst.
, vol.23
, Issue.4
, pp. 1836-1846
-
-
Ten, C.W.1
Liu, C.C.2
Manimaran, G.3
-
3
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Chicago, IL, USA
-
Y. Liu, P. Ning, and M. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Security, Chicago, IL, USA, 2009, pp. 21-32.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.3
-
4
-
-
84866769548
-
Cyber security study of a scada energymanagement system: Stealthy deception attacks on the state estimator
-
Milan, Italy
-
A. Teixeira,G. Dan, H. Sandberg, andK. H. Johansson, "Cyber security study of a scada energymanagement system: Stealthy deception attacks on the state estimator," in Proc. IFAC World Congr.,Milan, Italy, 2011.
-
(2011)
Proc. IFAC World Congr
-
-
Teixeira, A.1
Dan, G.2
Sandberg, H.3
Johansson, A.H.4
-
5
-
-
84857941849
-
Impacts of malicious sata on realtime price of electricity market operations
-
Jan. 4-7
-
L. Jia, R. J. Thomas, and L. Tong, "Impacts of malicious sata on realtime price of electricity market operations," in Proc. 45th HICSS, Jan. 4-7, 2012, pp. 1907-1914.
-
(2012)
Proc. 45th HICSS
, pp. 1907-1914
-
-
Jia, L.1
Thomas, R.J.2
Tong, L.3
-
6
-
-
82155175605
-
Integrity data attacks in power market operations
-
Dec.
-
L. Xie, Y. Mo, and B. Sinopoli, "Integrity data attacks in power market operations," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 659-665, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 659-665
-
-
Xie, L.1
Mo, Y.2
Sinopoli, B.3
-
7
-
-
84876017888
-
Malicious ramp-induced temporal data attack in power market with look-ahead dispatch
-
Nov.
-
D. H. Choi and L. Xie, "Malicious ramp-induced temporal data attack in power market with look-ahead dispatch," in Proc. IEEE Int. Conf. Smart Grid Commun., Nov. 2012, pp. 330-335.
-
(2012)
Proc. IEEE Int. Conf. Smart Grid Commun
, pp. 330-335
-
-
Choi, D.H.1
Xie, L.2
-
8
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
Jun.
-
Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
9
-
-
84883303602
-
Smart grid data integrity attacks
-
Sep.
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, "Smart grid data integrity attacks," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1244-1253, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1244-1253
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
10
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
Oct.
-
G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2010, pp. 214-219.
-
(2010)
Proc. IEEE Int. Conf. Smart Grid Commun
, pp. 214-219
-
-
Dan, G.1
Sandberg, H.2
-
11
-
-
85032751507
-
Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions
-
Sep.
-
S. Cui, Z. Han, S. Kar, T. T. Kim, H. V. Poor, and A. Tajer, "Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions," IEEE Signal Process. Mag., vol. 29, no. 5, pp. 106-115, Sep. 2012.
-
(2012)
IEEE Signal Process. Mag.
, vol.29
, Issue.5
, pp. 106-115
-
-
Cui, S.1
Han, Z.2
Kar, S.3
Kim, T.T.4
Poor, H.V.5
Tajer, A.6
-
12
-
-
84857230860
-
Detecting false data injection attacks on DC state estimation
-
R. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. Overbye, "Detecting false data injection attacks on DC state estimation," in CPSWEEK 2010.
-
(2010)
CPSWEEK
-
-
Bobba, R.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.6
-
13
-
-
84863506343
-
Network-aware mitigation of data integrity attacks on power system state estimation
-
Jul.
-
O. Vukovic, K. C. Sou, G. Dan, and H. Sandberg, "Network-aware mitigation of data integrity attacks on power system state estimation," IEEE J. Sel. Areas Commun., vol. 30, no. 6, pp. 1108-1118, Jul. 2012.
-
(2012)
IEEE J. Sel. Areas Commun.
, vol.30
, Issue.6
, pp. 1108-1118
-
-
Vukovic, O.1
Sou, K.C.2
Dan, G.3
Sandberg, H.4
-
14
-
-
85027945316
-
Strategic protection against data injection attack on power grids
-
Jun.
-
T. T. Kim and H. V. Poor, "Strategic protection against data injection attack on power grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
15
-
-
84863349904
-
Defending mechanisms against false-data injection attacks in the power system state estimation
-
Houston, TX, USA, Dec.
-
S. Bi and Y. J. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," in Proc. IEEE Globecom SG-COMNETS, Houston, TX, USA, Dec. 2011.
-
(2011)
Proc. IEEE Globecom SG-COMNETS
-
-
Bi, S.1
Zhang, Y.J.2
-
16
-
-
49249129032
-
Optimal placement of phasor measurement units for power system observability
-
S. Chakrabarti and E. Kyriakides, "Optimal placement of phasor measurement units for power system observability," IEEE Trans. Power Syst., vol. 23, no. 3, pp. 1433-1440, 2008.
-
(2008)
IEEE Trans. Power Syst.
, vol.23
, Issue.3
, pp. 1433-1440
-
-
Chakrabarti, S.1
Kyriakides, E.2
-
19
-
-
0019042727
-
Power system observability: a practical algorithm using network topology
-
G. R. Krumpholz, K. A. Clements, and P. W. Davis, "Power system observability: A practical algorithm using network topology," IEEE Trans. Power App. Syst., vol. PAS-99, no. 4, pp. 1534-1542, Jul. 1980. (Pubitemid 11472481)
-
(1980)
IEEE transactions on power apparatus and systems
, vol.PAS-99
, Issue.4
, pp. 1534-1542
-
-
Krumpholz, G.R.1
Clements, K.A.2
David, P.W.3
-
20
-
-
84899982073
-
Observability determination in power system state estimation using a network flow technique
-
May
-
A. Barglela, M. R. Irving, and M. J. H. Sterling, "Observability determination in power system state estimation using a network flow technique," IEEE Power Eng. Rev., vol. PER-6, no. 2, pp. 39-40, May 1986.
-
(1986)
IEEE Power Eng. Rev.
, vol.PER-6
, Issue.2
, pp. 39-40
-
-
Barglela, A.1
Irving, M.R.2
Sterling, M.J.H.3
-
21
-
-
82155162476
-
Malicious data attack on the smart grid
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attack on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
22
-
-
84860701003
-
Electricity power network security analysis via minimum cut relaxation
-
Dec.
-
K. C. Sou, H. Sandberg, and K. H. Johansson, "Electricity power network security analysis via minimum cut relaxation," in Proc. 50th CDC-ECC, Dec. 2011, pp. 4054-4059.
-
(2011)
Proc. 50th CDC-ECC
, pp. 4054-4059
-
-
Sou, K.C.1
Sandberg, H.2
Johansson, K.H.3
-
23
-
-
84155170617
-
On security indices for state estimators in power networks
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," in CPSWEEK 2010.
-
(2010)
CPSWEEK
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
24
-
-
84864284962
-
Computing critical k-tuples in power networks
-
K. C. Sou, H. Sandberg, and K. H. Johansson, "Computing critical k-tuples in power networks," IEEE Trans. Power Syst., vol. 27, no. 3, pp. 1511-1520, 2012.
-
(2012)
IEEE Trans. Power Syst.
, vol.27
, Issue.3
, pp. 1511-1520
-
-
Sou, K.C.1
Sandberg, H.2
Johansson, K.H.3
-
26
-
-
0000892307
-
The Steiner tree problem
-
New York: Elsevier
-
F. K. Hwang, D. S. Richards, and P. Winter, "The Steiner tree problem," in Monograph in Annals of Discrete Mathematics. New York: Elsevier, 1992, vol. 53.
-
(1992)
Monograph in Annals of Discrete Mathematics
, vol.53
-
-
Hwang, F.K.1
Richards, D.S.2
Winter, P.3
-
27
-
-
0030313782
-
Implementation of PMU technology in state estimation: An overview
-
R. Zivanovic and C. Cairns, "Implementation of PMU technology in state estimation: An overview," in Proc. IEEE AFRICON 4th, 1996, vol. 2.
-
(1996)
Proc. IEEE AFRICON 4th
, vol.2
-
-
Zivanovic, R.1
Cairns, C.2
-
28
-
-
84943781981
-
On the use of PMUs in power system state estimation
-
A. G. Expósito, A. Abur, P. Rousseaux, A. de la Villa Jaún, and C. G. Quiles, "On the use of PMUs in power system state estimation," in Proc. 17th Power Syst. Comput. Conf., 2011, pp. 22-26.
-
(2011)
Proc. 17th Power Syst. Comput. Conf.
, pp. 22-26
-
-
Expósito, A.G.1
Abur, A.2
Rousseaux, P.3
De La Jaún Villa, A.4
Quiles, C.G.5
-
29
-
-
65749094394
-
A unified approach for the optimal PMU location for power system state estimation
-
May
-
N. H. Abbasy and H. M. Ismail, "A unified approach for the optimal PMU location for power system state estimation," IEEE Trans. Power Syst., vol. 24, no. 2, pp. 806-813, May 2009.
-
(2009)
IEEE Trans. Power Syst.
, vol.24
, Issue.2
, pp. 806-813
-
-
Abbasy, N.H.1
Ismail, H.M.2
-
30
-
-
84865517174
-
Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks
-
Sep.
-
G. Hug and J. A. Giampapa, "Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks," IEEE Trans. Smart Grid, vol. 3, no. 3, pp. 1362-1370, Sep. 2012.
-
(2012)
IEEE Trans. Smart Grid
, vol.3
, Issue.3
, pp. 1362-1370
-
-
Hug, G.1
Giampapa, J.A.2
-
32
-
-
84899943031
-
-
Gurobi [Online]. Available: http://www.gurobi. com/
-
-
-
|