-
4
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
Y. Liu, P. Ning, and M. K. Reiter, "False data injection attacks against state estimation in electric power grids, " in Proc. ACM Conf. Comput. Commun. Secur., 2009, pp. 21-32.
-
(2009)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.K.3
-
5
-
-
82155162476
-
Malicious data attacks on the smart grid
-
Dec.
-
O. Kosut, L. Jia, R. J. Thomas, and L. Tong, "Malicious data attacks on the smart grid, " IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 645-658, Dec. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.4
, pp. 645-658
-
-
Kosut, O.1
Jia, L.2
Thomas, R.J.3
Tong, L.4
-
6
-
-
84880239145
-
On topology attack of a smart grid: Undetectable attacks and countermeasures
-
Jul.
-
J. Kim and L. Tong, "On topology attack of a smart grid: Undetectable attacks and countermeasures, " IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1294-1305, Jul. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.7
, pp. 1294-1305
-
-
Kim, J.1
Tong, L.2
-
7
-
-
85028346377
-
A review of false data injection attacks against modern power systems
-
G. Liang, J. Zhao, F. Luo, S. Weller, and Z. Y. Dong, "A review of false data injection attacks against modern power systems, " IEEE Trans. Smart Grid, to be published.
-
IEEE Trans. Smart Grid, to Be Published
-
-
Liang, G.1
Zhao, J.2
Luo, F.3
Weller, S.4
Dong, Z.Y.5
-
8
-
-
70449670540
-
Estimation of faults in DC electrical power system
-
Jun.
-
D. Gorinevsky, S. Boyd, and S. Poll, "Estimation of faults in DC electrical power system, " in Proc. IEEE Conf. Decision Control, Jun. 2009, pp. 4334-4339.
-
(2009)
Proc. IEEE Conf. Decision Control
, pp. 4334-4339
-
-
Gorinevsky, D.1
Boyd, S.2
Poll, S.3
-
10
-
-
84877672644
-
False data injection attacks with incomplete information against smart power grids
-
Dec.
-
M. A. Rahman and H. Mohsenian-Rad, "False data injection attacks with incomplete information against smart power grids, " in Proc. IEEE Conf. Global Commun. (GlobeCom), Dec. 2012, pp. 3153-3158.
-
(2012)
Proc. IEEE Conf. Global Commun. (GlobeCom)
, pp. 3153-3158
-
-
Rahman, M.A.1
Mohsenian-Rad, H.2
-
11
-
-
84155170617
-
On security indices for state estimators in power networks
-
H. Sandberg, A. Teixeira, and K. H. Johansson, "On security indices for state estimators in power networks, " in Proc. 1stWorkshop Secure Control Syst. (CPSWEEK), 2010, pp. 1-6.
-
(2010)
Proc. 1stWorkshop Secure Control Syst. (CPSWEEK)
, pp. 1-6
-
-
Sandberg, H.1
Teixeira, A.2
Johansson, K.H.3
-
12
-
-
84878284364
-
On the exact solution to a smart grid cyber-security analysis problem
-
Jun.
-
K. C. Sou, H. Sandberg, and K. H. Johansson, "On the exact solution to a smart grid cyber-security analysis problem, " IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 856-865, Jun. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.2
, pp. 856-865
-
-
Sou, K.C.1
Sandberg, H.2
Johansson, K.H.3
-
13
-
-
84902302956
-
Fundamental limits of cyberphysical security in smart power grids
-
Florence, Italy, Dec.
-
Y. Zhao, A. Goldsmith, and H. V. Poor, "Fundamental limits of cyberphysical security in smart power grids, " in Proc. 52nd IEEE Conf. Decision Control, Florence, Italy, Dec. 2013, pp. 200-205.
-
(2013)
Proc. 52nd IEEE Conf. Decision Control
, pp. 200-205
-
-
Zhao, Y.1
Goldsmith, A.2
Poor, H.V.3
-
14
-
-
84872133588
-
Bad data injection in smart grid: Attack and defense mechanisms
-
Jan.
-
Y. Huang et al., "Bad data injection in smart grid: Attack and defense mechanisms, " IEEE Commun. Mag., vol. 51, no. 1, pp. 27-33, Jan. 2013.
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.1
, pp. 27-33
-
-
Huang, Y.1
-
15
-
-
85028338928
-
A stealthy attack against electricity market using independent component analysis
-
M. Esmalifalak, H. Nguyen, R. Zheng, L. Xie, L. Song, and Z. Han, "A stealthy attack against electricity market using independent component analysis, " IEEE Syst. J., to be published.
-
IEEE Syst. J., to Be Published
-
-
Esmalifalak, M.1
Nguyen, H.2
Zheng, R.3
Xie, L.4
Song, L.5
Han, Z.6
-
16
-
-
85027932768
-
Detecting false data injection attacks in AC state estimation
-
Sep.
-
G. Chaojun, P. Jirutitijaroen, and M. Motani, "Detecting false data injection attacks in AC state estimation, " IEEE Trans. Smart Grid, vol. 6, no. 5, pp. 2476-2483, Sep. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.5
, pp. 2476-2483
-
-
Chaojun, G.1
Jirutitijaroen, P.2
Motani, M.3
-
17
-
-
84960393299
-
Quickest detection of false data injection attack in wide-area smart grids
-
Nov.
-
S. Li, Y. Yilmaz, and X. Wang, "Quickest detection of false data injection attack in wide-area smart grids, " IEEE Trans. Smart Grid, vol. 6, no. 6, pp. 2725-2735, Nov. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.6
, pp. 2725-2735
-
-
Li, S.1
Yilmaz, Y.2
Wang, X.3
-
18
-
-
84896819685
-
Detecting false data injection attacks on power grid by sparse optimization
-
Mar.
-
L. Liu, M. Esmalifalak, Q. Ding, V. A. Emesih, and Z. Han, "Detecting false data injection attacks on power grid by sparse optimization, " IEEE Trans. Smart Grid, vol. 5, no. 2, pp. 612-621, Mar. 2014.
-
(2014)
IEEE Trans. Smart Grid
, vol.5
, Issue.2
, pp. 612-621
-
-
Liu, L.1
Esmalifalak, M.2
Ding, Q.3
Emesih, V.A.4
Han, Z.5
-
19
-
-
79957758241
-
Modeling load redistribution attacks in power systems
-
Jun.
-
Y. Yuan, Z. Li, and K. Ren, "Modeling load redistribution attacks in power systems, " IEEE Trans. Smart Grid, vol. 2, no. 2, pp. 382-390, Jun. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.2
, pp. 382-390
-
-
Yuan, Y.1
Li, Z.2
Ren, K.3
-
20
-
-
85027933146
-
Modeling of local false data injection attacks with reduced network information
-
Jul.
-
X. Liu, Z. Bao, D. Lu, and Z. Li, "Modeling of local false data injection attacks with reduced network information, " IEEE Trans. Smart Grid, vol. 6, no. 4, pp. 1686-1696, Jul. 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.4
, pp. 1686-1696
-
-
Liu, X.1
Bao, Z.2
Lu, D.3
Li, Z.4
-
21
-
-
84883303602
-
Smart grid data integrity attacks
-
Sep.
-
A. Giani, E. Bitar, M. Garcia, M. McQueen, P. Khargonekar, and K. Poolla, "Smart grid data integrity attacks, " IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1244-1253, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1244-1253
-
-
Giani, A.1
Bitar, E.2
Garcia, M.3
McQueen, M.4
Khargonekar, P.5
Poolla, K.6
-
22
-
-
85027935614
-
Blind false data injection attack using PCA approximation method in smart grid
-
May
-
Z. H. Yu and W. L. Chin, "Blind false data injection attack using PCA approximation method in smart grid, " IEEE Trans. Smart Grid, vol. 6, no. 3, pp. 1219-1226, May 2015.
-
(2015)
IEEE Trans. Smart Grid
, vol.6
, Issue.3
, pp. 1219-1226
-
-
Yu, Z.H.1
Chin, W.L.2
-
23
-
-
39749180953
-
Identification of interacting bad data in the framework of the weighted least square method
-
May
-
G. P. Granelli and M. Montagna, "Identification of interacting bad data in the framework of the weighted least square method, " Electr. Power Syst. Res., vol. 78, no. 5, pp. 806-814, May 2008.
-
(2008)
Electr. Power Syst. Res.
, vol.78
, Issue.5
, pp. 806-814
-
-
Granelli, G.P.1
Montagna, M.2
-
24
-
-
80052043780
-
Communication requirement for reliable and secure state estimation and control in smart grid
-
Sep.
-
H. Li, L. Lai, andW. Zhang, "Communication requirement for reliable and secure state estimation and control in smart grid, " IEEE Trans. Smart Grid, vol. 2, no. 3, pp. 476-486, Sep. 2011.
