• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4619882)   Today's Articles (185)   Subscriber (49404)
For: Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. ACTA ACUST UNITED AC 2011. [DOI: 10.1145/1952982.1952995] [Citation(s) in RCA: 570] [Impact Index Per Article: 43.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
Number Cited by Other Article(s)
1
Kumar K, Kumar P, Kar S, Bohre AK. Anomaly detection technique for securing microgrid against false data attacks. ISA TRANSACTIONS 2024:S0019-0578(24)00370-7. [PMID: 39127554 DOI: 10.1016/j.isatra.2024.07.037] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/05/2024] [Revised: 07/28/2024] [Accepted: 07/28/2024] [Indexed: 08/12/2024]
2
Achaal B, Adda M, Berger M, Ibrahim H, Awde A. Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges. CYBERSECURITY 2024;7:10. [PMID: 38707764 PMCID: PMC11062904 DOI: 10.1186/s42400-023-00200-w] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/08/2023] [Accepted: 12/12/2023] [Indexed: 05/07/2024]
3
Wan Y, Cao J. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks. SENSORS (BASEL, SWITZERLAND) 2023;23:4013. [PMID: 37112353 PMCID: PMC10145193 DOI: 10.3390/s23084013] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/14/2023] [Revised: 04/08/2023] [Accepted: 04/13/2023] [Indexed: 06/19/2023]
4
Cheng Z, Ren H, Qin J, Lu R. Security Analysis for Dynamic State Estimation of Power Systems With Measurement Delays. IEEE TRANSACTIONS ON CYBERNETICS 2023;53:2087-2096. [PMID: 34543217 DOI: 10.1109/tcyb.2021.3108884] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
5
Wang J, Deng X, Guo J, Zeng Z. Resilient Consensus Control for Multi-Agent Systems: A Comparative Survey. SENSORS (BASEL, SWITZERLAND) 2023;23:2904. [PMID: 36991618 PMCID: PMC10054319 DOI: 10.3390/s23062904] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/23/2022] [Revised: 03/01/2023] [Accepted: 03/05/2023] [Indexed: 06/19/2023]
6
Xia W, Zhang Y. Resilient Distributed Estimation Against FDI Attacks: A Correntropy-based Approach. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2023.03.136] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/30/2023]
7
A Comprehensive Survey on Machine Learning-Based Intrusion Detection Systems for Secure Communication in Internet of Things. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2023. [DOI: 10.1155/2023/8981988] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 01/28/2023]
8
Ma Y, Sun S. Distributed Optimal and Self-Tuning Filters Based on Compressed Data for Networked Stochastic Uncertain Systems with Deception Attacks. SENSORS (BASEL, SWITZERLAND) 2022;23:335. [PMID: 36616933 PMCID: PMC9823696 DOI: 10.3390/s23010335] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/23/2022] [Revised: 12/16/2022] [Accepted: 12/19/2022] [Indexed: 06/17/2023]
9
Tian J, Wang B, Wang Z, Cao K, Li J, Ozay M. Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems. IEEE TRANSACTIONS ON CYBERNETICS 2022;52:13699-13713. [PMID: 34797772 DOI: 10.1109/tcyb.2021.3125345] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
10
Datadriven false data injection attacks against cyber-physical power systems. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102836] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
11
Lee C. Observability Decomposition-Based Decentralized Kalman Filter and Its Application to Resilient State Estimation under Sensor Attacks. SENSORS (BASEL, SWITZERLAND) 2022;22:6909. [PMID: 36146255 PMCID: PMC9502392 DOI: 10.3390/s22186909] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/16/2022] [Revised: 09/04/2022] [Accepted: 09/08/2022] [Indexed: 06/16/2023]
12
Tozzi MG, Tam VWY, Evangelista A, Chinelli C, Haddad A, Soares C. Drivers for increasing attractiveness of commercial centers. INTERNATIONAL JOURNAL OF CONSTRUCTION MANAGEMENT 2022. [DOI: 10.1080/15623599.2022.2120592] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
13
Chen Y, Hayawi K, Zhao Q, Mou J, Yang L, Tang J, Li Q, Wen H. Vector Auto-Regression-Based False Data Injection Attack Detection Method in Edge Computing Environment. SENSORS (BASEL, SWITZERLAND) 2022;22:6789. [PMID: 36146137 PMCID: PMC9502790 DOI: 10.3390/s22186789] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/05/2022] [Revised: 08/27/2022] [Accepted: 08/29/2022] [Indexed: 06/16/2023]
14
Data recovery via covert cognizance for unattended operational resilience. PROGRESS IN NUCLEAR ENERGY 2022. [DOI: 10.1016/j.pnucene.2022.104317] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
15
