-
2
-
-
84910645634
-
India Blackouts Leave 700 Million Without Power
-
[Online]. Available: accessed May 15, 2014
-
The Guardian. India Blackouts Leave 700 Million Without Power. [Online]. Available: http://www.guardian.co.uk/, accessed May 15, 2014.
-
The Guardian
-
-
-
3
-
-
52649178811
-
Initial review of methods for cascading failure analysis in electric power transmission systems
-
R. Baldick et al., "Initial review of methods for cascading failure analysis in electric power transmission systems," in Proc. IEEE Power Energy Soc. General Meeting, Pittsburgh, PA, USA, Jul. 2008, pp. 1-8.
-
Proc. IEEE Power Energy Soc. General Meeting, Pittsburgh, PA, USA, Jul. 2008
, pp. 1-8
-
-
Baldick, R.1
-
4
-
-
84860251424
-
Risk assessment of cascading outages: Methodologies and challenges
-
May
-
M. Vaiman et al., "Risk assessment of cascading outages: Methodologies and challenges," IEEE Trans. Power Syst., vol. 27, no. 2, pp. 631-641, May 2012.
-
(2012)
IEEE Trans. Power Syst.
, vol.27
, Issue.2
, pp. 631-641
-
-
Vaiman, M.1
-
5
-
-
84910668678
-
-
Available: accessed May 20, 2014
-
Attack Ravages Power Grid. [Online]. Available: http://www.nytimes.com/, accessed May 20, 2014.
-
Attack Ravages Power Grid. [Online]
-
-
-
6
-
-
84883077214
-
Optimal budget deployment strategy against power grid interdiction
-
X. Liu, K. Ren, Y. Yuan, Z. Li, and Q. Wang, "Optimal budget deployment strategy against power grid interdiction," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 1160-1168.
-
Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013
, pp. 1160-1168
-
-
Liu, X.1
Ren, K.2
Yuan, Y.3
Li, Z.4
Wang, Q.5
-
7
-
-
84868544559
-
Using hybrid attack graphs to model cyber-physical attacks in the smart grid
-
P. J. Hawrylak, M. Haney, M. Papa, and J. Hale, "Using hybrid attack graphs to model cyber-physical attacks in the smart grid," in Proc. 5th Int. Symp. Resilient Control Syst., Salt Lake City, UT, USA, Aug. 2012, pp. 161-164.
-
Proc. 5th Int. Symp. Resilient Control Syst., Salt Lake City, UT, USA, Aug. 2012
, pp. 161-164
-
-
Hawrylak, P.J.1
Haney, M.2
Papa, M.3
Hale, J.4
-
8
-
-
77955771346
-
DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis
-
Aug.
-
Z. M. Fadlullah, T. Taleb, A. V. Vasilakos, M. Guizani, and N. Kato, "DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis," IEEE/ACM Trans. Netw., vol. 18, no. 4, pp. 1234-1247, Aug. 2010.
-
(2010)
IEEE/ACM Trans. Netw.
, vol.18
, Issue.4
, pp. 1234-1247
-
-
Fadlullah, Z.M.1
Taleb, T.2
Vasilakos, A.V.3
Guizani, M.4
Kato, N.5
-
9
-
-
84896839864
-
Toward incentivizing anti-spoofing deployment
-
Mar.
-
B. Liu, J. Bi, and A. V. Vasilakos, "Toward incentivizing anti-spoofing deployment," IEEE Trans. Inf. Forensics Security, vol. 9, no. 3, pp. 436-450, Mar. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.3
, pp. 436-450
-
-
Liu, B.1
Bi, J.2
Vasilakos, A.V.3
-
10
-
-
23844502144
-
Modeling cascading failures in the North American power grid
-
R. Kinney, P. Crucitti, R. Albert, and V. Latora, "Modeling cascading failures in the North American power grid," Eur. Phys. J. B, Condens. Matter Complex Syst., vol. 46, no. 1, pp. 101-107, 2005.
-
(2005)
Eur. Phys. J. B, Condens. Matter Complex Syst.
, vol.46
, Issue.1
, pp. 101-107
-
-
Kinney, R.1
Crucitti, P.2
Albert, R.3
Latora, V.4
-
11
-
-
84863117924
-
Risk-aware attacks and catastrophic cascading failures in U.S. power grid
-
W. Wang, Q. Cai, Y. Sun, and H. He, "Risk-aware attacks and catastrophic cascading failures in U.S. power grid," in Proc. IEEE Global Telecommun. Conf., Houston, TX, USA, Dec. 2011, pp. 1-6.
