-
1
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
P. McDaniel and S. McLaughlin. Security and privacy challenges in the smart grid. IEEE Security Privacy, 7(3):75-77, 2009.
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
2
-
-
82155164993
-
Towards a framework for cyber attack impact analysis of the electric smart grid
-
Oct
-
D. Kundur, X. Feng, Shan Liu, T. Zourntos, and K. L. Butler-Purry. Towards a framework for cyber attack impact analysis of the electric smart grid. In IEEE International Conference on Smart Grid Communications, Oct 2010.
-
(2010)
IEEE International Conference on Smart Grid Communications
-
-
Kundur, D.1
Feng, X.2
Liu, S.3
Zourntos, T.4
Butler-Purry, K.L.5
-
6
-
-
84857230860
-
Detecting false data injection attacks on dc state estimation
-
CPS Week, Apr
-
R. Bobba, K. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. Overbye. Detecting false data injection attacks on dc state estimation. In IEEE Workshop on Secure Control Systems, CPS Week, Apr 2010.
-
(2010)
IEEE Workshop on Secure Control Systems
-
-
Bobba, R.1
Rogers, K.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.6
-
7
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
Jun
-
T.T. Kim and H.V. Poor. Strategic protection against data injection attacks on power grids. IEEE Transactions on Smart Grid, 2(2):326-333, Jun 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
8
-
-
84883067383
-
Z3: An efficient smt solver
-
Z3: An efficient smt solver. In Microsoft Research. http://research.microsoft.com/en-us/um/redmond/projects/z3/.
-
Microsoft Research
-
-
-
9
-
-
79953131246
-
Cyber security analysis of state estimators in electric power systems
-
A. Teixeira, S. Amin, H. Sandberg, K. Johansson, and S. Sastry. Cyber security analysis of state estimators in electric power systems. In IEEE Conference on Decision and Control, pages 5991-5998, 2010.
-
(2010)
IEEE Conference on Decision and Control
, pp. 5991-5998
-
-
Teixeira, A.1
Amin, S.2
Sandberg, H.3
Johansson, K.4
Sastry, S.5
-
14
-
-
84877672644
-
False data injection attacks with incomplete information against smart power grids
-
Dec
-
M. Rahman and H. Mohsenian-Rad. False data injection attacks with incomplete information against smart power grids. In IEEE Conference on Global Communications, Dec 2012.
-
(2012)
IEEE Conference on Global Communications
-
-
Rahman, M.1
Mohsenian-Rad, H.2
-
17
-
-
84907791525
-
-
CRR Educational Class, CAISO Market Operations
-
R. Treinen. Shift factors: Methodology and example. http://www. caiso.com/docs/2004/02/13/200402131609438684, 2005. CRR Educational Class, CAISO Market Operations.
-
(2005)
Shift Factors: Methodology and Example
-
-
Treinen, R.1
-
19
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Jun
-
Yao Liu, Peng Ning, and Michael K. Reiter. False data injection attacks against state estimation in electric power grids. ACM Transactions on Information and System Security, 14(1):13:1-13:33, Jun 2011.
-
(2011)
ACM Transactions on Information and System Security
, vol.14
, Issue.1
, pp. 131-1333
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
20
-
-
84878284364
-
On the exact solution to a smart grid cyber-security analysis problem
-
Kin Cheong Sou, H. Sandberg, and K.H. Johansson. On the exact solution to a smart grid cyber-security analysis problem. Smart Grid, IEEE Transactions on, 4(2):856-865, 2013.
-
(2013)
Smart Grid, IEEE Transactions on
, vol.4
, Issue.2
, pp. 856-865
-
-
Sou, K.C.1
Sandberg, H.2
Johansson, K.H.3
-
21
-
-
84880239145
-
On topology attack of a smart grid: Undetectable attacks and countermeasures
-
Jul
-
Jinsub Kim and Lang Tong. On topology attack of a smart grid: Undetectable attacks and countermeasures. IEEE Journal on Selected Areas in Communications, 31(7):1294-1305, Jul 2013.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.7
, pp. 1294-1305
-
-
Kim, J.1
Tong, L.2
|