Detection Scheme for Tampering Behavior on Distributed Controller of Electric-Thermal Integrated Energy System Based on Relation Network. COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE 2022;2022:9594267. [PMID: 36065363 PMCID: PMC9440793 DOI: 10.1155/2022/9594267] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/13/2022] [Revised: 07/26/2022] [Accepted: 08/02/2022] [Indexed: 11/22/2022]
16
Chen X, Hu C, Tian E, Peng C. Event-based fuzzy resilient control of nonlinear DC Microgrids under denial-of-service attacks. ISA TRANSACTIONS 2022;127:206-215. [PMID: 35525605 DOI: 10.1016/j.isatra.2022.04.019] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/25/2021] [Revised: 03/17/2022] [Accepted: 04/12/2022] [Indexed: 06/14/2023]
17
Yang Y, Chen D, Yue W, Liu Q. Secure predictor-based neural dynamic surface control of nonlinear cyber-physical systems against sensor and actuator attacks. ISA TRANSACTIONS 2022;127:120-132. [PMID: 35304004 DOI: 10.1016/j.isatra.2022.02.030] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/25/2021] [Revised: 02/16/2022] [Accepted: 02/16/2022] [Indexed: 06/14/2023]
18
Real-Time Locational Detection of Stealthy False Data Injection Attack in Smart Grid: Using Multivariate-Based Multi-Label Classification Approach. ENERGIES 2022. [DOI: 10.3390/en15145312] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
19
Anil DA, Aydin BO, Demir Y, Turkmenoglu B. Design, synthesis, biological evaluation and molecular docking studies of novel 1H-1,2,3-Triazole derivatives as potent inhibitors of carbonic anhydrase, acetylcholinesterase and aldose reductase. J Mol Struct 2022. [DOI: 10.1016/j.molstruc.2022.132613] [Citation(s) in RCA: 20] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
20
An effective intrusion-resilient mechanism for programmable logic controllers against data tampering attacks. COMPUT IND 2022. [DOI: 10.1016/j.compind.2022.103613] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
21
Detection and Prevention of False Data Injection Attacks in the Measurement Infrastructure of Smart Grids. SUSTAINABILITY 2022. [DOI: 10.3390/su14116407] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/01/2023]
22
Gaggero GB, Caviglia R, Armellin A, Rossi M, Girdinio P, Marchese M. Detecting Cyberattacks on Electrical Storage Systems through Neural Network Based Anomaly Detection Algorithm. SENSORS (BASEL, SWITZERLAND) 2022;22:3933. [PMID: 35632342 PMCID: PMC9145903 DOI: 10.3390/s22103933] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/19/2022] [Revised: 05/17/2022] [Accepted: 05/21/2022] [Indexed: 11/16/2022]
23
CAE: Contextual auto-encoder for multivariate time-series anomaly detection in air transportation. Comput Secur 2022. [DOI: 10.1016/j.cose.2022.102652] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
24
False Data Injection Detection for Phasor Measurement Units. SENSORS 2022;22:s22093146. [PMID: 35590835 PMCID: PMC9105009 DOI: 10.3390/s22093146] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/17/2022] [Revised: 03/25/2022] [Accepted: 04/02/2022] [Indexed: 12/03/2022]
25
He N, Ma K, Li R. Toward Optimal False Data Injection Attack against Self‐Triggered Model Predictive Controllers. ADVANCED THEORY AND SIMULATIONS 2022. [DOI: 10.1002/adts.202200025] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]
26
Sundaram A, Li Y, Abdel-Khalik H. Denoising Algorithm for Subtle Anomaly Detection. NUCL TECHNOL 2022. [DOI: 10.1080/00295450.2022.2027147] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
27
Reachability-Based False Data Injection Attacks and Defence Mechanisms for Cyberpower System. ENERGIES 2022. [DOI: 10.3390/en15051754] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]
28
Earth-Mover-Distance-Based Detection of False Data Injection Attacks in Smart Grids. ENERGIES 2022. [DOI: 10.3390/en15051733] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
29
Digital Twin—Cyber Replica of Physical Things: Architecture, Applications and Future Research Directions. FUTURE INTERNET 2022. [DOI: 10.3390/fi14020064] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/04/2023]  Open
30
Malik H, Alotaibi MA, Almutairi A. Cyberattacks identification in IEC 61850 based substation using proximal support vector machine. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2022. [DOI: 10.3233/jifs-189783] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/09/2023]
31
Li Y, Sundaram A, Abdel-Khalik HS, Talbot PW. Real-Time Monitoring for Detection of Adversarial Subtle Process Variations. NUCL SCI ENG 2022. [DOI: 10.1080/00295639.2021.1997041] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
