-
1
-
-
28244488689
-
Causes of the 2003 major grid blackouts in North America and Europe, recommended means to improve system dynamic performance
-
Nov
-
G. Andersson, P. Donalek, R. Farmer, N. Hatziargyriou, I. Kamwa, P. Kundur, N. Martins, J. Paserba, P. Pourbeik, J. Sanchez-Gasca, R. Schulz, A. Stankovic, C. Taylor, and V. Vittal, "Causes of the 2003 major grid blackouts in North America and Europe, recommended means to improve system dynamic performance," IEEE Trans. Power Syst., vol. 20, no. 4, pp. 1922-1928, Nov. 2005.
-
(2005)
IEEE Trans. Power Syst.
, vol.20
, Issue.4
, pp. 1922-1928
-
-
Andersson, G.1
Donalek, P.2
Farmer, R.3
Hatziargyriou, N.4
Kamwa, I.5
Kundur, P.6
Martins, N.7
Paserba, J.8
Pourbeik, P.9
Sanchez-Gasca, J.10
Schulz, R.11
Stankovic, A.12
Taylor, C.13
Vittal, V.14
-
2
-
-
67650109811
-
Safe and secure networked control systems under denial-of-service attacks
-
Berlin/Heidelberg: Springer, April
-
S. Amin, A. Cárdenas, and S. Sastry, "Safe and secure networked control systems under denial-of-service attacks," in Hybrid Systems: Computation and Control, Lecture Notes in Computer Science. Berlin/Heidelberg: Springer, April 2009, pp. 31-45.
-
(2009)
Hybrid Systems: Computation and Control, Lecture Notes in Computer Science
, pp. 31-45
-
-
Amin, S.1
Cárdenas, A.2
Sastry, S.3
-
5
-
-
84866745498
-
A decoupled feedback structure for covertly appropriating networked control systems
-
Milano, Italy, Aug./Sep.
-
R. Smith, "A decoupled feedback structure for covertly appropriating networked control systems," in Proc. 18th IFAC World Congr., Milano, Italy, Aug./Sep. 2011.
-
(2011)
Proc. 18th IFAC World Congr.
-
-
Smith, R.1
-
6
-
-
84860692605
-
Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design
-
Orlando, FL, Dec.
-
F. Pasqualetti, F. Dorfler, and F. Bullo, "Cyber-physical attacks in power networks: Models, fundamental limitations and monitor design," in Proc. 50th IEEE Conf. Decision and Control and European Control Conf., Orlando, FL, Dec. 2011.
-
(2011)
Proc. 50th IEEE Conf. Decision and Control and European Control Conf.
-
-
Pasqualetti, F.1
Dorfler, F.2
Bullo, F.3
-
7
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
New York
-
Y. Liu, M. Reiter, and P. Ning, "False data injection attacks against state estimation in electric power grids," in Proc. 16th ACM Conf. Computer and Communication Security, New York, 2009, pp. 21-32.
-
(2009)
Proc. 16th ACM Conf. Computer and Communication Security
, pp. 21-32
-
-
Liu, Y.1
Reiter, M.2
Ning, P.3
-
8
-
-
84155170617
-
On security indices for state estimators in power networks
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," in 1st Workshop on Secure Control Systems, CPSWEEK, 2010.
-
(2010)
1st Workshop on Secure Control Systems, CPSWEEK
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
9
-
-
84885756672
-
Stealth attacks and protection schemes for state estimators in power systems
-
G. Dan and H. Sandberg, "Stealth attacks and protection schemes for state estimators in power systems," in IEEE SmartGridComm, 2010.
-
(2010)
IEEE SmartGridComm
-
-
Dan, G.1
Sandberg, H.2
-
10
-
-
84857230860
-
Detecting false data injection attacks on dc state estimation
-
R. Bobba, K. Rogers, Q.Wang, H. Khurana, K. Nahrstedt, and T. Overbye, "Detecting false data injection attacks on dc state estimation," in 1st Workshop on Secure Control Systems, CPSWEEK, 2010.
-
(2010)
1st Workshop on Secure Control Systems, CPSWEEK
-
-
Bobba, R.1
Rogers, K.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.6
-
11
-
-
82155162476
-
Malicious data attacks on the smart grid
-
O. Kosut, L. Jia, R. Thomas, and L. Tong, "Malicious data attacks on the smart grid," IEEE Trans. Smart Grid, vol. 2, pp. 645-658, 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.3
Tong, L.4
-
13
-
-
84855833052
-
Smart grid data integrity attacks: Characterizations and countermeasures
-
A. Giani, E. Bitar, M. McQueen, P. Khargonekar, and K. Poolla, "Smart grid data integrity attacks: Characterizations and countermeasures," in IEEE SmartGridComm, 2011.
-
(2011)
IEEE SmartGridComm
-
-
Giani, A.1
Bitar, E.2
McQueen, M.3
Khargonekar, P.4
Poolla, K.5
-
14
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
Jun.
-
T. T. Kim and H. V. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. Smart Grid, vol. 2, pp. 326-333, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
17
-
-
84878284364
-
On the exact solution to a smart grid cyber-security analysis problem
-
Jun.
