Graph theoretical defense mechanisms against false data injection attacks in smart grids
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Graph theoretical defense mechanisms against false data injection attacks in smart grids
Authors
Keywords
Smart grids, False data injection, Attack, Minimum Steiner tree problem
Journal
Journal of Modern Power Systems and Clean Energy
Volume 6, Issue 5, Pages 860-871
Publisher
Springer Nature America, Inc
Online
2018-09-06
DOI
10.1007/s40565-018-0432-2
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Deep Learning Based Interval State Estimation of AC Smart Grids against Sparse Cyber Attacks
- (2018) Huaizhi Wang et al. IEEE Transactions on Industrial Informatics
- An Adaptive Markov Strategy for Defending Smart Grid False Data Injection From Malicious Attackers
- (2018) Jianye Hao et al. IEEE Transactions on Smart Grid
- False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey
- (2017) Ruilong Deng et al. IEEE Transactions on Industrial Informatics
- A Review of False Data Injection Attacks Against Modern Power Systems
- (2017) Gaoqi Liang et al. IEEE Transactions on Smart Grid
- Optimal Protection Strategy Against False Data Injection Attacks in Power Systems
- (2017) Xuan Liu et al. IEEE Transactions on Smart Grid
- Two betweenness centrality measures based on Randomized Shortest Paths
- (2016) Ilkka Kivimäki et al. Scientific Reports
- Machine Learning Methods for Attack Detection in the Smart Grid
- (2016) Mete Ozay et al. IEEE Transactions on Neural Networks and Learning Systems
- Forecasting-Aided Imperfect False Data Injection Attacks Against Power System Nonlinear State Estimation
- (2016) Junbo Zhao et al. IEEE Transactions on Smart Grid
- Impact analysis of false data injection attacks on power system static security assessment
- (2016) Jiongcong CHEN et al. Journal of Modern Power Systems and Clean Energy
- Identification of vulnerable node clusters against false data injection attack in an AMI based Smart Grid
- (2015) Adnan Anwar et al. INFORMATION SYSTEMS
- Modeling of Local False Data Injection Attacks With Reduced Network Information
- (2015) Xuan Liu et al. IEEE Transactions on Smart Grid
- Blind False Data Injection Attack Using PCA Approximation Method in Smart Grid
- (2015) Zong-Han Yu et al. IEEE Transactions on Smart Grid
- A Real-Time Attack Localization Algorithm for Large Power System Networks Using Graph-Theoretic Techniques
- (2015) Thomas R. Nudell et al. IEEE Transactions on Smart Grid
- Security of Fully Distributed Power System State Estimation: Detection and Mitigation of Data Integrity Attacks
- (2014) Ognjen Vukovic et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation
- (2014) Suzhi Bi et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation
- (2014) Suzhi Bi et al. IEEE Transactions on Smart Grid
- On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures
- (2013) Qingyu Yang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Steiner Tree Approximation via Iterative Randomized Rounding
- (2013) Jarosław Byrka et al. JOURNAL OF THE ACM
- Malicious Data Attacks on the Smart Grid
- (2011) Oliver Kosut et al. IEEE Transactions on Smart Grid
- Strategic Protection Against Data Injection Attacks on Power Grids
- (2011) Tùng T. Kim et al. IEEE Transactions on Smart Grid
- MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education
- (2010) Ray Daniel Zimmerman et al. IEEE TRANSACTIONS ON POWER SYSTEMS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started