-
1
-
-
0033881588
-
Electric power system state estimation
-
Feb
-
A. Monticelli, "Electric power system state estimation," Proc. IEEE, vol. 88, no. 2, pp. 262-282, Feb. 2000.
-
(2000)
Proc. IEEE
, vol.88
, Issue.2
, pp. 262-282
-
-
Monticelli, A.1
-
2
-
-
79959856672
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids," ACM Trans. Inf. Syst. Security, vol. 14, no. 1, pp. 1-33, 2011.
-
(2011)
ACM Trans. Inf. Syst. Security
, vol.14
, Issue.1
, pp. 1-33
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
3
-
-
85032751507
-
Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions
-
Sep
-
S. Cui et al., "Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions," IEEE Signal Process. Mag., vol. 29, no. 5, pp. 106-115, Sep. 2012.
-
(2012)
IEEE Signal Process. Mag.
, vol.29
, Issue.5
, pp. 106-115
-
-
Cui, S.1
-
4
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid," IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
5
-
-
84880239145
-
On topology attack of a smart grid: Undetectable attacks and countermeasures
-
Jul
-
J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable attacks and countermeasures," IEEE J. Select. Areas Commun., vol. 31, no. 7, pp. 1294-1305, Jul. 2013.
-
(2013)
IEEE J. Select. Areas Commun.
, vol.31
, Issue.7
, pp. 1294-1305
-
-
Kim, J.1
Tong, L.2
-
6
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
Jun
-
Y. Y. Ling, L. Z. Yi, and R. Kui, "Modeling load redistribution attacks in power systems," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Ling, Y.Y.1
Yi, L.Z.2
Kui, R.3
-
7
-
-
84155170617
-
On security indices for state estimators in power networks
-
Stockholm, Sweden, Apr
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks," presented at the 1st Workshop Secure Control System (CPSWEEK), Stockholm, Sweden, Apr. 2010.
-
(2010)
1st Workshop Secure Control System (CPSWEEK)
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
8
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
Jun
-
T. T. Kim and H. V. Poor, "Strategic protection against data injection attacks on power grids," IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 326-333, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
9
-
-
84896819685
-
Detecting false data injection attacks on power grid by sparse optimization
-
Mar
-
L. C. Liu, M. Esmalifalak, Q. F. Ding, V. A. Emesih, and H. Zhu, "Detecting false data injection attacks on power grid by sparse optimization," IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 612-621, Mar. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.2
, pp. 612-621
-
-
Liu, L.C.1
Esmalifalak, M.2
Ding, Q.F.3
Emesih, V.A.4
Zhu, H.5
-
10
-
-
84857951113
-
Topology perturbation for detecting malicious data injection
-
Maui, HI, USA
-
K. L. Morrow, E. Heine, K. M. Rogers, R. B. Bobba, and T. J. Overbye, "Topology perturbation for detecting malicious data injection," in Proc. 45th Syst. Sci. Conf., Maui, HI, USA, 2012, pp. 2104-2113.
-
(2012)
Proc. 45th Syst. Sci. Conf.
, pp. 2104-2113
-
-
Morrow, K.L.1
Heine, E.2
Rogers, K.M.3
Bobba, R.B.4
Overbye, T.J.5
-
11
-
-
84877672644
-
False data injection attacks with incomplete information against smart power grids
-
Anaheim, CA, USA
-
M. A. Rahman and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart power grids," in Proc. IEEE GLOBECOM, Anaheim, CA, USA, 2012, pp. 3153-3158.
-
(2012)
Proc. IEEE GLOBECOM
, pp. 3153-3158
-
-
Rahman, M.A.1
Mohsenian-Rad, H.2
-
12
-
-
84857230860
-
Detecting false data injection attacks on DC state estimation
-
Stockholm, Sweden
-
R. B. Bobba, K. M. Rogers, Q. Wang, H. Khurana, and T. J. Overbye, "Detecting false data injection attacks on DC state estimation," in Proc. 1st Workshop Secure Control Syst., Stockholm, Sweden, 2010, pp. 226-231.
-
(2010)
Proc. 1st Workshop Secure Control Syst.
, pp. 226-231
-
-
Bobba, R.B.1
Rogers, K.M.2
Wang, Q.3
Khurana, H.4
Overbye, T.J.5
-
13
-
-
84883303602
-
Smart grid data integrity attacks
-
Sep
-
A. Giani et al., "Smart grid data integrity attacks," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1244-1253, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1244-1253
-
-
Giani, A.1
-
15
-
-
85032781120
-
State estimation in electric power grids: Meeting new challenges presented by the requirements of the future grid
-
Sep
-
Y.-F. Huang, S. Werner, J. Huang, N. Kashyap, and V. Gupta, "State estimation in electric power grids: Meeting new challenges presented by the requirements of the future grid," IEEE Signal Process. Mag., vol. 29, no. 5, pp. 33-43, Sep. 2012.
-
(2012)
IEEE Signal Process. Mag.