-
K. C. Sou, H. Sandberg, and K. H. Johansson, "On the exact solution to a smart grid cyber-security analysis problem," IEEE Trans. Smart Grid, vol. 4, no. 2, Jun. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.2
-
-
Sou, K.C.1
Sandberg, H.2
Johansson, K.H.3
-
18
-
-
84864284962
-
Computing critical k-tuples in power networks
-
K. C. Sou, H. Sandberg, and K. H. Johansson, "Computing critical k-tuples in power networks," IEEE Trans. Power Syst., vol. 27, no. 3, pp. 1511-1520, 2012.
-
(2012)
IEEE Trans. Power Syst.
, vol.27
, Issue.3
, pp. 1511-1520
-
-
Sou, K.C.1
Sandberg, H.2
Johansson, K.H.3
-
19
-
-
0027842081
-
Matching pursuit with time-frequency dictionaries
-
S. Mallat and Z. Zhang, "Matching pursuit with time-frequency dictionaries," IEEE Trans. Signal Process., vol. 41, pp. 3397-3415, 1993.
-
(1993)
IEEE Trans. Signal Process.
, vol.41
, pp. 3397-3415
-
-
Mallat, S.1
Zhang, Z.2
-
20
-
-
0032131292
-
Atomic decomposition by basis pursuit
-
S. S. Chen, D. L. Donoho, and M. A. Saunders, "Atomic decomposition by basis pursuit," SIAM J. Scientif. Comput., vol. 20, 1998.
-
(1998)
SIAM J. Scientif. Comput.
, vol.20
-
-
Chen, S.S.1
Donoho, D.L.2
Saunders, M.A.3
-
21
-
-
48449100005
-
Power system extreme event screening using graph partitioning
-
Sep
-
B. Lesieutre, S. Roy, V. Donde, and A. Pinar, "Power system extreme event screening using graph partitioning," in Proc. 38th North American Power Symp. (NAPS 2006), Sep. 2006, pp. 503-510.
-
(2006)
Proc. 38th North American Power Symp. (NAPS 2006)
, pp. 503-510
-
-
Lesieutre, B.1
Roy, S.2
Donde, V.3
Pinar, A.4
-
22
-
-
77951271507
-
-
Lawrence Berkeley National Laboratory, Tech. Rep. LBNL-62142
-
A. Pinar, Y. Fogel, and B. C. Lesieutre, "The Inhibiting Bisection Problem," Lawrence Berkeley National Laboratory, Tech. Rep. LBNL-62142, 2006.
-
(2006)
The Inhibiting Bisection Problem
-
-
Pinar, A.1
Fogel, Y.2
Lesieutre, B.C.3
-
23
-
-
0016480359
-
Bad data analysis for power system state estimation
-
Mar
-
E. Handschin, F. Schweppe, J. Kohlas, and A. Fiechter, "Bad data analysis for power system state estimation," IEEE Trans. Power App. Syst., vol. 94, no. 2, pp. 329-337, Mar. 1975.
-
(1975)
IEEE Trans. Power App. Syst.
, vol.94
, Issue.2
, pp. 329-337
-
-
Handschin, E.1
Schweppe, F.2
Kohlas, J.3
Fiechter, A.4
-
24
-
-
84869427279
-
Optimal power flow: Closing the loop over corrupted data
-
A. Teixeira, H. Sandberg, G. Dan, and K. Johansson, "Optimal power flow: Closing the loop over corrupted data," in Proc. American Control Conf. (ACC), 2012, pp. 3534-3540.
-
(2012)
Proc. American Control Conf. (ACC)
, pp. 3534-3540
-
-
Teixeira, A.1
Sandberg, H.2
Dan, G.3
Johansson, K.4
-
25
-
-
60549094984
-
Optimization models for operative planning in drinking water networks
-
J. Burgschweiger, B. Gnädig, and M. Steinbach, "Optimization models for operative planning in drinking water networks," Optimiz. and Eng., vol. 10, no. 1, pp. 43-73, 2009.
-
(2009)
Optimiz. and Eng.
, vol.10
, Issue.1
, pp. 43-73
-
-
Burgschweiger, J.1
Gnädig, B.2
Steinbach, M.3
-
26
-
-
84866769548
-
Cyber security study of a scada energy management system: Stealthy deception attacks on the state estimator
-
Milan, Italy
-
A. Teixeira, G. Dan, H. Sandberg, and K. H. Johansson, "Cyber security study of a scada energy management system: Stealthy deception attacks on the state estimator," in IFAC World Congr., Milan, Italy, 2011.
-
(2011)
IFAC World Congr.
-
-
Teixeira, A.1
Dan, G.2
Sandberg, H.3
Johansson, K.H.4
-
27
-
-
29144439194
-
Decoding by linear programming
-
Dec
-
E. Candès and T. Tao, "Decoding by linear programming," IEEE Trans. Inform. Theory, vol. 51, no. 12, pp. 4203-4215, Dec. 2005.
