• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4632649)   Today's Articles (3)   Subscriber (49911)
For: Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. ACTA ACUST UNITED AC 2011. [DOI: 10.1145/1952982.1952995] [Citation(s) in RCA: 570] [Impact Index Per Article: 43.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Number Cited by Other Article(s)
51
Review of Cyber-Physical Attacks in Smart Grids: A System-Theoretic Perspective. ELECTRONICS 2021. [DOI: 10.3390/electronics10101153] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
52
Enhancing Cybersecurity in Smart Grids: False Data Injection and Its Mitigation. ENERGIES 2021. [DOI: 10.3390/en14092657] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
53
Sundaram A, Abdel-Khalik H. Validation of Covert Cognizance Active Defenses. NUCL SCI ENG 2021. [DOI: 10.1080/00295639.2021.1897731] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
54
Benisha RB, Ratna SR. A two-step trace model for the detection of UVI attacks against power grids in the wireless network. Soft comput 2021. [DOI: 10.1007/s00500-020-05520-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
55
Wang X, Luo X, Zhang M, Jiang Z, Guan X. Detection and localization of biased load attacks in smart grids via interval observer. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.12.027] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
56
Confidence-aware collaborative detection mechanism for false data attacks in smart grids. Soft comput 2021. [DOI: 10.1007/s00500-020-05557-5] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
57
Advanced Network Sampling with Heterogeneous Multiple Chains. SENSORS 2021;21:s21051905. [PMID: 33803175 PMCID: PMC7963173 DOI: 10.3390/s21051905] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/26/2021] [Revised: 02/22/2021] [Accepted: 03/03/2021] [Indexed: 12/02/2022]
58
Data trustworthiness signatures for nuclear reactor dynamics simulation. PROGRESS IN NUCLEAR ENERGY 2021. [DOI: 10.1016/j.pnucene.2020.103612] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
59
Coordinated Control of Virtual Power Plants to Improve Power System Short-Term Dynamics. ENERGIES 2021. [DOI: 10.3390/en14041182] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
60
Cyber Attack Detection Scheme for a Load Frequency Control System Based on Dual-Source Data of Compromised Variables. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11041584] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
61
Zhu P, Xun P, Hu Y, Xiong Y. Social Collective Attack Model and Procedures for Large-Scale Cyber-Physical Systems. SENSORS 2021;21:s21030991. [PMID: 33540605 PMCID: PMC7867278 DOI: 10.3390/s21030991] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/12/2020] [Revised: 01/23/2021] [Accepted: 01/26/2021] [Indexed: 11/16/2022]
62
Data Integrity Attack Detection for Node Voltage in Cyber-Physical Power System. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2020. [DOI: 10.1007/s13369-020-04813-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
63
Resilient model-free adaptive control for cyber-physical systems against jamming attack. Neurocomputing 2020. [DOI: 10.1016/j.neucom.2020.04.043] [Citation(s) in RCA: 17] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
64
Resilient decentralized sampled-data H filter design for linear interconnected systems subject to denial-of-service attacks. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.06.038] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
65
Robust localized cyber-attack detection for key equipment in nuclear power plants. PROGRESS IN NUCLEAR ENERGY 2020. [DOI: 10.1016/j.pnucene.2020.103446] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
66
Shen B, Wang Z, Wang D, Li Q. State-Saturated Recursive Filter Design for Stochastic Time-Varying Nonlinear Complex Networks Under Deception Attacks. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2020;31:3788-3800. [PMID: 31725391 DOI: 10.1109/tnnls.2019.2946290] [Citation(s) in RCA: 26] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
67
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. Comput Secur 2020. [DOI: 10.1016/j.cose.2020.101994] [Citation(s) in RCA: 35] [Impact Index Per Article: 8.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/20/2022]
68