, vol.29
, Issue.5
, pp. 33-43
-
-
Huang, Y.-F.1
Werner, S.2
Huang, J.3
Kashyap, N.4
Gupta, V.5
-
16
-
-
0015159258
-
Bad data suppression in power system state estimation
-
Nov
-
H. M. Merrill and F. C. Schweppe, "Bad data suppression in power system state estimation," IEEE Trans. Power App. Syst., vol. PAS-90, no. 6, pp. 2718-2725, Nov. 1971.
-
(1971)
IEEE Trans. Power App. Syst.
, vol.PAS-90
, Issue.6
, pp. 2718-2725
-
-
Merrill, H.M.1
Schweppe, F.C.2
-
17
-
-
77949601382
-
Secure control against replay attacks
-
Monticello, IL, USA
-
Y. Mo and B. Sinopoli, "Secure control against replay attacks," in Proc. 47th Annu. Conf. Commun. Control Comput. Allerton, Monticello, IL, USA, 2009, pp. 911-918.
-
(2009)
Proc. 47th Annu. Conf. Commun. Control Comput. Allerton
, pp. 911-918
-
-
Mo, Y.1
Sinopoli, B.2
-
18
-
-
70350712145
-
Forecasting-aided state estimation-Part I: Panorama
-
Nov
-
M. B. Do Coutto Filho and J. C. S. de Souza, "Forecasting-aided state estimation-Part I: Panorama," IEEE Trans. Power Syst., vol. 24, no. 4, pp. 1667-1678, Nov. 2009.
-
(2009)
IEEE Trans. Power Syst.
, vol.24
, Issue.4
, pp. 1667-1678
-
-
Do Coutto Filho, M.B.1
De Souza, J.C.S.2
-
19
-
-
84956863896
-
PMU based robust dynamic state estimation method for power systems
-
Bari, Italy
-
J. B. Zhao, G. X. Zhang, and M. L. Scala, "PMU based robust dynamic state estimation method for power systems," in Proc. IEEE Power Eng. Soc. Gen. Meeting, Bari, Italy, 2015, pp. 26-30.
-
(2015)
Proc. IEEE Power Eng. Soc. Gen. Meeting
, pp. 26-30
-
-
Zhao, J.B.1
Zhang, G.X.2
Scala, M.L.3
-
20
-
-
52349099245
-
Modeling future cyber-physical energy systems
-
Pittsburgh, PA, USA
-
M. D. Ilic, L. Xie, U. A. Khan, and J. M. F. Moura, "Modeling future cyber-physical energy systems," in Proc. Power Energy Soc. Gen. Meeting, Pittsburgh, PA, USA, 2008, pp. 1-9.
-
(2008)
Proc. Power Energy Soc. Gen. Meeting
, pp. 1-9
-
-
Ilic, M.D.1
Xie, L.2
Khan, U.A.3
Moura, J.M.F.4
-
21
-
-
84892571479
-
State estimation and voltage/VAR control in distribution network with intermittent measurements
-
Jan
-
S. Deshmukh, N. Balasubramaniam, and A. Pahwa, "State estimation and voltage/VAR control in distribution network with intermittent measurements," IEEE Trans. Smart Grid, vol. 5, no. 1, pp. 200-209, Jan. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.1
, pp. 200-209
-
-
Deshmukh, S.1
Balasubramaniam, N.2
Pahwa, A.3
-
22
-
-
84906789522
-
Enhanced bad data processing by phasoraided state estimation
-
Sep
-
M. B. Do Coutto Filho, J. C. Stacchini de Souza, and M. A. R. Guimaraens, "Enhanced bad data processing by phasoraided state estimation," IEEE Trans. Power Syst., vol. 29, no. 5, pp. 2200-2209, Sep. 2014.
-
(2014)
IEEE Trans. Power Syst.
, vol.29
, Issue.5
, pp. 2200-2209
-
-
Do Coutto Filho, M.B.1
Souza De Stacchini, J.C.2
Guimaraens, M.A.R.3
-
23
-
-
84956867480
-
Multistage phasoraided bad data detection and identification
-
Denver, CO, USA, Jul.
-
J. Zhao, G. X. Zhang, M. L. Scala, and J. H. Zhang, "Multistage phasoraided bad data detection and identification," in Proc. IEEE Power Eng. Soc. Gen. Meeting, Denver, CO, USA, Jul. 2015, pp. 1-5.
-
(2015)
Proc. IEEE Power Eng. Soc. Gen. Meeting
, pp. 1-5
-
-
Zhao, J.1
Zhang, G.X.2
Scala, M.L.3
Zhang, J.H.4
-
24
-
-
84921722849
-
New robust estimators of correlation and weighted basis pursuit
-
Feb
-
P. Tamburello and L. Mili, "New robust estimators of correlation and weighted basis pursuit," IEEE Trans. Signal Process., vol. 63, no. 4, pp. 882-894, Feb. 2015.