-
Proc. IEEE Global Telecommun. Conf., Houston, TX, USA, Dec. 2011
, pp. 1-6
-
-
Wang, W.1
Cai, Q.2
Sun, Y.3
He, H.4
-
12
-
-
84877637786
-
Load distribution vector based attack strategies against power grid systems
-
Y. Zhu, Y. Sun, and H. He, "Load distribution vector based attack strategies against power grid systems," in Proc. IEEE Global Telecommun. Conf., Anaheim, CA, USA, Dec. 2012, pp. 935-941.
-
Proc. IEEE Global Telecommun. Conf., Anaheim, CA, USA, Dec. 2012
, pp. 935-941
-
-
Zhu, Y.1
Sun, Y.2
He, H.3
-
13
-
-
84886376602
-
Risk-aware vulnerability analysis of electric grids from attacker's perspective
-
Y. Zhu, J. Yan, Y. Sun, and H. He, "Risk-aware vulnerability analysis of electric grids from attacker's perspective," in Proc. IEEE PES Innov. Smart Grid Technol. Conf., Washington, DC, USA, Feb. 2013, pp. 1-6.
-
Proc. IEEE PES Innov. Smart Grid Technol. Conf., Washington, DC, USA, Feb. 2013
, pp. 1-6
-
-
Zhu, Y.1
Yan, J.2
Sun, Y.3
He, H.4
-
14
-
-
84886380771
-
Multi-contingency cascading analysis of smart grid based on self-organizing map
-
Apr.
-
J. Yan, Y. Zhu, H. He, and Y. Sun, "Multi-contingency cascading analysis of smart grid based on self-organizing map," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 646-656, Apr. 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.4
, pp. 646-656
-
-
Yan, J.1
Zhu, Y.2
He, H.3
Sun, Y.4
-
16
-
-
84910638013
-
-
Online. Available: accessed Jan. 10, 2014
-
Platts. [Online]. Available: http://www.platts.com, accessed Jan. 10, 2014.
-
-
-
-
19
-
-
79951617247
-
Network vulnerability to single, multiple, and probabilistic physical attacks
-
P. K. Agarwal, A. Efrat, S. K. Ganjugunte, D. Hay, S. Sankararaman, and G. Zussman, "Network vulnerability to single, multiple, and probabilistic physical attacks," in Proc. Military Commun. Conf., San Jose, CA, USA, Oct./Nov. 2010, pp. 1824-1829.
-
Proc. Military Commun. Conf., San Jose, CA, USA, Oct./Nov. 2010
, pp. 1824-1829
-
-
Agarwal, P.K.1
Efrat, A.2
Ganjugunte, S.K.3
Hay, D.4
Sankararaman, S.5
Zussman, G.6
-
20
-
-
84885188346
-
Performance of electric power systems under physical malicious attacks
-
Dec.
-
E. I. Bilis, W. Kroger, and C. Nan, "Performance of electric power systems under physical malicious attacks," IEEE Syst. J., vol. 7, no. 4, pp. 854-865, Dec. 2013.
-
(2013)
IEEE Syst. J.
, vol.7
, Issue.4
, pp. 854-865
-
-
Bilis, E.I.1
Kroger, W.2
Nan, C.3
-
21
-
-
79956065270
-
Structural vulnerability of power systems: A topological approach
-
E. Bompard, D. Wu, and F. Xue, "Structural vulnerability of power systems: A topological approach," Electr. Power Syst. Res., vol. 81, no. 7, pp. 1334-1340, 2011.
-
(2011)
Electr. Power Syst. Res.
, vol.81
, Issue.7
, pp. 1334-1340
-
-
Bompard, E.1
Wu, D.2
Xue, F.3
-
22
-
-
84872846703
-
Optimal transmission switching considering voltage security and N-1 contingency analysis
-
Feb.
-
M. Khanabadi, H. Ghasemi, and M. Doostizadeh, "Optimal transmission switching considering voltage security and N-1 contingency analysis," IEEE Trans. Power Syst., vol. 28, no. 1, pp. 0885-8950, Feb. 2013.
-
(2013)
IEEE Trans. Power Syst.
, vol.28
, Issue.1
, pp. 0885-8950
-
-
Khanabadi, M.1
Ghasemi, H.2
Doostizadeh, M.3
-
23
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
Jun.
