메뉴 건너뛰기




Volumn , Issue , 2014, Pages 649-659

Impact analysis of topology poisoning attacks on economic operation of the smart power grid

Author keywords

Formal Method; Impact of Stealthy Attacks; Optimal Power Flow; Power Grid; State Estimation

Indexed keywords

ACOUSTIC GENERATORS; ELECTRIC CIRCUIT BREAKERS; ELECTRIC LOAD FLOW; ELECTRIC POWER SYSTEM ECONOMICS; ELECTRIC POWER TRANSMISSION; FLOWMETERS; FORMAL METHODS; NETWORK SECURITY; SMART POWER GRIDS; STATE ESTIMATION; TOPOLOGY;

EID: 84907795085     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2014.72     Document Type: Conference Paper
Times cited : (33)

References (23)
  • 1
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • P. McDaniel and S. McLaughlin. Security and privacy challenges in the smart grid. IEEE Security Privacy, 7(3):75-77, 2009.
    • (2009) IEEE Security Privacy , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 7
    • 85027945316 scopus 로고    scopus 로고
    • Strategic protection against data injection attacks on power grids
    • Jun
    • T.T. Kim and H.V. Poor. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid, 2(2):326-333, Jun 2011.
    • (2011) IEEE Transactions on Smart Grid , vol.2 , Issue.2 , pp. 326-333
    • Kim, T.T.1    Poor, H.V.2
  • 8
    • 84883067383 scopus 로고    scopus 로고
    • Z3: An efficient smt solver
    • Z3: An efficient smt solver. In Microsoft Research. http://research.microsoft.com/en-us/um/redmond/projects/z3/.
    • Microsoft Research
  • 14
    • 84877672644 scopus 로고    scopus 로고
    • False data injection attacks with incomplete information against smart power grids
    • Dec
    • M. Rahman and H. Mohsenian-Rad. False data injection attacks with incomplete information against smart power grids. In IEEE Conference on Global Communications, Dec 2012.
    • (2012) IEEE Conference on Global Communications
    • Rahman, M.1    Mohsenian-Rad, H.2
  • 17
    • 84907791525 scopus 로고    scopus 로고
    • CRR Educational Class, CAISO Market Operations
    • R. Treinen. Shift factors: Methodology and example. http://www. caiso.com/docs/2004/02/13/200402131609438684, 2005. CRR Educational Class, CAISO Market Operations.
    • (2005) Shift Factors: Methodology and Example
    • Treinen, R.1
  • 19
    • 79959856672 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Jun
    • Yao Liu, Peng Ning, and Michael K. Reiter. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security, 14(1):13:1-13:33, Jun 2011.
    • (2011) ACM Transactions on Information and System Security , vol.14 , Issue.1 , pp. 131-1333
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 20
    • 84878284364 scopus 로고    scopus 로고
    • On the exact solution to a smart grid cyber-security analysis problem
    • Kin Cheong Sou, H. Sandberg, and K.H. Johansson. On the exact solution to a smart grid cyber-security analysis problem. Smart Grid, IEEE Transactions on, 4(2):856-865, 2013.
    • (2013) Smart Grid, IEEE Transactions on , vol.4 , Issue.2 , pp. 856-865
    • Sou, K.C.1    Sandberg, H.2    Johansson, K.H.3
  • 21
    • 84880239145 scopus 로고    scopus 로고
    • On topology attack of a smart grid: Undetectable attacks and countermeasures
    • Jul
    • Jinsub Kim and Lang Tong. On topology attack of a smart grid: Undetectable attacks and countermeasures. IEEE Journal on Selected Areas in Communications, 31(7):1294-1305, Jul 2013.
    • (2013) IEEE Journal on Selected Areas in Communications , vol.31 , Issue.7 , pp. 1294-1305
    • Kim, J.1    Tong, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.