-
1
-
-
0033881588
-
Electric power system state estimation
-
Feb
-
A. Monticelli, "Electric power system state estimation, " Proc. IEEE, vol. 88, no. 2, pp. 262-282, Feb. 2000.
-
(2000)
Proc. IEEE
, vol.88
, Issue.2
, pp. 262-282
-
-
Monticelli, A.1
-
2
-
-
63049104286
-
Supervisory control and data acquisition system (SCADA) based customized remote terminal unit (RTU) for distribution automation system
-
Dec
-
M. M. Ahmed, and W. L. Soo, "Supervisory control and data acquisition system (SCADA) based customized remote terminal unit (RTU) for distribution automation system, " in Proc. IEEE 2nd Int. Power Energy Conf. (PECon), Dec. 2008, pp. 1655-1660.
-
(2008)
Proc. IEEE 2nd Int. Power Energy Conf. (PECon
, pp. 1655-1660
-
-
Ahmed, M.M.1
Soo, W.L.2
-
4
-
-
65749094394
-
A unified approach for the optimal PMU location for power system state estimation
-
May
-
N. H. Abbasy, and H. M. Ismail, "A unified approach for the optimal PMU location for power system state estimation, " IEEE Trans. Power Syst, vol. 24, no. 2, pp. 806-813, May 2009.
-
(2009)
IEEE Trans. Power Syst
, vol.24
, Issue.2
, pp. 806-813
-
-
Abbasy, N.H.1
Ismail, H.M.2
-
5
-
-
27144507926
-
PMU placement and data processing in WAMS that complements SCADA
-
Jun
-
M. Anjia, Y. Jiaxi, and G. Zhizhong, "PMU placement and data processing in WAMS that complements SCADA, " in Proc. IEEE Power Eng. Soc. General Meeting, Jun. 2005, pp. 780-783.
-
(2005)
Proc. IEEE Power Eng. Soc. General Meeting
, pp. 780-783
-
-
Anjia, M.1
Jiaxi, Y.2
Zhizhong, G.3
-
6
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " in Proc. 16th ACM Conf. Comput. Commun. Secur. (CCS), 2009, pp. 1-12.
-
(2009)
Proc. 16th ACM Conf. Comput. Commun. Secur. (CCS
, pp. 1-12
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
7
-
-
84894537318
-
On false data-injection attacks against power system state estimation: Modeling and countermeasures
-
Mar
-
Q. Yang, J. Yang, W. Yu, D. An, N. Zhang, and W. Zhao, "On false data-injection attacks against power system state estimation: Modeling and countermeasures, " IEEE Trans. Parallel Distrib. Syst, vol. 25, no. 3, pp. 717-729, Mar. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst
, vol.25
, Issue.3
, pp. 717-729
-
-
Yang, Q.1
Yang, J.2
Yu, W.3
An, D.4
Zhang, N.5
Zhao, W.6
-
8
-
-
84964896253
-
On false data injection attacks against Kalman filtering in power system dynamic state estimation
-
Jun
-
Q. Yang, L. Chang, and W. Yu, "On false data injection attacks against Kalman filtering in power system dynamic state estimation, " Secur. Commun. Netw, vol. 9, no. 9, pp. 833-849, Jun. 2016.
-
(2016)
Secur. Commun. Netw
, vol.9
, Issue.9
, pp. 833-849
-
-
Yang, Q.1
Chang, L.2
Yu, W.3
-
9
-
-
84861506150
-
On false data injection attacks against distributed energy routing in smart grid
-
Apr
-
J. Lin, W. Yu, X. Yang, G. Xu, and W. Zhao, "On false data injection attacks against distributed energy routing in smart grid, " in Proc. 3rd ACM/IEEE Int. Conf. Cyber-Phys. Syst. (ICCPS), Apr. 2012, pp. 183-192.
-
(2012)
Proc. 3rd ACM/ IEEE Int. Conf. Cyber-Phys. Syst. (ICCPS
, pp. 183-192
-
-
Lin, J.1
Yu, W.2
Yang, X.3
Xu, G.4
Zhao, W.5
-
10
-
-
84961720902
-
Towards multistep electricity prices in smart grid electricity markets
-
Jan
-
J. Lin, W. Yu, and X. Yang, "Towards multistep electricity prices in smart grid electricity markets, " IEEE Trans. Parallel Distrib. Syst, vol. 27, no. 1, pp. 286-302, Jan. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst
, vol.27
, Issue.1
, pp. 286-302
-
-
Lin, J.1
Yu, W.2
Yang, X.3
-
11
-
-
85013441181
-
Data integrity attacks against the distributed real-Time pricing in the smart grid
-
Dec
-
X. Yang, X. Zhang, J. Lin, W. Yu, X. Fu, and W. Zhao, "Data integrity attacks against the distributed real-Time pricing in the smart grid, " in Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC), Dec. 2016, pp. 1-8.