Survey of false data injection in smart power grid: Attacks, countermeasures and challenges. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102518] [Citation(s) in RCA: 19] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
69
The Effect of SMiShing Attack on Security of Demand Response Programs. ENERGIES 2020. [DOI: 10.3390/en13174542] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
70
A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems. ENERGIES 2020. [DOI: 10.3390/en13153860] [Citation(s) in RCA: 27] [Impact Index Per Article: 6.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
71
Robustness of Short-Term Wind Power Forecasting against False Data Injection Attacks. ENERGIES 2020. [DOI: 10.3390/en13153780] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
72
Hamedani K, Liu L, Hu S, Ashdown J, Wu J, Yi Y. Detecting Dynamic Attacks in Smart Grids Using Reservoir Computing: A Spiking Delayed Feedback Reservoir Based Approach. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE 2020. [DOI: 10.1109/tetci.2019.2902845] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/09/2022]
73
Yan J, Guo F, Wen C. False data injection against state estimation in power systems with multiple cooperative attackers. ISA TRANSACTIONS 2020;101:225-233. [PMID: 32057420 DOI: 10.1016/j.isatra.2020.02.003] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/10/2019] [Revised: 02/01/2020] [Accepted: 02/01/2020] [Indexed: 06/10/2023]
74
Ship Security Relative Integrated Navigation with Injected Fault Measurement Attack and Unknown Statistical Property Noises. JOURNAL OF MARINE SCIENCE AND ENGINEERING 2020. [DOI: 10.3390/jmse8050305] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
75
Song H, Shi P, Zhang WA, Lim CC, Yu L. Distributed H Estimation in Sensor Networks With Two-Channel Stochastic Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2020;50:465-475. [PMID: 30281505 DOI: 10.1109/tcyb.2018.2865238] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
76
A penalty-based adaptive secure estimation for power systems under false data injection attacks. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2019.08.080] [Citation(s) in RCA: 7] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
77
Lu AY, Yang GH. False data injection attacks against state estimation in the presence of sensor failures. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2019.08.052] [Citation(s) in RCA: 31] [Impact Index Per Article: 7.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
78
Transactive Energy to Thwart Load Altering Attacks on Power Distribution Systems. FUTURE INTERNET 2019. [DOI: 10.3390/fi12010004] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
79
Distributed Control Methods and Impact of Communication Failure in AC Microgrids: A Comparative Review. ELECTRONICS 2019. [DOI: 10.3390/electronics8111265] [Citation(s) in RCA: 23] [Impact Index Per Article: 4.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
80
Mitigating the Impacts of Covert Cyber Attacks in Smart Grids Via Reconstruction of Measurement Data Utilizing Deep Denoising Autoencoders. ENERGIES 2019. [DOI: 10.3390/en12163091] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
81
Security design against stealthy attacks on power system state estimation: A formal approach. Comput Secur 2019. [DOI: 10.1016/j.cose.2019.03.022] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
82
Real Time Security Assessment of the Power System Using a Hybrid Support Vector Machine and Multilayer Perceptron Neural Network Algorithms. SUSTAINABILITY 2019. [DOI: 10.3390/su11133586] [Citation(s) in RCA: 19] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
83
A Novel Detection Algorithm to Identify False Data Injection Attacks on Power System State Estimation. ENERGIES 2019. [DOI: 10.3390/en12112209] [Citation(s) in RCA: 35] [Impact Index Per Article: 7.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
84
Supporting Sustainable Maintenance of Substations under Cyber-Threats: An Evaluation Method of Cybersecurity Risk for Power CPS. SUSTAINABILITY 2019. [DOI: 10.3390/su11040982] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
85
Li B, Lu R, Choo KKR, Wang W, Luo S. On Reliability Analysis of Smart Grids under Topology Attacks. ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS 2019. [DOI: 10.1145/3127021] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
86
