Malicious Data Attacks on the Smart Grid
暂无分享,去创建一个
Lang Tong | Robert J. Thomas | Oliver Kosut | Liyan Jia | L. Tong | O. Kosut | Liyan Jia | R. Thomas
[1] Henrik Sandberg,et al. Stealth Attacks and Protection Schemes for State Estimators in Power Systems , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[2] Gene H. Golub,et al. Matrix computations , 1983 .
[3] William H. Cunningham. On submodular function minimization , 1985, Comb..
[4] Amir Dembo,et al. Large Deviations Techniques and Applications , 1998 .
[5] Bruno Sinopoli,et al. False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[6] Martin Grötschel,et al. The ellipsoid method and its consequences in combinatorial optimization , 1981, Comb..
[7] Klara Nahrstedt,et al. Detecting False Data Injection Attacks on DC State Estimation , 2010 .
[8] Fred C. Schweppe,et al. Power System Static-State Estimation, Part I: Exact Model , 1970 .
[9] S. Kourouklis,et al. A Large Deviation Result for the Likelihood Ratio Statistic in Exponential Families , 1984 .
[10] A. Ott. Experience with PJM market operation, system design, and implementation , 2003 .
[11] Karl Henrik Johansson,et al. On Security Indices for State Estimators in Power Networks , 2010 .
[12] E. Handschin,et al. Bad data analysis for power system state estimation , 1975, IEEE Transactions on Power Apparatus and Systems.
[13] M. Ribbens-Pavella,et al. Bad Data Identification Methods In Power System State Estimation-A Comparative Study , 1985, IEEE Transactions on Power Apparatus and Systems.
[14] G. Krumpholz,et al. Power System Observability: A Practical Algorithm Using Network Topology , 1980, IEEE Transactions on Power Apparatus and Systems.
[15] A. G. Expósito,et al. Power system state estimation : theory and implementation , 2004 .
[16] A. Monticelli,et al. Electric power system state estimation , 2000, Proceedings of the IEEE.
[17] Lamine Mili,et al. Identification of multiple interacting bad data via power system decomposition , 1996 .
[18] Tongxin Zheng,et al. Ex Post Pricing in the Co-Optimized Energy and Reserve Market , 2006, IEEE Transactions on Power Systems.
[19] Neri Merhav,et al. When is the generalized likelihood ratio test optimal? , 1992, IEEE Trans. Inf. Theory.
[20] Lang Tong,et al. Limiting false data attacks on power system state estimation , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).
[21] Lang Tong,et al. On malicious data attacks on power system state estimation , 2010, 45th International Universities Power Engineering Conference UPEC2010.
[22] David Hutchison,et al. The Magic WAND-functional overview , 1998, IEEE J. Sel. Areas Commun..
[23] Stephen Boyd,et al. Estimation of faults in DC electrical power system , 2009, 2009 American Control Conference.
[24] Peng Ning,et al. False data injection attacks against state estimation in electric power grids , 2011, TSEC.
[25] Alexander Schrijver,et al. A Combinatorial Algorithm Minimizing Submodular Functions in Strongly Polynomial Time , 2000, J. Comb. Theory, Ser. B.
[26] Bernard C. Levy,et al. Principles of Signal Detection and Parameter Estimation , 2008 .
[27] L. Tong,et al. Malicious Data Attacks on Smart Grid State Estimation: Attack Strategies and Countermeasures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[28] Tongxin Zheng,et al. Ex post pricing in the co-optimized energy and reserve market , 2012, 2012 IEEE Power and Energy Society General Meeting.