-
1
-
-
70449466750
-
-
EECS Dept., Univ. of Calif., Berkeley, CA, USA, Tech. Rep. UCB/EECS-2008-8, Jan. [Online]. Available
-
E. A. Lee, "Cyber physical systems: Design challenges," EECS Dept., Univ. of Calif., Berkeley, CA, USA, Tech. Rep. UCB/EECS-2008-8, Jan. 2008 [Online]. Available: http://www.eecs.berkeley.edu/Pubs/ TechRpts/2008/EECS-2008-8.html
-
(2008)
Cyber Physical Systems: Design Challenges
-
-
Lee, E.A.1
-
2
-
-
85032781120
-
State estimation in electric power grids: Meeting new challenges presented by the requirements of the future grid
-
Sep.
-
Y.-F. Huang, S. Werner, J. Huang, N. Kashyap, and V. Gupta, "State estimation in electric power grids: Meeting new challenges presented by the requirements of the future grid," IEEE Signal Process. Mag., vol. 29, no. 5, pp. 33-43, Sep. 2012.
-
(2012)
IEEE Signal Process. Mag.
, vol.29
, Issue.5
, pp. 33-43
-
-
Huang, Y.-F.1
Werner, S.2
Huang, J.3
Kashyap, N.4
Gupta, V.5
-
3
-
-
80055028776
-
Challenges for securing cyber physical systems
-
DHS. Jul
-
A. Cardenas, S.Amin, B. Sinopoli,A. Giani, A. Perrig, and S. S. Sastry, "Challenges for securing cyber physical systems," in Proc. Workshop Future Direct. Cyber-Phys. Syst. Secur., Jul. 2009, DHS.
-
(2009)
Proc. Workshop Future Direct. Cyber-Phys. Syst. Secur.
-
-
Cardenas, A.1
Amin, S.2
Sinopoli, B.3
Giani, A.4
Perrig, A.5
Sastry, S.S.6
-
4
-
-
84555196679
-
Staying in control: Cybersecurity and the modern electric grid
-
J. Hull, H. Khurana, T. Markham, and K. Staggs, "Staying in control: Cybersecurity and the modern electric grid," IEEE Power Energy Mag., vol. 10, no. 1, pp. 41-48, 2012.
-
(2012)
IEEE Power Energy Mag.
, vol.10
, Issue.1
, pp. 41-48
-
-
Hull, J.1
Khurana, H.2
Markham, T.3
Staggs, K.4
-
6
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Comput. Commun. Secur., 2009, pp. 21-32.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Secur.
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
7
-
-
84857230860
-
Detecting false data injection attacks on dc state estimation
-
Stockholm, Sweden, Apr.
-
R. B. Bobba, K. M. Rogers, Q.Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, "Detecting false data injection attacks on dc state estimation," in Proc. 1st Workshop on Secure Control Syst. (CPSWEEK 2010), Stockholm, Sweden, Apr. 2010.
-
(2010)
Proc. 1st Workshop on Secure Control Syst. (CPSWEEK 2010)
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
8
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec.
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
9
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
June
-
T. Kim and H. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, June 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.1
Poor, H.2
-
10
-
-
84863349904
-
Defending mechanisms against false-data injection attacks in the power system state estimation
-
Houston, TX, USA, Dec.
-
S. Bi and Y. Zhang, "Defending mechanisms against false-data injection attacks in the power system state estimation," in Proc. IEEE GLOBECOM Workshops, Houston, TX, USA, Dec. 2011.
-
(2011)
Proc. IEEE GLOBECOM Workshops
-
-
Bi, S.1
Zhang, Y.2
-
11
-
-
84855833052
-
Smart grid data integrity attacks: Characterizations and countermeasures
-
Oct.
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, "Smart grid data integrity attacks: Characterizations and countermeasures," in Proc. IEEE Int. Conf. Smart Grid Commun. (Smart-GridComm), Oct. 2011, pp. 232-237.
-
(2011)
Proc. IEEE Int. Conf. Smart Grid Commun. (Smart-GridComm)
, pp. 232-237
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
12
-
-
84893535209
-
On phasor measurement unit placement against state and topology attacks
-
Oct.
-
J. Kim and L. Tong, "On phasor measurement unit placement against state and topology attacks," in IEEE Int. Conf. Smart Grid Commun., Oct. 2013.
-
(2013)
IEEE Int. Conf. Smart Grid Commun.
-
-
Kim, J.1
Tong, L.2
-
13
-
-
84855833413
-
Stealth false data injection using independent component analysis in smart grid
-
Oct.
-
M. Esmalifalak, H. Nguyen, R. Zheng, and Z. Han, "Stealth false data injection using independent component analysis in smart grid," in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2011, pp. 244-248.
-
(2011)
Proc. IEEE Int. Conf. Smart Grid Commun.
, pp. 244-248
-
-
Esmalifalak, M.1
Nguyen, H.2
Zheng, R.3
Han, Z.4
-
14
-
-
84877672644
-
False data injection attacks with incomplete information against smart power grids
-
Dec.
-
M. Rahman and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart power grids," in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2012.
-
(2012)
Proc. IEEE Global Commun. Conf. (GLOBECOM)
-
-
Rahman, M.1
Mohsenian-Rad, H.2
-
15
-
-
0024663112
-
MUSIC, maximum likelihood, Cramer-Rao bound
-
P. Stoica and A. Nehorai, "MUSIC, maximum likelihood, Cramer-Rao bound," IEEE Trans. Acoust., Speech Signal Process., vol. 37, no. 5, pp. 720-741, 1989.
-
(1989)
IEEE Trans. Acoust., Speech Signal Process.
, vol.37
, Issue.5
, pp. 720-741
-
-
Stoica, P.1
Nehorai, A.2
-
16
-
-
64349119564
-
Eigenvalue beamforming using a multirank mvdr beamformer and subspace selection
-
A. Pezeshki, B. Van Veen, L. Scharf, H. Cox, and M. Nordenvaad, "Eigenvalue beamforming using a multirank mvdr beamformer and subspace selection," IEEE Trans. Signal Process., vol. 56, no. 5, pp. 1954-1967, 2008.
-
(2008)
IEEE Trans. Signal Process.
, vol.56
, Issue.5
, pp. 1954-1967
-
-
Pezeshki, A.1
Van Veen, B.2
Scharf, L.3
Cox, H.4
Nordenvaad, M.5
-
17
-
-
0029509295
-
Subspace-based methods for the identification of linear time-invariant systems
-
M. Viberg, "Subspace-based methods for the identification of linear time-invariant systems," Automatica, vol. 31, no. 12, pp. 1835-1851, 1995.
-
(1995)
Automatica
, vol.31
, Issue.12
, pp. 1835-1851
-
-
Viberg, M.1
-
18
-
-
4344657727
-
-
[Online]. Available
-
Power Systems Test Case Archive [Online]. Available: http://www.ee. washington.edu/research/pstca/
-
Power Systems Test Case Archive
-
-
-
19
-
-
84899894964
-
Graphical methods for defense against falsedata injection attacks on power system state estimation
-
May
-
S. Bi and Y. J. Zhang, "Graphical methods for defense against falsedata injection attacks on power system state estimation," IEEE Trans. Smart Grid, vol. 5, no. 3, pp. 1216-1227, May 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.3
, pp. 1216-1227
-
-
Bi, S.1
Zhang, Y.J.2
-
20
-
-
0019042727
-
Power system observability: A practical algorithm using network topology
-
Jul.
-
G. R. Krumpholz, K. A. Clements, and P. W. Davis, "Power system observability: A practical algorithm using network topology," IEEE Trans. Power Apparat. Syst., vol. 99, no. 4, pp. 1534-1542, Jul. 1980.
-
(1980)
IEEE Trans. Power Apparat. Syst.
, vol.99
, Issue.4
, pp. 1534-1542
-
-
Krumpholz, G.R.1
Clements, K.A.2
Davis, P.W.3
-
21
-
-
84883303602
-
Smart grid data integrity attacks
-
Sep.
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, "Smart grid data integrity attacks," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1244-1253, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1244-1253
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
22
-
-
84880239145
-
On topology attack of a smart grid: Undetectable attacks and countermeasures
-
Jul.