-
(2011)
IEEE Trans. Smart Grid
, vol.2
, Issue.3
, pp. 476-486
-
-
Li, H.1
Lai, L.2
Zhang, W.3
-
25
-
-
68649096448
-
Tensor decompositions and applications
-
T. G. Kolda and B. W. Bader, "Tensor decompositions and applications, " SIAM Rev., vol. 51, no. 3, pp. 455-500, 2009.
-
(2009)
SIAM Rev.
, vol.51
, Issue.3
, pp. 455-500
-
-
Kolda, T.G.1
Bader, B.W.2
-
26
-
-
70349656252
-
Tensor decompositions, alternating least squares and other tales
-
P. Comon, X. Luciani, and A. L. F. de Almeida, "Tensor decompositions, alternating least squares and other tales, " J. Chemometrics, vol. 23, nos. 7-8, pp. 393-405, 2009.
-
(2009)
J. Chemometrics
, vol.23
, Issue.7-8
, pp. 393-405
-
-
Comon, P.1
Luciani, X.2
De Almeida, A.L.F.3
-
27
-
-
34249802620
-
Fourth-order cumulantbased blind Identification of underdetermined mixtures
-
Jun.
-
L. D. Lathauwer, J. Castaing, and J. F. Cardoso, "Fourth-order cumulantbased blind Identification of underdetermined mixtures, " IEEE Trans. Signal Process., vol. 55, no. 6, pp. 2965-2973, Jun. 2007.
-
(2007)
IEEE Trans. Signal Process.
, vol.55
, Issue.6
, pp. 2965-2973
-
-
Lathauwer, L.D.1
Castaing, J.2
Cardoso, J.F.3
-
28
-
-
0031102203
-
Sparse signal reconstruction from limited data using FOCUSS: A re-weighted minimum norm algorithm
-
Mar.
-
I. F. Gorodnitsky and B. D. Rao, "Sparse signal reconstruction from limited data using FOCUSS: A re-weighted minimum norm algorithm, " IEEE Trans. Signal Process., vol. 45, no. 3, pp. 600-616, Mar. 1997.
-
(1997)
IEEE Trans. Signal Process.
, vol.45
, Issue.3
, pp. 600-616
-
-
Gorodnitsky, I.F.1
Rao, B.D.2
-
29
-
-
58649101394
-
Improved FOCUSS method with conjugate gradient iterations
-
Jan.
-
Z. He et al., "Improved FOCUSS method with conjugate gradient iterations, " IEEE Trans. Signal Process., vol. 57, no. 1, pp. 399-404, Jan. 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.1
, pp. 399-404
-
-
He, Z.1
-
30
-
-
85027949137
-
Convergence analysis of the FOCUSS algorithm
-
Mar.
-
K. Xie, Z. He, and A. Cichocki, "Convergence analysis of the FOCUSS algorithm, " IEEE Trans. Neural Netw. Learn. Syst., vol. 26, no. 3, pp. 601-613, Mar. 2015.
-
(2015)
IEEE Trans. Neural Netw. Learn. Syst.
, vol.26
, Issue.3
, pp. 601-613
-
-
Xie, K.1
He, Z.2
Cichocki, A.3
-
31
-
-
84855772737
-
-
University ofWashington. Apr.
-
University ofWashington. (Apr. 2011). Power Systems Test Case Archives. [Online]. Available: http://www.ee. washington. edu/research/pstca/
-
(2011)
Power Systems Test Case Archives
-
-
-
33
-
-
33750405289
-
Security issues in SCADAnetworks
-
Oct.
-
V. M. Igure, S. A. Laughter, and R. D. Williams, "Security issues in SCADAnetworks, " Comput. Secur., vol. 25, no. 7, pp. 498-506, Oct. 2006.
-
(2006)
Comput. Secur.
, vol.25
, Issue.7
, pp. 498-506
-
-
Igure, V.M.1
Laughter, S.A.2
Williams, R.D.3
-
34
-
-
0034648432
-
The N-way toolbox forMATLAB
-
C. A. Andersson and R. Bro, "The N-way toolbox forMATLAB, " Chemo-metrics Intell. Lab. Syst., vol. 52, no. 1, pp. 1-4, 2000.
-
(2000)
Chemo-metrics Intell. Lab. Syst.
, vol.52
, Issue.1
, pp. 1-4
-
-
Andersson, C.A.1
Bro, R.2
-
35
-
-
85028297351
-
-
The N-Way Toolbox for MATLAB. [Online]. Available: http://www.models. life. ku. dk/source/nwaytoolbox/
-
The N-Way Toolbox for MATLAB
-
-
|