-
(2016)
Proc. IEEE Int. Perform. Comput. Commun. Conf. (IPCCC
, pp. 1-8
-
-
Yang, X.1
Zhang, X.2
Lin, J.3
Yu, W.4
Fu, X.5
Zhao, W.6
-
12
-
-
85018906264
-
On data integrity attacks against optimal power flow in power grid systems
-
Jan
-
Q. Yang, Y. Liu, W. Yu, D. An, X. Yang, and J. Lin, "On data integrity attacks against optimal power flow in power grid systems, " in Proc. Annu. IEEE Consum. Commun. Netw. Conf. (CCNC), Jan. 2017, pp. 1-2.
-
(2017)
Proc. Annu. IEEE Consum. Commun. Netw. Conf. (CCNC
, pp. 1-2
-
-
Yang, Q.1
Liu, Y.2
Yu, W.3
An, D.4
Yang, X.5
Lin, J.6
-
13
-
-
77950991737
-
Current situation and development of the methods on bad-data detection and identification of power system
-
L. Liu, D.-H. Zhai, and X.-L. Jiang, "Current situation and development of the methods on bad-data detection and identification of power system, " Power Syst. Protection Control, vol. 38, no. 5, pp. 143-152, 2010.
-
(2010)
Power Syst. Protection Control
, vol.38
, Issue.5
, pp. 143-152
-
-
Liu, L.1
Zhai, D.-H.2
Jiang, X.-L.3
-
14
-
-
84155170617
-
On security indices for state estimators in power networks
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks, " in Proc. 1st Int. Workshop Secure Control Syst. (SCS), 2010, pp. 1-6.
-
(2010)
Proc. 1st Int. Workshop Secure Control Syst. (SCS
, pp. 1-6
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
15
-
-
84878284364
-
On the exact solution to a smart grid cyber-security analysis problem
-
Jun
-
K. C. Sou, H. Sandberg, and K. H. Johansson, "On the exact solution to a smart grid cyber-security analysis problem, " IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 856-865, Jun. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.2
, pp. 856-865
-
-
Sou, K.C.1
Sandberg, H.2
Johansson, K.H.3
-
16
-
-
84933060970
-
Efficient computations of a security index for false data attacks in power networks
-
Dec
-
J. M. Hendrickx, K. H. Johansson, R. M. Jungers, H. Sandberg, and K. C. Sou, "Efficient computations of a security index for false data attacks in power networks, " IEEE Trans. Autom. Control, vol. 59, no. 12, pp. 3194-3208, Dec. 2014.
-
(2014)
IEEE Trans. Autom. Control
, vol.59
, Issue.12
, pp. 3194-3208
-
-
Hendrickx, J.M.1
Johansson, K.H.2
Jungers, R.M.3
Sandberg, H.4
Sou, K.C.5
-
17
-
-
84943749886
-
Sparse malicious false data injection attacks and defense mechanisms in smart grids
-
Oct
-
J. Hao, R. J. Piechocki, D. Kaleshi, W. H. Chin, and Z. Fan, "Sparse malicious false data injection attacks and defense mechanisms in smart grids, " IEEE Trans. Ind. Informat, vol. 11, no. 5, pp. 1-5, Oct. 2015.
-
(2015)
IEEE Trans. Ind. Informat
, vol.11
, Issue.5
, pp. 1-5
-
-
Hao, J.1
Piechocki, R.J.2
Kaleshi, D.3
Chin, W.H.4
Fan, Z.5
-
18
-
-
84906700148
-
Security of fully distributed power system state estimation: Detection and mitigation of data integrity attacks
-
Jul
-
O. Vuković, and G. Dán, "Security of fully distributed power system state estimation: Detection and mitigation of data integrity attacks, " IEEE J. Sel. Areas Commun, vol. 32, no. 7, pp. 1500-1508, Jul. 2014.
-
(2014)
IEEE J. Sel. Areas Commun
, vol.32
, Issue.7
, pp. 1500-1508
-
-
Vuković, O.1
Dán, G.2
-
19
-
-
84981543761
-
Towards a low-cost remote memory attestation for the smart grid
-
Aug
-
X. Yang, et al., "Towards a low-cost remote memory attestation for the smart grid, " Sensors, vol. 15, no. 8, pp. 20799-20824, Aug. 2015.
-
(2015)
Sensors
, vol.15
, Issue.8
, pp. 20799-20824
-
-
Yang, X.1
-
20
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
Jun
-
T. T. Kim, and H. V. Poor, "Strategic protection against data injection attacks on power grids, " IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
21
-
-
85015246554
-
Toward a Gaussianmixture model-based detection scheme against data integrity attacks in the smart grid
-
Feb
-
X. Yang, P. Zhao, X. Zhang, J. Lin, and W. Yu, "Toward a Gaussianmixture model-based detection scheme against data integrity attacks in the smart grid, " IEEE Internet Things J, vol. 4, no. 1, pp. 147-161, Feb. 2017.
-
(2017)
IEEE Internet Things J
, vol.4
, Issue.1
, pp. 147-161
-
-
Yang, X.1
Zhao, P.2
Zhang, X.3
Lin, J.4
Yu, W.5
-
22
-
-
84919339871
-
An integrated detection system against false data injection attacks in the smart grid
-
Jan
-
W. Yu, D. Griffith, L. Ge, S. Bhattarai, and N. Golmie, "An integrated detection system against false data injection attacks in the smart grid, " Secur. Commun. Netw, vol. 8, no. 2, pp. 91-109, Jan. 2015.
-
(2015)
Secur. Commun. Netw
, vol.8
, Issue.2
, pp. 91-109
-
-
Yu, W.1
Griffith, D.2
Ge, L.3
Bhattarai, S.4
Golmie, N.5
-
23
-
-
84908240712
-
Unified PMU placement for observability and bad data detection in state estimation
-
Nov
-
B. Gou, and R. G. Kavasseri, "Unified PMU placement for observability and bad data detection in state estimation, " IEEE Trans. Power Syst, vol. 29, no. 6, pp. 2573-2580, Nov. 2014.
-
(2014)
IEEE Trans. Power Syst
, vol.29
, Issue.6
, pp. 2573-2580
-
-
Gou, B.1
Kavasseri, R.G.2
-
24
-
-
78149462230
-
A secure decentralized data-centric information infrastructure for smart grid
-
Nov
-
Y.-J. Kim, M. Thottan, V. Kolesnikov, and W. Lee, "A secure decentralized data-centric information infrastructure for smart grid, " IEEE Commun. Mag, vol. 48, no. 11, pp. 58-65, Nov. 2010.
-
(2010)
IEEE Commun. Mag
, vol.48
, Issue.11
, pp. 58-65
-
-
Kim, Y.-J.1
Thottan, M.2
Kolesnikov, V.3
Lee, W.4
-
25
-
-
84992337631
-
Towards optimal PMU placement against data integrity attacks in smart grid
-
Mar
-
Q. Yang, R. Min, D. An, W. Yu, and X. Yang, "Towards optimal PMU placement against data integrity attacks in smart grid, " in Proc. Annu. Conf. Inf. Sci. Syst. (CISS), Mar. 2016, pp. 54-58.
-
(2016)
Proc. Annu. Conf. Inf. Sci. Syst. (CISS
, pp. 54-58
-
-
Yang, Q.1
Min, R.2
An, D.3
Yu, W.4
Yang, X.5
-
26
-
-
85018890620
-
-
U.S. Patent 6 Nov. 2
-
D. A. Reid, et al., "Energy management system, " U.S. Patent 6 813 525, Nov. 2, 2004.
-
(2004)
Energy Management System
, vol.813
, pp. 525
-
-
Reid, D.A.1
-
27
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
28
-
-
84857230860
-
Detecting false data injection attacks on DC state estimation
-
R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, K. Nahrstedt, and T. J. Overbye, "Detecting false data injection attacks on DC state estimation, " in Proc. 1st Workshop Secure Control Syst., 2010, pp. 1-9.