-
J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable attacks and countermeasures," IEEE J. Sel. Areas Commun., vol. 31, no. 7, Jul. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.7
-
-
Kim, J.1
Tong, L.2
-
23
-
-
84155170617
-
On security indices for state estimators in power networks
-
Stockholm, Sweden, Apr.
-
H. Sandberg,A. Teixeira, and K.H. Johansson, "On security indices for state estimators in power networks," in Proc. 1st Workshop on Secure Control Syst. (CPSWEEK 2010), Stockholm, Sweden, Apr. 2010.
-
(2010)
Proc. 1st Workshop on Secure Control Syst. (CPSWEEK 2010)
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
24
-
-
84906703168
-
Data framing attack on state estimation
-
Jul.
-
J. Kim, L. Tong, and R. J. Thomas, "Data framing attack on state estimation," IEEE J. Sel. Areas Commun., vol. 32, no. 7, pp. 1460-1470, Jul. 2014.
-
(2014)
IEEE J. Sel. Areas Commun.
, vol.32
, Issue.7
, pp. 1460-1470
-
-
Kim, J.1
Tong, L.2
Thomas, R.J.3
-
26
-
-
84887278643
-
Attack detection and identification in cyber-physical systems
-
Nov.
-
F. Pasqualetti, F. Dorfler, and F. Bullo, "Attack detection and identification in cyber-physical systems," IEEE Trans. Autom. Control, vol. 58, no. 11, pp. 2715-2729, Nov. 2013.
-
(2013)
IEEE Trans. Autom. Control
, vol.58
, Issue.11
, pp. 2715-2729
-
-
Pasqualetti, F.1
Dorfler, F.2
Bullo, F.3
-
28
-
-
84897621622
-
Impact of data quality on real-time locational marginal price
-
Mar.
-
L. Jia, J. Kim, R. Thomas, and L. Tong, "Impact of data quality on real-time locational marginal price," IEEE Trans. Power Syst., vol. 29, no. 2, pp. 627-636, Mar. 2014.
-
(2014)
IEEE Trans. Power Syst.
, vol.29
, Issue.2
, pp. 627-636
-
-
Jia, L.1
Kim, J.2
Thomas, R.3
Tong, L.4
-
29
-
-
0016480359
-
Bad data analysis for power system state estimation
-
Mar./Apr.
-
E. Handschin, F. C. Schweppe, J. Kohlas, and A. Fiechter, "Bad data analysis for power system state estimation," IEEE Trans. Power App. Syst., vol. PAS-94, no. 2, pp. 329-337, Mar./Apr. 1975.
-
(1975)
IEEE Trans. Power App. Syst.
, vol.PAS-94
, Issue.2
, pp. 329-337
-
-
Handschin, E.1
Schweppe, F.C.2
Kohlas, J.3
Fiechter, A.4
-
30
-
-
0001697792
-
A Bayesian approach to geometric subspace estimation
-
May
-
A. Srivastava, "A Bayesian approach to geometric subspace estimation," IEEE Trans. Signal Process., vol. 48, no. 5, pp. 1390-1400, May 2000.
-
(2000)
IEEE Trans. Signal Process.
, vol.48
, Issue.5
, pp. 1390-1400
-
-
Srivastava, A.1
-
31
-
-
18844440455
-
Covariance, subspace, intrinsic Cramer Rao bounds
-
May
-
S. T. Smith, "Covariance, subspace, intrinsic Cramer Rao bounds," IEEE Trans. Signal Process., vol. 53, no. 5, pp. 1610-1630, May 2005.
-
(2005)
IEEE Trans. Signal Process.
, vol.53
, Issue.5
, pp. 1610-1630
-
-
Smith, S.T.1
-
32
-
-
0001699986
-
Asymptotic theory for principal component analysis
-
T. W. Anderson, "Asymptotic theory for principal component analysis," Ann. Math. Statist., vol. 34, no. 1, pp. 122-148, 1963.
-
(1963)
Ann. Math. Statist.
, vol.34
, Issue.1
, pp. 122-148
-
-
Anderson, T.W.1
-
34
-
-
0003885668
-
-
New York, NY, USA: Springer-Verlag
-
J. Shao, Mathematical Statistics. New York, NY, USA: Springer-Verlag, 2003.
-
(2003)
Mathematical Statistics
-
-
Shao, J.1
|