-
(2015)
IEEE Trans. Signal Process.
, vol.63
, Issue.4
, pp. 882-894
-
-
Tamburello, P.1
Mili, L.2
-
25
-
-
84890924970
-
State summation for detecting false data attack on smart grid
-
May
-
Y. C. Li and Y. L. Wang, "State summation for detecting false data attack on smart grid," Int. J. Elect. Power Energy Syst., vol. 57, pp. 156-163, May 2014.
-
(2014)
Int. J. Elect. Power Energy Syst.
, vol.57
, pp. 156-163
-
-
Li, Y.C.1
Wang, Y.L.2
-
26
-
-
77953719713
-
Limiting false data attacks on power system state estimation
-
Princeton, NJ, USA
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Limiting false data attacks on power system state estimation," in Proc. 44th Annu. Conf. Inf. Sci. Syst., Princeton, NJ, USA, 2010, pp. 1-6.
-
(2010)
Proc. 44th Annu. Conf. Inf. Sci. Syst.
, pp. 1-6
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
27
-
-
0039884906
-
The distribution of non-negative quadratic forms in normal variables
-
J. Sheil and I. O?Muircheartaigh, "The distribution of non-negative quadratic forms in normal variables," J. Royal Stat. Soc. Ser. C (Appl. Stat.), vol. 26, no. 1, pp. 92-98, 1977.
-
(1977)
J. Royal Stat. Soc. Ser. C (Appl. Stat.)
, vol.26
, Issue.1
, pp. 92-98
-
-
Sheil, J.1
O'Muircheartaigh, I.2
-
29
-
-
85027711814
-
-
IEEE Standard for Synchrophasor Measurements for Power Systems, IEEE Standard C37.118.2005, Dec. 2011
-
IEEE Standard for Synchrophasor Measurements for Power Systems, IEEE Standard C37.118.2005, Dec. 2011.
-
-
-
-
30
-
-
84886401577
-
An estimation fusion method for including phasor measurements into power system real-time modeling
-
May
-
A. S. Costa, A. Albuquerque, and D. Bez, "An estimation fusion method for including phasor measurements into power system real-time modeling," IEEE Trans. Power Syst., vol. 28, no. 2, pp. 1910-1920, May 2013.
-
(2013)
IEEE Trans. Power Syst.
, vol.28
, Issue.2
, pp. 1910-1920
-
-
Costa, A.S.1
Albuquerque, A.2
Bez, D.3
-
31
-
-
84874748664
-
Bad data detection in two-stage state estimation using phasor measurements
-
Berlin, Germany
-
A. Tarali and A. Abur, "Bad data detection in two-stage state estimation using phasor measurements," in Proc. 3rd IEEE PES Innov. Smart Grid Technol. Conf., Berlin, Germany, 2012, pp. 1-8.
-
(2012)
Proc. 3rd IEEE PES Innov. Smart Grid Technol. Conf.
, pp. 1-8
-
-
Tarali, A.1
Abur, A.2
-
32
-
-
85027701090
-
-
Bonneville Power Administration. (2011). Wind Generation Total Load in the BPA Balancing Authority
-
Bonneville Power Administration. (2011). Wind Generation Total Load in the BPA Balancing Authority. [Online]. Available: http://transmission.bpa.gov/business/operations/wind
-
-
-
-
33
-
-
0037292302
-
Non-dominated sorting genetic algorithm for optimal phasor measurement placement
-
Feb
-
B. Milosevic and M. Begovic, "Non-dominated sorting genetic algorithm for optimal phasor measurement placement," IEEE Trans. Power Syst., vol. 18, no. 1, pp. 69-75, Feb. 2003.
-
(2003)
IEEE Trans. Power Syst.
, vol.18
, Issue.1
, pp. 69-75
-
-
Milosevic, B.1
Begovic, M.2
-
34
-
-
84870591459
-
Cyber attacks on power system state estimation through topology errors
-
San Diego, CA, USA
-
A. Aditya and M. Govindarasu, "Cyber attacks on power system state estimation through topology errors," in Proc. IEEE Power Eng. Soc. Gen. Meeting, San Diego, CA, USA, 2012, pp. 1-8.
-
(2012)
Proc. IEEE Power Eng. Soc. Gen. Meeting
, pp. 1-8
-
-
Aditya, A.1
Govindarasu, M.2
-
35
-
-
84954527190
-
Through the eye of the PLC: Semantic security monitoring for industrial processes
-
Los Angeles, CA, USA
-
D. Had?ziosmanović, R. Sommer, E. Zambon, and P. H. Hartel, "Through the eye of the PLC: Semantic security monitoring for industrial processes," in Proc. 30th Annu. Comput. Security Appl. Conf., Los Angeles, CA, USA, 2014, pp. 126-135.
-
(2014)
Proc. 30th Annu. Comput. Security Appl. Conf.
, pp. 126-135
-
-
Hadziosmanović, D.1
Sommer, R.2
Zambon, E.3
Hartel, P.H.4
|