-
(2010)
Proc. 1st Workshop Secure Control Syst
, pp. 1-9
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Nahrstedt, K.5
Overbye, T.J.6
-
30
-
-
84860701003
-
Electric power network security analysis via minimum cut relaxation
-
Dec
-
K. C. Sou, H. Sandberg, and K. H. Johansson, "Electric power network security analysis via minimum cut relaxation, " in Proc. 50th IEEE Conf. Decision Control Eur. Control Conf. (CDC-ECC), Dec. 2011, pp. 4054-4059.
-
(2011)
Proc. 50th IEEE Conf. Decision Control Eur. Control Conf. (CDC-ECC
, pp. 4054-4059
-
-
Sou, K.C.1
Sandberg, H.2
Johansson, K.H.3
-
31
-
-
85027935614
-
Blind false data injection attack using PCA approximation method in smart grid
-
May
-
Z.-H. Yu, and W.-L. Chin, "Blind false data injection attack using PCA approximation method in smart grid, " IEEE Trans. Smart Grid, vol. 6, no. 3, pp. 1219-1226, May 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.3
, pp. 1219-1226
-
-
Yu, Z.-H.1
Chin, W.-L.2
-
32
-
-
84903274319
-
Local load redistribution attacks in power systems with incomplete network information
-
Jul
-
X. Liu, and Z. Li, "Local load redistribution attacks in power systems with incomplete network information, " IEEE Trans. Smart Grid, vol. 5, no. 4, pp. 1665-1676, Jul. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.4
, pp. 1665-1676
-
-
Liu, X.1
Li, Z.2
-
33
-
-
84922470041
-
Cyber security analysis of power networks by hypergraph cut algorithms
-
Nov
-
Y. Yamaguchi, A. Ogawa, A. Takeda, and S. Iwata, "Cyber security analysis of power networks by hypergraph cut algorithms, " in Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm), Nov. 2014, pp. 824-829.
-
(2014)
Proc. IEEE Int. Conf. Smart Grid Commun. (SmartGridComm
, pp. 824-829
-
-
Yamaguchi, Y.1
Ogawa, A.2
Takeda, A.3
Iwata, S.4
-
34
-
-
0003533365
-
A MATLAB power system simulation package
-
Ithaca NY, USA, Tech. Rep
-
R. D. Zimmerman, C. E. Murillo-Sánchez, and D. D. Gan, "A MATLAB power system simulation package, " Manual, Power Syst. Eng. Res. Center, Ithaca NY, USA, Tech. Rep. 1, 1997.
-
(1997)
Manual, Power Syst. Eng. Res. Center
, vol.1
-
-
Zimmerman, R.D.1
Murillo-Sánchez, C.E.2
Gan, D.D.3
-
35
-
-
27844462056
-
Phasor measurement unit placement techniques for complete and incomplete observability
-
Oct
-
R. F. Nuqui, and A. G. Phadke, "Phasor measurement unit placement techniques for complete and incomplete observability, " IEEE Trans. Power Del, vol. 20, no. 4, pp. 2381-2388, Oct. 2005.
-
(2005)
IEEE Trans. Power Del
, vol.20
, Issue.4
, pp. 2381-2388
-
-
Nuqui, R.F.1
Phadke, A.G.2
-
36
-
-
84910637800
-
Resilience analysis of power grids under the sequential attack
-
Dec
-
Y. Zhu, J. Yan, Y. Tang, Y. L. Sun, and H. He, "Resilience analysis of power grids under the sequential attack, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 12, pp. 2340-2354, Dec. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.12
, pp. 2340-2354
-
-
Zhu, Y.1
Yan, J.2
Tang, Y.3
Sun, Y.L.4
He, H.5
-
37
-
-
84903302626
-
Detecting integrity attacks on SCADA systems
-
Jul
-
Y. Mo, R. Chabukswar, and B. Sinopoli, "Detecting integrity attacks on SCADA systems, " IEEE Trans. Control Syst. Technol, vol. 22, no. 4, pp. 1396-1407, Jul. 2014.
-
(2014)
IEEE Trans. Control Syst. Technol
, vol.22
, Issue.4
, pp. 1396-1407
-
-
Mo, Y.1
Chabukswar, R.2
Sinopoli, B.3
-
38
-
-
84960413145
-
Forecasting-Aided imperfect false data injection attacks against power system nonlinear state estimation
-
Jan
-
J. Zhao, G. Zhang, Z. Y. Dong, and K. P. Wong, "Forecasting-Aided imperfect false data injection attacks against power system nonlinear state estimation, " IEEE Trans. Smart Grid, vol. 7, no. 1, pp. 6-8, Jan. 2016.