Brand M, Babazadeh D, Lehnhoff S, Engel D. Trust in control: a trust model for power system network assessment. EPJ WEB OF CONFERENCES 2019. [DOI: 10.1051/epjconf/201921701008] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/14/2022]  Open
87
Huang X, Dong J. Reliable Control Policy of Cyber-Physical Systems Against a Class of Frequency-Constrained Sensor and Actuator Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2018;48:3432-3439. [PMID: 29994296 DOI: 10.1109/tcyb.2018.2815758] [Citation(s) in RCA: 22] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
88
Hosseini H, Bathaee SMT. Designing three indicators to detect false data injection attacks on smart grid by dynamic state estimation. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2018. [DOI: 10.3233/jifs-161594] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
89
Housh M, Ohar Z. Model-based approach for cyber-physical attack detection in water distribution systems. WATER RESEARCH 2018;139:132-143. [PMID: 29635150 DOI: 10.1016/j.watres.2018.03.039] [Citation(s) in RCA: 9] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/16/2017] [Revised: 03/13/2018] [Accepted: 03/14/2018] [Indexed: 06/08/2023]
90
Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries. Inf Sci (N Y) 2018. [DOI: 10.1016/j.ins.2018.03.056] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
91
Yong SZ, Zhu M, Frazzoli E. Switching and Data Injection Attacks on Stochastic Cyber-Physical Systems. ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS 2018. [DOI: 10.1145/3204439] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
92
Covert Cyber Assault Detection in Smart Grid Networks Utilizing Feature Selection and Euclidean Distance-Based Machine Learning. APPLIED SCIENCES-BASEL 2018. [DOI: 10.3390/app8050772] [Citation(s) in RCA: 20] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
93
Ahmed M, Barkat Ullah ASSM. False Data Injection Attacks in Healthcare. ACTA ACUST UNITED AC 2018. [DOI: 10.1007/978-981-13-0292-3_12] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/25/2023]
94
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems. SENSORS 2018;18:s18020674. [PMID: 29495291 PMCID: PMC5855084 DOI: 10.3390/s18020674] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/29/2017] [Revised: 02/07/2018] [Accepted: 02/15/2018] [Indexed: 11/17/2022]
95
Peng L, Cao X, Sun C, Cheng Y, Jin S. Energy efficient jamming attack schedule against remote state estimation in wireless cyber-physical systems. Neurocomputing 2018. [DOI: 10.1016/j.neucom.2017.07.036] [Citation(s) in RCA: 30] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
96
Xu H, Yu W, Griffith D, Golmie N. A Survey on Industrial Internet of Things: A Cyber-Physical Systems Perspective. IEEE ACCESS : PRACTICAL INNOVATIONS, OPEN SOLUTIONS 2018;6:10.1109/access.2018.2884906. [PMID: 35531371 PMCID: PMC9074819 DOI: 10.1109/access.2018.2884906] [Citation(s) in RCA: 47] [Impact Index Per Article: 7.8] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/20/2023]
97
Giraldo J, Urbina D, Cardenas A, Valente J, Faisal M, Ruths J, Tippenhauer NO, Sandberg H, Candell R. A Survey of Physics-Based Attack Detection in Cyber-Physical Systems. ACM COMPUTING SURVEYS 2018;51:10.1145/3203245. [PMID: 31092968 PMCID: PMC6512826 DOI: 10.1145/3203245] [Citation(s) in RCA: 22] [Impact Index Per Article: 3.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/01/2017] [Accepted: 03/01/2018] [Indexed: 06/09/2023]
98
Wang Z, Anand DM, Moyne J, Tilbury DM. Improved Sensor Fault Detection, Isolation, and Mitigation Using Multiple Observers Approach. INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE 2017;5:70-96. [PMID: 28924303 PMCID: PMC5600308 DOI: 10.1080/21642583.2016.1278410] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
99
Wang L, Wang Z, Huang T, Wei G. An Event-Triggered Approach to State Estimation for a Class of Complex Networks With Mixed Time Delays and Nonlinearities. IEEE TRANSACTIONS ON CYBERNETICS 2016;46:2497-2508. [PMID: 26441463 DOI: 10.1109/tcyb.2015.2478860] [Citation(s) in RCA: 34] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
100
Power system static state estimation using a least winsorized square robust estimator. Neurocomputing 2016. [DOI: 10.1016/j.neucom.2016.05.023] [Citation(s) in RCA: 19] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
PrevPage 2 of 3 123Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA