![]() Singh SK, Khanna K, Bose R et al (2017) Joint-transformation-based detection of false data injection attacks in smart grid. Phadke A, Volskis H, de Moraes RM et al (2008) The wide world of wide-area measurement. Nazir S, Patel S, Patel D (2017) Assessing and augmenting scada cyber security-a survey of techniques. ![]() Mitchell R, Chen IR (2014) A survey of intrusion detection techniques for cyber-physical systems. IEEE J Sel Top Signal Process 12(4):763–776 Liu C, Wu J, Long C et al (2018) Reactance perturbation for detecting and identifying fdi attacks in power system state estimation. Liu X, Li Z, Li Z (2016) Optimal protection strategy against false data injection attacks in power systems. Liu L, Esmalifalak M, Ding Q et al (2014) Detecting false data injection attacks on power grid by sparse optimization. ACM Trans Inform Syst Secur (TISSEC) 14(1):1–33 Liu Y, Ning P, Reiter MK (2011) False data injection attacks against state estimation in electric power grids. Liu X, Li Z (2017) False data attack models, impact analyses and defense strategies in the electricity grid. Liang G, Zhao J, Luo F et al (2016) A review of false data injection attacks against modern power systems. Li S, Yilmaz Y, Wang X (2014) Quickest detection of false data injection attack in wide-area smart grids. Int J Data Min Knowl Manag Process 5(2):1 Hossin M, Sulaiman MN (2015) A review on evaluation metrics for data classification evaluations. In: 2014 7th International symposium on resilient control systems (ISRCS), IEEE, pp 1–8 (2014) Machine learning for power system disturbance and cyber-attack discrimination. Hammer PL, Bonates TO (2006) Logical analysis of data-an overview: From combinatorial optimization to medical applications. Giraldo J, Urbina D, Cardenas A et al (2018) A survey of physics-based attack detection in cyber-physical systems. IEEE Trans Indus Info 13(1):198–207ĭeng R, Xiao G, Lu R et al (2016) False data injection on state estimation in power systems-attacks, impacts, and defense: A survey. IEEE Trans Indust Info 15(3):1619–1628ĭeng R, Xiao G, Lu R (2015) Defending against false data injection attacks on power system state estimation. In: International Conference on Applied Cryptography and Network Security, Springer, pp 156–171ĭeng R, Liang H (2018) False data injection attacks with limited susceptance information and new countermeasures in smart grid. (2019) Design of a fdia resilient protection scheme for power networks by securing minimal sensor set. ĭas TK, Adepu S, Zhou J (2020) Anomaly detection in industrial control systems using logical analysis of data.(2016) A review of cyber security risk assessment methods for scada systems. arXiv:1901.03407Ĭhandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. Ĭhalapathy R, Chawla S (2019) Deep learning for anomaly detection: a survey. IEEE Trans Knowl Data Eng 12(2):292–306Ĭelik ZB, Fernandes E, Pauley E et al (2019) Program analysis of commodity iot applications for security and privacy: Challenges and opportunities. Math Program 79(1):163–190īoros E, Hammer PL, Ibaraki T et al (2000) An implementation of logical analysis of data. īoros E, Hammer PL, Ibaraki T et al (1997) Logical analysis of numerical data. Machine learning for power system disturbance and cyber-attack discrimination. Rutgers The State University of New Jersey-New Brunswickīorges R, Beaver J, Buckner M et al (2014). ![]() IEEE Trans Smart Grid 5(3):1216–1227īonates TO (2007) Optimization in logical analysis of data. Artif Intell 69(1–2):279–305īi S, Zhang YJ (2014) Graphical methods for defense against false-data injection attacks on power system state estimation. Īlmuallim H, Dietterich TG (1994) Learning boolean concepts in the presence of many irrelevant features. Complex Adapt Syst Model 8(1):1–14Īlexe G, Alexe S, Bonates T et al (2007) Logical analysis of data - the vision of peter l. Ahmed M, Pathan ASK (2020) False data injection attack (fdia): an overview and new metrics for fair evaluation of its countermeasure. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |