[1] Wang Wenye, Lu Zhuo. Cyber security in the smart grid: Survey and challenges[J]. Computer Networks, 2013, 57(5):1344-1371
[2] Farhangi H. The path of the smart grid[J]. IEEE Power & Energy Magazine, 2010, 8(1):18-28
[3] Liu Yao, Ning Peng, Reiter M K. False data injection attacks against state estimation in electric power grids[J]. Trans on Information and System Security, 2011, 14(1): 1–33
[4] Esmalifalak Mohammad, Han Zhu, Song Lingyang. Effect of stealthy bad data injection on network congestion in market based power system[C] //Proc of the IEEE Wireless Communications and Networking Conf. Piscataway, NJ: IEEE, 2012: 2468–2472
[5] Yuan Yanling, Li Zuyi, Ren Kui. Modeling load redistribution attacks in power systems[J]. IEEE Trans on Smart Grid, 2011, 2(2): 382-390
[6] Rahman Md Ashfaqur, H Mohsenian-Rad. False data injection attacks with incomplete information against smart power grids[C] //Proc of IEEE Global Communications Conf. Piscataway, NJ: IEEE, 2013: 3153-3158
[7] Liu Xuan, Bao Zhen, Lu Dan, et al. Modeling of local false data injection attacks with reduced network information[J]. IEEE Trans on Smart Grid, 2017, 6(4): 1686-1696
[8] Yuan Yanling, Li Zuyi, Ren Kui. Quantitative analysis of load redistribution attacks in power systems[J]. IEEE Trans on Parallel & Distributed Systems, 2012, 23(9): 1731-1738
[9] Liang, Gaoqi, S R Weller, Zhao Junhua, et al. The 2015 Ukraine blackout: Implications for false data injection attacks[J]. IEEE Trans on Power Systems, 2017, 32(4): 3317-3318
[10] Li Xu, Liang Xiaohui, Lu Rongxing, et al. Securing smart grid: Cyber attacks, countermeasures, and challenges[J]. Communications Magazine IEEE, 2012, 50(8): 38-45
[11] Rob Shein, Security measures for advanced metering infrastructure components[C] //Proc of IEEE Asia-Pacific Power and Energy Engineering Conf(APPEEC). Piscataway, NJ: IEEE, 2010: 1–3
[12] Mo Yilin, Kim H J, Brancik K, et al. Cyber–physical security of a smart grid infrastructure[C] //Proc of the IEEE. Piscataway, NJ: IEEE, 2011: 195-209
[13] A Nicholson, S Webber, S Dyer, et al. Scada security in the light of cyber-warfare[J]. Computers & Security, 2012, 31(4): 418-436
[14] Pang Zhonghua, Liu Guoping, Zhou Donghua, et al. Two-channel false data injection attacks against output tracking control of networked systems[J]. IEEE Trans on Industrial Electronics, 2016, 63(5): 3242-3251
[15] Mohsenian-Rad A H, Leon-Garcia A. Distributed internet-based load altering attacks against smart power grids[J]. IEEE Trans on Smart Grid, 2011, 2(4): 667-674
[16] Li Weize, Xie Lun, Deng Zulan, et al. False sequential logic attack on scada system and its physical impact analysis[J]. Computers & Security, 2016, 58: 149-159
[17] Shepard Daniel P, Humphreys Todd E, Fansler Aaron A. Evaluation of the vulnerability of phasor measurement units to gps spoofing attacks[J]. Int Journal of Critical Infrastructure Protection, 2012, 5(3/4): 146-153
[18] Li Wen Tai, Wen Chaokai, Chen Jung-chieh, et al. Location identification of power line outages using PMU measurements with bad data[J]. IEEE Trans on Power Systems, 2015, 31(5):1-10
[19] Kim Jinsub, Lang Tong, Robert J Thomas. Data framing attack on state estimation[J]. IEEE Journal on Selected Areas in Communications, 2014, 32(7): 1460-1470
[20] Mohammad Ashiqur Rahman,Ehab Al-Shaer,Rajesh Kavasseri. Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid[C] //Proc of Int Conf on Distributed Computing Systems. Piscataway, NJ: IEEE, 2014: 649-659
[21] Dae-Hyun Choi, Le Xie. Ramp-induced data attacks on look-ahead dispatch in real-time power markets[J]. IEEE Trans on Smart Grid, 2013, 4(3): 1235-1243
[22] Le Xie, Mo Yilin, Sinopoli B. Integrity data attacks in power market operations[J]. IEEE Trans on Smart Grid, Dec. 2011, 2(4): 659–666
[23] Saurabh Amin, Galina A Schwartz, Alvaro A Cardenas, et al. Game-theoretic models of electricity theft detection in smart utility networks: Providing new capabilities with advanced metering infrastructure[J]. IEEE Control Systems, 2015, 35(1): 66-81
[24] Suleiman, Husam, Alqassem Israa, Diabat A, et al. Integrated smart grid systems security threat model[J]. Information Systems, 2015, 53: 147-160
[25] Jain Peeyush, Tripathi Paritosh. Scada security:A review and enhancement for dnp3 based systems[J]. Csi Trans on Ict, 2013, 1(4): 301-308
[26] Teodor Sommestad, Mathias Ekstedt, Lars Nordstrom. Modeling security of power communication systems using defense graphs and influence diagrams[J]. IEEE Trans. Power Del, 2009, 24(4): 1801–1808
[27] Liu Ting, Sun Yanan, Liu Yang, et al. Abnormal traffic-indexed state estimation: Acyber–physical fusion approach for smart grid attack detection[J]. Future Generation Computer Systems, 2014, 49(48): 94-103
|