-
(2016)
IEEE Trans. Smart Grid
, vol.7
, Issue.1
, pp. 6-8
-
-
Zhao, J.1
Zhang, G.2
Dong, Z.Y.3
Wong, K.P.4
-
39
-
-
84960393299
-
Quickest detection of false data injection attack in wide-Area smart grids
-
Nov
-
S. Li, Y. Yilmaz, and X. Wang, "Quickest detection of false data injection attack in wide-Area smart grids, " IEEE Trans. Smart Grid, vol. 6, no. 6, pp. 2725-2735, Nov. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.6
, pp. 2725-2735
-
-
Li, S.1
Yilmaz, Y.2
Wang, X.3
-
40
-
-
84963934385
-
An efficient data-driven clustering technique to detect attacks in SCADA systems
-
May
-
A. Almalawi, A. Fahad, Z. Tari, A. Alamri, A. Y. Zomaya, and R. AlGhamdi, "An efficient data-driven clustering technique to detect attacks in SCADA systems, " IEEE Trans. Inf. Forensics Security, vol. 11, no. 5, pp. 893-906, May 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.11
, Issue.5
, pp. 893-906
-
-
Almalawi, A.1
Fahad, A.2
Tari, Z.3
Alamri, A.4
Zomaya, A.Y.5
AlGhamdi, R.6
-
41
-
-
84928820166
-
Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for smart grid attack detection
-
T. Liu, et al., "Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for smart grid attack detection, " Future Generat. Comput. Syst, vol. 49, no. 48, pp. 94-103, 2015.
-
(2015)
Future Generat. Comput. Syst
, vol.49
, Issue.48
, pp. 94-103
-
-
Liu, T.1
-
42
-
-
84896974419
-
Extended distributed state estimation: A detection method against tolerable false data injection attacks in smart grids
-
D. Wang, X. Guan, T. Gu, C. Shen, and Z. Xu, "Extended distributed state estimation: A detection method against tolerable false data injection attacks in smart grids, " Energies, vol. 7, no. 3, pp. 1517-1538, 2014.
-
(2014)
Energies
, vol.7
, Issue.3
, pp. 1517-1538
-
-
Wang, D.1
Guan, X.2
Gu, T.3
Shen, C.4
Xu, Z.5
-
43
-
-
79959926889
-
Optimal PMU placement method for complete topological and numerical observability of power system
-
Sep
-
R. Sodhi, S. C. Srivastava, and S. N. Singh, "Optimal PMU placement method for complete topological and numerical observability of power system, " Electr. Power Syst. Res, vol. 80, no. 9, pp. 1154-1159, Sep. 2010.
-
(2010)
Electr. Power Syst. Res
, vol.80
, Issue.9
, pp. 1154-1159
-
-
Sodhi, R.1
Srivastava, S.C.2
Singh, S.N.3
-
44
-
-
84860830285
-
Optimal placement of PMUs with limited number of channels
-
Sep
-
Z. Miljanić, I. Djurović, and I. Vujošević, "Optimal placement of PMUs with limited number of channels, " Electr. Power Syst. Res, vol. 90, pp. 93-98, Sep. 2012.
-
(2012)
Electr. Power Syst. Res
, vol.90
, pp. 93-98
-
-
Miljanić, Z.1
Djurović, I.2
Vujošević, I.3
-
45
-
-
33847645050
-
Placement of PMUs to enable bad data detection in state estimation
-
Nov
-
J. Chen, and A. Abur, "Placement of PMUs to enable bad data detection in state estimation, " IEEE Trans. Power Syst, vol. 21, no. 4, pp. 1608-1615, Nov. 2006.
-
(2006)
IEEE Trans. Power Syst
, vol.21
, Issue.4
, pp. 1608-1615
-
-
Chen, J.1
Abur, A.2
-
46
-
-
84906948800
-
Phasor measurement unit selection for unobservable electric power data integrity attack detection
-
Sep
-
A. Giani, R. Bent, and F. Pan, "Phasor measurement unit selection for unobservable electric power data integrity attack detection, " Int. J. Critical Infrastruct. Protection, vol. 7, no. 3, pp. 155-164, Sep. 2014.
-
(2014)
Int. J. Critical Infrastruct. Protection
, vol.7
, Issue.3
, pp. 155-164
-
-
Giani, A.1
Bent, R.2
Pan, F.3
|