-
Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
24
-
-
78649403784
-
Do topological models provide good information about electricity infrastructure vulnerability?
-
P. Hines, E. Cotilla-Sanchez, and S. Blumsack, "Do topological models provide good information about electricity infrastructure vulnerability?" Chaos, vol. 20, no. 3, p. 033122, 2010.
-
(2010)
Chaos
, vol.20
, Issue.3
, pp. 033122
-
-
Hines, P.1
Cotilla-Sanchez, E.2
Blumsack, S.3
-
25
-
-
84864281207
-
A 'random chemistry' algorithm for identifying collections of multiple contingencies that initiate cascading failure
-
Aug.
-
M. J. Eppstein and P. D. H. Hines, "A 'random chemistry' algorithm for identifying collections of multiple contingencies that initiate cascading failure," IEEE Trans. Power Syst., vol. 27, no. 3, pp. 1698-1705, Aug. 2012.
-
(2012)
IEEE Trans. Power Syst.
, vol.27
, Issue.3
, pp. 1698-1705
-
-
Eppstein, M.J.1
Hines, P.D.H.2
-
26
-
-
34347248466
-
Topology and cascading line outages in power grids
-
D. L. Pepyne, "Topology and cascading line outages in power grids," J. Syst. Sci. Syst. Eng., vol. 16, no. 2, pp. 202-221, 2007.
-
(2007)
J. Syst. Sci. Syst. Eng.
, vol.16
, Issue.2
, pp. 202-221
-
-
Pepyne, D.L.1
-
27
-
-
69249240176
-
Cascade-based attack vulnerability on the US power grid
-
J.-W. Wang and L.-L. Rong, "Cascade-based attack vulnerability on the US power grid," Safety Sci., vol. 47, no. 10, pp. 1332-1336, 2009.
-
(2009)
Safety Sci.
, vol.47
, Issue.10
, pp. 1332-1336
-
-
Wang, J.-W.1
Rong, L.-L.2
-
28
-
-
42749103823
-
Structural vulnerability of the North American power grid
-
Feb.
-
R. Albert, I. Albert, and G. L. Nakarado, "Structural vulnerability of the North American power grid," Phys. Rev. E, vol. 69, p. 025103(R), Feb. 2004.
-
(2004)
Phys. Rev. E
, vol.69
, pp. 025103R
-
-
Albert, R.1
Albert, I.2
Nakarado, G.L.3
-
30
-
-
0003726276
-
-
Hoboken, NJ, USA: Wiley
-
A. J. Wood, B. F. Wollenberg, and G. B. Sheble, Power Generation, Operation and Control, 3rd ed. Hoboken, NJ, USA: Wiley, 2009.
-
(2009)
Power Generation, Operation and Control, 3rd Ed.
-
-
Wood, A.J.1
Wollenberg, B.F.2
Sheble, G.B.3
-
31
-
-
84907002144
-
The sequential attack against power grid networks
-
Y. Zhu, J. Yan, Y. Tang, Y. Sun, and H. He, "The sequential attack against power grid networks," in Proc. IEEE Int. Conf. Commun., Sydney, NSW, Australia, Jun. 2014, pp. 616-621.
-
Proc. IEEE Int. Conf. Commun., Sydney, NSW, Australia, Jun. 2014
, pp. 616-621
-
-
Zhu, Y.1
Yan, J.2
Tang, Y.3
Sun, Y.4
He, H.5
-
32
-
-
84876926986
-
Revealing temporal features of attacks against smart grid
-
J. Yan, Y. Zhu, Y. Sun, and H. He, "Revealing temporal features of attacks against smart grid," in Proc. IEEE PES Innov. Smart Grid Technol. Conf., Washington, DC, USA, Feb. 2013, pp. 1-6.
-
Proc. IEEE PES Innov. Smart Grid Technol. Conf., Washington, DC, USA, Feb. 2013
, pp. 1-6
-
-
Yan, J.1
Zhu, Y.2
Sun, Y.3
He, H.4
-
33
-
-
84870594838
-
N-1-1 contingency-constrained optimal power flow by interdiction methods
-
N. Fan, R. Chen, and J. Watson, "N-1-1 contingency-constrained optimal power flow by interdiction methods," in Proc. IEEE Power Energy Soc. General Meeting, San Diego, CA, USA, 2012, pp. 1-6.
-
Proc. IEEE Power Energy Soc. General Meeting, San Diego, CA, USA, 2012
, pp. 1-6
-
-
Fan, N.1
Chen, R.2
Watson, J.3
-
34
-
-
41349120887
-
Attack vulnerability of complex networks
-
May
-
P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han, "Attack vulnerability of complex networks," Phys. Rev. E, vol. 65, p. 056109, May 2002.
-
(2002)
Phys. Rev. E
, vol.65
, pp. 056109
-
-
Holme, P.1
Kim, B.J.2
Yoon, C.N.3
Han, S.K.4
-
35
-
-
3042775719
-
Error and attack tolerance of complex networks
-
P. Crucitti, V. Latora, M. Marchiori, and A. Rapisarda, "Error and attack tolerance of complex networks," Phys. A, Statist. Mech. Appl., vol. 340, nos. 1-3, pp. 388-394, 2004.
-
(2004)
Phys. A, Statist. Mech. Appl.
, vol.340
, Issue.1-3
, pp. 388-394
-
-
Crucitti, P.1
Latora, V.2
Marchiori, M.3
Rapisarda, A.4
-
36
-
-
84911932080
-
Revealing cascading failure vulnerability in power grids using risk-graph
-
to be published
-
Y. Zhu, J. Yan, Y. Sun, and H. He, "Revealing cascading failure vulnerability in power grids using risk-graph," IEEE Trans. Parallel Distrib. Syst., to be published.
-
IEEE Trans. Parallel Distrib. Syst.
-
-
Zhu, Y.1
Yan, J.2
Sun, Y.3
He, H.4
-
37
-
-
85166916238
-
Gephi: An open source software for exploring and manipulating networks
-
M. Bastian, S. Heymann, and M. Jacomy, "Gephi: An open source software for exploring and manipulating networks," in Proc. 3rd Int. ICWSM Conf., San Jose, CA, USA, May 2009, pp. 361-362.
-
Proc. 3rd Int. ICWSM Conf., San Jose, CA, USA, May 2009
, pp. 361-362
-
-
Bastian, M.1
Heymann, S.2
Jacomy, M.3
-
38
-
-
79151479984
-
MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education
-
Feb.
-
R. D. Zimmerman, C. E. Murillo-Sanchez, and R. J. Thomas, "MATPOWER: Steady-state operations, planning, and analysis tools for power systems research and education," IEEE Trans. Power Syst., vol. 26, no. 1, pp. 12-19, Feb. 2011.
-
(2011)
IEEE Trans. Power Syst.
, vol.26
, Issue.1
, pp. 12-19
-
-
Zimmerman, R.D.1
Murillo-Sanchez, C.E.2
Thomas, R.J.3
-
39
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
Jun.
-
T. T. Kim and H. V. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
40
-
-
84883077214
-
Optimal budget deployment strategy against power grid interdiction
-
X. Liu, K. Ren, Y. Yuan, Z. Li, and Q. Wang, "Optimal budget deployment strategy against power grid interdiction," in Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 1160-1168.
-
Proc. IEEE INFOCOM, Turin, Italy, Apr. 2013
, pp. 1160-1168
-
-
Liu, X.1
Ren, K.2
Yuan, Y.3
Li, Z.4
Wang, Q.5
-
41
-
-
84924349309
-
US electrical grid on the edge of failure
-
Tech. Rep., Aug.
-
J. Tollefson, "US electrical grid on the edge of failure," Nature, Tech. Rep., Aug. 2013.
-
(2013)
Nature
-
-
Tollefson, J.1
-
42
-
-
84896814191
-
Integrated security analysis on cascading failure in complex networks
-
Mar.
-
J. Yan, H. He, and Y. Sun, "Integrated security analysis on cascading failure in complex networks," IEEE Trans. Inf. Forensics Security, vol. 9, no. 3, pp. 451-463, Mar. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.3
, pp. 451-463
-
-
Yan, J.1
He, H.2
Sun, Y.3
-
43
-
-
79952020799
-
Seccloud: Bridging secure storage and computation in cloud
-
L. Wei, H. Zhu, Z. Cao, W. Jia, and A. V. Vasilakos, "Seccloud: Bridging secure storage and computation in cloud," in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. Workshops (ICDCSW), Genova, Italy, Jun. 2010, pp. 52-61.
-
Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst. Workshops (ICDCSW), Genova, Italy, Jun. 2010
, pp. 52-61
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Jia, W.4
Vasilakos, A.V.5
|