32
Zhao Z, Huang Y, Zhen Z, Li Y. Data-Driven False Data-Injection Attack Design and Detection in Cyber-Physical Systems. IEEE TRANSACTIONS ON CYBERNETICS 2021;51:6179-6187. [PMID: 32086230 DOI: 10.1109/tcyb.2020.2969320] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
33
Wang XL. Optimal Attack Strategy Against Fault Detectors for Linear Cyber-Physical Systems. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.09.042] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
34
Hu Y, Zhu P, Xun P, Liu B, Kang W, Xiong Y, Shi W. CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102465] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
35
Effective Energy Management via False Data Detection Scheme for the Interconnected Smart Energy Hub–Microgrid System under Stochastic Framework. SUSTAINABILITY 2021. [DOI: 10.3390/su132111836] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
36
A novel secure observer-based controller and attack detection scheme for Networked Control Systems. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.06.012] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
37
Krause T, Ernst R, Klaer B, Hacker I, Henze M. Cybersecurity in Power Grids: Challenges and Opportunities. SENSORS 2021;21:s21186225. [PMID: 34577432 PMCID: PMC8473297 DOI: 10.3390/s21186225] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/24/2021] [Revised: 09/10/2021] [Accepted: 09/14/2021] [Indexed: 12/31/2022]
38
Cyber Risks to Critical Smart Grid Assets of Industrial Control Systems. ENERGIES 2021. [DOI: 10.3390/en14175501] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
39
Tian M, Dong Z, Wang X. Analysis of false data injection attacks in power systems: A dynamic Bayesian game-theoretic approach. ISA TRANSACTIONS 2021;115:108-123. [PMID: 33461739 DOI: 10.1016/j.isatra.2021.01.011] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/26/2020] [Revised: 12/28/2020] [Accepted: 01/06/2021] [Indexed: 06/12/2023]
40
Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102326] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
41
A Network Parameter Database False Data Injection Correction Physics-Based Model: A Machine Learning Synthetic Measurement-Based Approach. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11178074] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
42
Almasabi S, Alsuwian T, Javed E, Irfan M, Jalalah M, Aljafari B, Harraz FA. A Novel Technique to Detect False Data Injection Attacks on Phasor Measurement Units. SENSORS 2021;21:s21175791. [PMID: 34502682 PMCID: PMC8434066 DOI: 10.3390/s21175791] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/15/2021] [Revised: 08/10/2021] [Accepted: 08/23/2021] [Indexed: 11/25/2022]
43
Advancements and Research Trends in Microgrids Cybersecurity. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11167363] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
44
Attack Categorisation for IoT Applications in Critical Infrastructures, a Survey. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11167228] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/26/2022]
45
State-of-the-Art of Optimal Active and Reactive Power Flow: A Comprehensive Review from Various Standpoints. Processes (Basel) 2021. [DOI: 10.3390/pr9081319] [Citation(s) in RCA: 14] [Impact Index Per Article: 4.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]  Open
46
A Bi-Level Model for Detecting and Correcting Parameter Cyber-Attacks in Power System State Estimation. APPLIED SCIENCES-BASEL 2021. [DOI: 10.3390/app11146540] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
47
An Artificial Intelligence Empowered Cyber Physical Ecosystem for Energy Efficiency and Occupation Health and Safety. ENERGIES 2021. [DOI: 10.3390/en14144214] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
48
A Deep Learning-Based Classification Scheme for False Data Injection Attack Detection in Power System. ELECTRONICS 2021. [DOI: 10.3390/electronics10121459] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
49
On the security of ANN-based AC state estimation in smart grid. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102265] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
50
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control. ELECTRONICS 2021. [DOI: 10.3390/electronics10101171] [Citation(s) in RCA: 19] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 3 123Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA