-
1
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, andM. K. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 21-32.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Security
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
2
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec.
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
3
-
-
84155170617
-
On security indices for state estimators in power networks
-
Stockholm, Sweden, Apr.
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," in Proc. 1stWorkshop Secure Control Syst. CPSWEEK, Stockholm, Sweden, Apr. 2010, pp. 1-6.
-
(2010)
Proc. 1st Workshop Secure Control Syst. CPSWEEK
, pp. 1-6
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
4
-
-
79954575826
-
Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures
-
Gaithersburg, MD, USA, Oct.
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on smart grid state estimation: Attack strategies and countermeasures," in Proc. IEEE Smart Grid Commun., Gaithersburg, MD, USA, Oct. 2010, pp. 220-225.
-
(2010)
Proc. IEEE Smart Grid Commun.
, pp. 220-225
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
5
-
-
84857230860
-
Detecting false data injection attacks on dc state estimation
-
Stockholm, Sweeden Apr.
-
R. B. Bobba et al., "Detecting false data injection attacks on dc state estimation," in Proc. 1st Workshop Secure Control Syst. CPSWEEK, Stockholm, Sweeden, Apr. 2010, pp. 1-9.
-
(2010)
Proc. 1st Workshop Secure Control Syst. CPSWEEK
, pp. 1-9
-
-
Bobba, R.B.1
-
6
-
-
0019042727
-
Power system observability: A practical algorithm using network topology
-
G. R. Krumpholz, K. A. Clements, and P. W. Davis, "Power system observability: A practical algorithm using network topology," IEEE Trans. Power App. Syst., vol. PAS-99, no. 4, pp. 1534-1542, Jul. 1980. (Pubitemid 11472481)
-
(1980)
IEEE transactions on power apparatus and systems
, vol.PAS-99
, Issue.4
, pp. 1534-1542
-
-
Krumpholz, G.R.1
Clements, K.A.2
David, P.W.3
-
7
-
-
0022059192
-
Network observability: Theory
-
May
-
A.Monticelli and F. F.Wu, "Network observability: Theory," IEEE Trans. Power App. Syst., vol. PAS-104, no. 5, pp. 1042-1048, May 1985.
-
(1985)
IEEE Trans. Power App. Syst.
, vol.PAS-104
, Issue.5
, pp. 1042-1048
-
-
Monticelli, A.1
Wu, F.F.2
-
8
-
-
0022060812
-
Network observability: Identification of observable islands and measurement placement
-
A. Monticelli and F. F. Wu, "Network observability: Identification of observable islands and measurement placement," IEEE Trans. Power App. Syst., vol. PAS-104, no. 5, pp. 1035-1041, May 1985. (Pubitemid 15476791)
-
(1985)
IEEE transactions on power apparatus and systems
, vol.PAS-104
, Issue.5
, pp. 1035-1041
-
-
Monticelli, A.1
Wu Felix, F.2
-
9
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
Jun.
-
T. Kim and H. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.1
Poor, H.2
-
10
-
-
84863349904
-
Defending mechanisms against false-data injection attacks in the power system state estimation
-
Houston, TX, USA, Dec.
-
S. Bi and Y. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," in Proc. IEEE GLOBECOM Workshops, Houston, TX, USA, Dec. 2011, pp. 1162-1167.
-
(2011)
Proc. IEEE GLOBECOM Workshops
, pp. 1162-1167
-
-
Bi, S.1
Zhang, Y.2
-
11
-
-
84855833052
-
Smart grid data integrity attacks: Characterizations and countermeasures
-
Oct.
-
A. Giani et al., "Smart grid data integrity attacks: Characterizations and countermeasures," in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2011, pp. 232-237.
-
(2011)
Proc. IEEE Int. Conf. Smart Grid Commun.
, pp. 232-237
-
-
Giani, A.1
-
12
-
-
84880239145
-
On topology attack of a smart grid: Undetectable attacks and countermeasures
-
Jul.
-
J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable attacks and countermeasures," IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1294-1305, Jul. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.7
, pp. 1294-1305
-
-
Kim, J.1
Tong, L.2
-
13
-
-
0022095056
-
Multiple bad data detectability and identifiability: A geometric approach
-
K. Clements and P. Davis, "Multiple bad data detectability and identifiability: A geometric approach," IEEE Trans. Power Del., vol. PWRD-1, no. 3, pp. 355-360, Jul. 1986. (Pubitemid 16629654)
-
(1985)
IEEE Transactions on Power Delivery
, vol.PWRD-1
, Issue.3
, pp. 355-360
-
-
Clements, K.A.1
Davis, P.W.2
-
14
-
-
0026206560
-
Identification and updating of minimally dependent sets of measurements in state estimation
-
DOI 10.1109/59.119239
-
G. Korres and G. Contaxis, "Identification and updating of minimally dependent sets of measurements in state estimation," IEEE Trans. Power Syst., vol. 6, no. 3, pp. 999-1005, Aug. 1991. (Pubitemid 21690195)
-
(1991)
IEEE Transactions on Power Systems
, vol.6
, Issue.3
, pp. 999-1005
-
-
Korres George, N.1
Contaxis George, C.2
-
15
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
Gaithersburg, MD, USA, Oct.
-
G. Dán and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in Proc. IEEE Smart Grid Commun., Gaithersburg, MD, USA, Oct. 2010, pp. 214-219.
-
(2010)
Proc. IEEE Smart Grid Commun.
, pp. 214-219
-
-
Dán, G.1
Sandberg, H.2
-
16
-
-
84855825082
-
Network-layer protection schemes against stealth attacks on state estimators in power systems
-
Oct.
-
O. Vukovic, K. C. Sou, G. Dan, and H. Sandberg, "Network-layer protection schemes against stealth attacks on state estimators in power systems," in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2011, pp. 184-189.
-
(2011)
Proc. IEEE Int. Conf. Smart Grid Commun.
, pp. 184-189
-
-
Vukovic, O.1
Sou, K.C.2
Dan, G.3
Sandberg, H.4
-
17
-
-
0016480359
-
Bad data analysis for power system state estimation
-
Mar.
-
E. Handschin, F. C. Schweppe, J. Kohlas, and A. Fiechter, "Bad data analysis for power system state estimation," IEEE Trans. Power App. Syst., vol. PAS-94, no. 2, pp. 329-337, Mar. 1975.
-
(1975)
IEEE Trans. Power App. Syst.
, vol.PAS-94
, Issue.2
, pp. 329-337
-
-
Handschin, E.1
Schweppe, F.C.2
Kohlas, J.3
Fiechter, A.4
-
18
-
-
0020749591
-
Reliable bad data processing for real-time state estimation
-
A. Monticelli and A. Garcia, "Reliable bad data processing for real-time state estimation," IEEE Trans. Power App. Syst., vol. PAS-102, no. 5, pp. 1126-1139, May 1983. (Pubitemid 13544532)
-
(1983)
IEEE transactions on power apparatus and systems
, vol.PAS-102
, Issue.5
, pp. 1126-1139
-
-
Monticelli, A.1
Garcia, A.2
-
19
-
-
0022148881
-
Bad data identification methods in power system state estimation - A comparative study
-
T. Van Cutsem, M. Ribbens-Pavella, and L. Mili, "Bad data identification methods in power system state estimation-A comparative study," IEEE Trans. Power App. Syst., vol. PAS-104, no. 11, pp. 3037-3049, Nov. 1985. (Pubitemid 16524642)
-
(1985)
IEEE transactions on power apparatus and systems
, vol.PAS-104
, Issue.11
, pp. 3037-3049
-
-
Mili, L.1
Van Cutsem, Th.2
Ribbens-Pavella, M.3
-
20
-
-
0021529208
-
Hypothesis testing identification: A new method for bad data analysis in power system state estimation
-
L. Mili, T. Van Cutsem, and M. Ribbens-Pavella, "Hypothesis testing identification: A new method for bad data analysis in power system state estimation," IEEE Trans. Power App. Syst., vol. PAS-103, no. 11, pp. 3239-3252, Nov. 1984. (Pubitemid 14662339)
-
(1984)
IEEE transactions on power apparatus and systems
, vol.PAS-103
, Issue.11
, pp. 3239-3252
-
-
Mili, L.1
Cutsem Th.Van2
Ribbens-Pavella, M.3
-
23
-
-
0020116808
-
Bad data rejection properties of weighted least absolute value techniques applied to static state estimation
-
Apr.
-
W. W. Kotiuga and M. Vidyasagar, "Bad data rejection properties of weighted least absolute value techniques applied to static state estimation," IEEE Trans. Power App. Syst., vol. PAS-101, no. 4, pp. 844-853, Apr. 1982.
-
(1982)
IEEE Trans. Power App. Syst.
, vol.PAS-101
, Issue.4
, pp. 844-853
-
-
Kotiuga, W.W.1
Vidyasagar, M.2
-
24
-
-
0026105479
-
A fast algorithm for the weighted least absolute value state estimation [for power systems]
-
Feb.
-
A. Abur and M. Celik, "A fast algorithm for the weighted least absolute value state estimation [for power systems]," IEEE Trans. Power Syst., vol. 6, no. 1, pp. 1-8, Feb. 1991.
-
(1991)
IEEE Trans. Power Syst.
, vol.6
, Issue.1
, pp. 1-8
-
-
Abur, A.1
Celik, M.2
-
25
-
-
0026819316
-
A robust WLAV state estimator using transformations
-
Feb.
-
M. Celik and A. Abur, "A robust WLAV state estimator using transformations," IEEE Trans. Power Syst., vol. 7, no. 1, pp. 106-113, Feb. 1992.
-
(1992)
IEEE Trans. Power Syst.
, vol.7
, Issue.1
, pp. 106-113
-
-
Celik, M.1
Abur, A.2
-
26
-
-
0028479976
-
Weighted least absolute value state estimation using interior point methods
-
Aug.
-
H. Singh and F. Alvarado, "Weighted least absolute value state estimation using interior point methods," IEEE Trans. Power Syst., vol. 9, no. 3, pp. 1478-1484, Aug. 1994.
-
(1994)
IEEE Trans. Power Syst.
, vol.9
, Issue.3
, pp. 1478-1484
-
-
Singh, H.1
Alvarado, F.2
-
27
-
-
0028422519
-
Robust state estimation of electric power systems
-
May
-
L. Mili, M. Cheniae, and P. Rousseeuw, "Robust state estimation of electric power systems," IEEE Trans. Circuits Syst. I, Fundam. Theory Appl., vol. 41, no. 5, pp. 349-358, May 1994.
-
(1994)
IEEE Trans. Circuits Syst. I. Fundam. Theory Appl.
, vol.41
, Issue.5
, pp. 349-358
-
-
Mili, L.1
Cheniae, M.2
Rousseeuw, P.3
-
28
-
-
0030215904
-
Identification of multiple interacting bad data via power system decomposition
-
M. Cheniae, L. Mili, and P. Rousseeuw, "Identification of multiple interacting bad data via power system decomposition," IEEE Trans. Power Syst., vol. 11, no. 3, pp. 1555-1563, Aug. 1996. (Pubitemid 126781311)
-
(1996)
IEEE Transactions on Power Systems
, vol.11
, Issue.3
, pp. 1555-1563
-
-
Cheniae, M.G.1
Mili, L.2
-
29
-
-
84857951113
-
Topology perturbation for detecting malicious data injection
-
Jan.
-
K. Morrow, E. Heine, K. Rogers, R. Bobba, and T. Overbye, "Topology perturbation for detecting malicious data injection," in Proc. 45th HICSS, Jan. 2012, pp. 2104-2113.
-
(2012)
Proc. 45th HICSS
, pp. 2104-2113
-
-
Morrow, K.1
Heine, E.2
Rogers, K.3
Bobba, R.4
Overbye, T.5
-
30
-
-
84855846298
-
Distributed joint cyber attack detection and state recovery in smart grids
-
Oct.
-
A. Tajer, S. Kar, H. Poor, and S. Cui, "Distributed joint cyber attack detection and state recovery in smart grids," in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2011, pp. 202-207.
-
(2011)
Proc. IEEE Int. Conf. Smart Grid Commun.
, pp. 202-207
-
-
Tajer, A.1
Kar, S.2
Poor, H.3
Cui, S.4
-
31
-
-
79957813416
-
Defending false data injection attack on smart grid network using adaptive CUSUM test
-
Mar.
-
Y. Huang, H. Li, K. Campbell, and Z. Han, "Defending false data injection attack on smart grid network using adaptive CUSUM test," in Proc. 45th Annu. CISS, Mar. 2011, pp. 1-6.
-
(2011)
Proc. 45th Annu. CISS
, pp. 1-6
-
-
Huang, Y.1
Li, H.2
Campbell, K.3
Han, Z.4
-
32
-
-
85032751507
-
Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions
-
Sep.
-
S. Cui et al., "Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions," IEEE Signal Process. Mag., vol. 29, no. 5, pp. 106-115, Sep. 2012.
-
(2012)
IEEE Signal Process. Mag.
, vol.29
, Issue.5
, pp. 106-115
-
-
Cui, S.1
-
33
-
-
84872133588
-
Bad data injection in smart grid: Attack and defense mechanisms
-
Jan.
-
Y. Huang et al., "Bad data injection in smart grid: Attack and defense mechanisms," IEEE Commun. Mag., vol. 51, no. 1, pp. 27-33, Jan. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.1
, pp. 27-33
-
-
Huang, Y.1
-
34
-
-
84879501033
-
-
Electric Power Research Institute, Palo Alto, CA, USA, May white paper
-
Accuracy of Digital Electricity Meters, Electric Power Research Institute, Palo Alto, CA, USA, May 2010, white paper.
-
(2010)
Accuracy of Digital Electricity Meters
-
-
-
35
-
-
0030197678
-
A new approach to the minimum cut problem
-
D. R. Karger and C. Stein, "A new approach to theminimum cut problem," J. ACM, vol. 43, no. 4, pp. 601-640, Jul. 1996. (Pubitemid 126582607)
-
(1996)
Journal of the ACM
, vol.43
, Issue.4
, pp. 601-640
-
-
Karger, D.R.1
Stein, C.2
-
36
-
-
4344657727
-
-
[Online]. Available
-
Power Systems Test Case Archive. [Online]. Available: http://www.ee.washington.edu/research/pstca/
-
Power Systems Test Case Archive
-
-
|