-
(2005)
IEEE Trans. Inform. Theory
, vol.51
, Issue.12
, pp. 4203-4215
-
-
Candès, E.1
Tao, T.2
-
28
-
-
0037418225
-
Optimally sparse representation in general (nonorthogonal) dictionaries via l1 minimization
-
[Online]. Available
-
D. L. Donoho andM. Elad (2003). Optimally sparse representation in general (nonorthogonal) dictionaries via l1 minimization. Proc. Nat. Acad. Sci., vol. 100, no. 5, pp. 2197-2202. [Online]. Available: http://www.pnas. org/content/100/5/2197.abstract
-
(2003)
Proc. Nat. Acad. Sci.
, vol.100
, Issue.5
, pp. 2197-2202
-
-
Donoho, D.L.1
Elad, M.2
-
30
-
-
24044465871
-
-
Ph.D. dissertation, Stanford University, Stanford, CA
-
S. McCormick, "A Combinatorial Approach to Some Sparse Matrix Problems," Ph.D. dissertation, Stanford University, Stanford, CA, 1983.
-
(1983)
Combinatorial Approach to Some Sparse Matrix Problems
-
-
McCormicks, S.1
-
31
-
-
33746399416
-
The connectivity of boolean satisfiability: Computational and structural dichotomies
-
P. Gopalan, P. Kolaitis, E.Maneva, and C. Papadimitriou, "The connectivity of boolean satisfiability: Computational and structural dichotomies," Automata, Lang. and Programm., pp. 346-357, 2006.
-
(2006)
Automata, Lang. and Programm.
, pp. 346-357
-
-
Gopalan, P.1
Kolaitis, P.2
Maneva, E.3
Papadimitriou, C.4
-
33
-
-
0031176702
-
A simple min-cut algorithm
-
July
-
M. Stoer and F. Wagner, "A simple min-cut algorithm," J. ACM, vol. 44, pp. 585-591, July 1997.
-
(1997)
J. ACM
, vol.44
, pp. 585-591
-
-
Stoer, M.1
Wagner, F.2
-
34
-
-
0001261128
-
Maximal flow through a network
-
L. Ford and D. Fulkerson, "Maximal flow through a network," Canadian J. Mathemat., vol. 8, pp. 399-404, 1956.
-
(1956)
Canadian J. Mathemat.
, vol.8
, pp. 399-404
-
-
Ford, L.1
Fulkerson, D.2
-
35
-
-
0000095809
-
An analysis of approximations for maximizing submodular set functions i
-
G. Nemhauser, L. Wolsey, and M. Fisher, "An analysis of approximations for maximizing submodular set functions I," Mathemat. Programm., vol. 14, no. 1, pp. 265-294, 1978.
-
(1978)
Mathemat. Programm.
, vol.14
, Issue.1
, pp. 265-294
-
-
Nemhauser, G.1
Wolsey, L.2
Fisher, M.3
-
36
-
-
4344657727
-
-
[Online]. Available
-
R. Christie, Power System Test Case Archive, 1993. [Online]. Available: http://www.ee.washington.edu/research/pstca/pf118/pg-tca118bus.htm
-
(1993)
Power System Test Case Archive
-
-
Christie, R.1
-
37
-
-
79151479984
-
MATPOWER steady-state operations, planning and analysis tools for power systems research and education
-
R. Zimmerman, C. Murillo-Sánchez, and R. Thomas, "MATPOWER steady-state operations, planning and analysis tools for power systems research and education," IEEE Trans. Power Syst., vol. 26, no. 1, pp. 12-19, 2011.
-
(2011)
IEEE Trans. Power Syst.
, vol.26
, Issue.1
, pp. 12-19
-
-
Zimmerman, R.1
Murillo-Sánchez, C.2
Thomas, R.3
-
40
-
-
55049086609
-
Exact and approximate sparse solutions of underdetermined linear equations
-
Oct. [Online] Available:
-
S. Jokar and M. E. Pfetsch (2008, Oct.). Exact and approximate sparse solutions of underdetermined linear equations. SIAM J. Sci. Comput. [Online]. 31(1), pp. 23-44. Available: http://dx.doi.org/10.1137/070686676
-
(2008)
SIAM J. Sci. Comput
, vol.31
, Issue.1
, pp. 23-44
-
-
Jokar, S.1
Pfetsch, M.E.2
-
42
-
-
84937222612
-
-
[Online]. Available
-
CPLEX. [Online]. Available: http://www-01.ibm.com/software/ integration/optimization/cplex-optimizer/
-
-
-
CPLEX1
-
43
-
-
84863506343
-
Network-aware mitigation of data integrity attacks on power system state estimation
-
Jul
-
O. Vuković, K. C. Sou, G. Dán, and H. Sandberg, "Network-aware mitigation of data integrity attacks on power system state estimation," IEEE J. Select. Areas Commun., vol. 30, no. 6, pp. 1108-1118, Jul. 2012.
-
(2012)
IEEE J. Select. Areas Commun.
, vol.30
, Issue.6
, pp. 1108-1118
-
-
Vuković, O.1
Sou, K.C.2
Dán, G.3
Sandberg, H.4
|