최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기IEEE transactions on information forensics and security, v.14 no.10, 2019년, pp.2765 - 2777
Ahmed, Saeed (University of Ulsan, Ulsan, South Korea) , Lee, Youngdoo (University of Ulsan, Ulsan, South Korea) , Hyun, Seung-Ho (University of Ulsan, Ulsan, South Korea) , Koo, Insoo (University of Ulsan, Ulsan, South Korea)
Being one of the most multifaceted cyber-physical systems, smart grids (SGs) are arguably more prone to cyber-threats. A covert data integrity assault (CDIA) on a communications network may be lethal to the reliability and safety of SG operations. They are intelligently designed to sidestep the trad...
Fadlullah, Z. M., Fouda, M. M., Kato, N., Xuemin Shen, Nozaki, Y.. An early warning system against malicious activities for smart grid communications. IEEE network, vol.25, no.5, 50-55.
Yichi Zhang, Lingfeng Wang, Weiqing Sun, Green, Robert C., Alam, M.. Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE transactions on smart grid, vol.2, no.4, 796-808.
Premaratne, Upeka Kanchana, Samarabandu, Jagath, Sidhu, Tarlochan S, Beresh, Robert, Jian-Cheng Tan. An Intrusion Detection System for IEC61850 Automated Substations. IEEE transactions on power delivery : a publication of the Power Engineering Society, vol.25, no.4, 2376-2383.
Lin, Hui, Slagell, Adam, Kalbarczyk, Zbigniew T., Sauer, Peter W., Iyer, Ravishankar K.. Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids. IEEE transactions on smart grid, vol.9, no.1, 163-178.
IEEE Control Syst Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs mo 2015 10.1109/MCS.2014.2364724 35 93
Vamvoudakis, Kyriakos G., Hespanha, Joao P., Sinopoli, Bruno, Yilin Mo. Detection in Adversarial Environments. IEEE transactions on automatic control, vol.59, no.12, 3209-3223.
Mitchell, Robert, Ing-Ray Chen. Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications. IEEE transactions on smart grid, vol.4, no.3, 1254-1263.
Yawen Fan, Zhenghao Zhang, Trinkle, Matthew, Dimitrovski, Aleksandar D., Ju Bin Song, Husheng Li. A Cross-Layer Defense Mechanism Against GPS Spoofing Attacks on PMUs in Smart Grids. IEEE transactions on smart grid, vol.6, no.6, 2659-2668.
Proceedings of the 6th International workshop on Structural Health Monitoring Principal component analysis vs independent component analysis for damage detection tibaduiza 2012 2 3
Yonghe Guo, Chee-Wooi Ten, Shiyan Hu, Weaver, Wayne W.. Preventive Maintenance for Advanced Metering Infrastructure Against Malware Propagation. IEEE transactions on smart grid, vol.7, no.3, 1314-1328.
He, Z., Xu, X., Deng, S.. Discovering cluster-based local outliers. Pattern recognition letters, vol.24, no.9, 1641-1650.
Ismail, Ziad, Leneutre, Jean, Bateman, David, Lin Chen. A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.32, no.7, 1486-1499.
Rousseeuw, Peter J., Driessen, Katrien van. A Fast Algorithm for the Minimum Covariance Determinant Estimator. Technometrics, vol.41, no.3, 212-223.
IEEE Trans Control Syst Technol Detecting integrity attacks on SCADA systems mo 2014 10.1109/TCST.2013.2280899 22 1396
Liu, Fei Tony, Ting, Kai Ming, Zhou, Zhi-Hua. Isolation-Based Anomaly Detection. ACM transactions on knowledge discovery from data, vol.6, no.1, 1-39.
Data structures and algorithms preiss 1999
J Mach Learn Res Scikit-learn: Machine learning in python pedregosa 2011 12 2825
Chen-Ching Liu, Stefanov, A., Junho Hong, Panciatici, P.. Intruders in the Grid. IEEE power & energy magazine, vol.10, no.1, 58-66.
Ten, Chee-Wooi, Liu, Chen-Ching, Manimaran, Govindarasu. Vulnerability Assessment of Cybersecurity for SCADA Systems. IEEE transactions on power systems : a publication of the Power Engineering Society, vol.23, no.4, 1836-1846.
Liu, Xuan, Li, Zhiyi, Li, Zuyi. Optimal Protection Strategy Against False Data Injection Attacks in Power Systems. IEEE transactions on smart grid, vol.8, no.4, 1802-1810.
Suzhi Bi, Ying Jun Zhang. Graphical Methods for Defense Against False-Data Injection Attacks on Power System State Estimation. IEEE transactions on smart grid, vol.5, no.3, 1216-1227.
Sanjab, Anibal, Saad, Walid. Data Injection Attacks on Smart Grids With Multiple Adversaries: A Game-Theoretic Perspective. IEEE transactions on smart grid, vol.7, no.4, 2038-2049.
Suzhi Bi, Ying Jun Zhang. Using Covert Topological Information for Defense Against Malicious Attacks on DC State Estimation. IEEE journal on selected areas in communications : a publication of the IEEE Communications Society, vol.32, no.7, 1471-1485.
Yanling Yuan, Zuyi Li, Kui Ren. Modeling Load Redistribution Attacks in Power Systems. IEEE transactions on smart grid, vol.2, no.2, 382-390.
Proc International Power Eng Conf Secure power systems against malicious cyber-physical data attacks: Protection and identification talebi 2012 11
Zhao, Long, Zeng, Bo. Vulnerability Analysis of Power Grids With Line Switching. IEEE transactions on power systems : a publication of the Power Engineering Society, vol.28, no.3, 2727-2736.
Power System State Estimation Theory and Implementation gomez-exposito 2004
Domingues, Rémi, Filippone, Maurizio, Michiardi, Pietro, Zouaoui, Jihane. A comparative evaluation of outlier detection algorithms: Experiments and analyses. Pattern recognition, vol.74, 406-421.
Comparison of PCA with ICA from Data Distribution Perspective ivanov 2017
Dimensionality and Sample Size Considerations in Pattern Recognition Practice jain 1982 2
Singh, Sandeep Kumar, Khanna, Kush, Bose, Ranjan, Panigrahi, Bijaya Ketan, Joshi, Anupam. Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid. IEEE transactions on industrial informatics, vol.14, no.1, 89-97.
Illinois Center for a Smarter Electric Grid (ICSEG) 2018
Zimmerman, R D, Murillo-Sánchez, C E, Thomas, R J. MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education. IEEE transactions on power systems : a publication of the Power Engineering Society, vol.26, no.1, 12-19.
Ahmed, Saeed, Lee, Young Doo, Hyun, Seung Ho, Koo, Insoo. A Cognitive Radio-Based Energy-Efficient System for Power Transmission Line Monitoring in Smart Grids. Journal of sensors, vol.2017, 1-12.
Metke, Anthony R, Ekl, Randy L. Security Technology for Smart Grid Networks. IEEE transactions on smart grid, vol.1, no.1, 99-107.
Ozay, Mete, Esnaola, Inaki, Yarman Vural, Fatos Tunay, Kulkarni, Sanjeev R., Poor, H. Vincent. Machine Learning Methods for Attack Detection in the Smart Grid. IEEE transactions on neural networks and learning systems, vol.27, no.8, 1773-1786.
Yan, Ye, Qian, Yi, Sharif, Hamid, Tipper, David. A Survey on Cyber Security for Smart Grid Communications. IEEE Communications surveys and tutorials, vol.14, no.4, 998-1010.
Ruofei Ma, Hsiao-Hwa Chen, Yu-Ren Huang, Weixiao Meng. Smart Grid Communication: Its Challenges and Opportunities. IEEE transactions on smart grid, vol.4, no.1, 36-46.
Wang, W., Lu, Z.. Cyber security in the Smart Grid: Survey and challenges. Computer networks, vol.57, no.5, 1344-1371.
Qiu, Robert Caiming, Zhen Hu, Zhe Chen, Nan Guo, Ranganathan, Raghuram, Shujie Hou, Gang Zheng. Cognitive Radio Network for the Smart Grid: Experimental System Architecture, Control Algorithms, Security, and Microgrid Testbed. IEEE transactions on smart grid, vol.2, no.4, 724-740.
Queiroz, C., Mahmood, A., Tari, Z.. SCADASim—A Framework for Building SCADA Simulations. IEEE transactions on smart grid, vol.2, no.4, 589-597.
Kim, T T, Poor, H V. Strategic Protection Against Data Injection Attacks on Power Grids. IEEE transactions on smart grid, vol.2, no.2, 326-333.
Deng, Ruilong, Xiao, Gaoxi, Lu, Rongxing. Defending Against False Data Injection Attacks on Power System State Estimation. IEEE transactions on industrial informatics, vol.13, no.1, 198-207.
Yan, Ye, Qian, Yi, Sharif, Hamid, Tipper, David. A Survey on Cyber Security for Smart Grid Communications. IEEE Communications surveys and tutorials, vol.14, no.4, 998-1010.
Mo, Yilin, Kim, Tiffany Hyun-Jin, Brancik, Kenneth, Dickinson, Dona, Lee, Heejo, Perrig, Adrian, Sinopoli, Bruno. Cyber–Physical Security of a Smart Grid Infrastructure. Proceedings of the IEEE, vol.100, no.1, 195-209.
Liu, Jing, Xiao, Yang, Li, Shuhui, Liang, Wei, Chen, C. L. Philip. Cyber Security and Privacy Issues in Smart Grids. IEEE Communications surveys and tutorials, vol.14, no.4, 981-997.
Sridhar, Siddharth, Hahn, Adam, Govindarasu, Manimaran. Cyber–Physical System Security for the Electric Power Grid. Proceedings of the IEEE, vol.100, no.1, 210-224.
Guidelines for smart grid cyber security lee 2010
Liu, Yao, Ning, Peng, Reiter, Michael K.. False data injection attacks against state estimation in electric power grids. ACM transactions on information and system security, vol.14, no.1, 1-33.
Chen, Pin-Yu, Cheng, Shin-Ming, Chen, Kwang-Cheng. Smart attacks in smart grid communication networks. IEEE communications magazine, vol.50, no.8, 24-29.
Guo Chen, Zhao Yang Dong, Hill, D. J., Yu Sheng Xue. Exploring Reliable Strategies for Defending Power Systems Against Targeted Attacks. IEEE transactions on power systems : a publication of the Power Engineering Society, vol.26, no.3, 1000-1009.
Yiming Yao, Edmunds, T., Papageorgiou, D., Alvarez, R.. Trilevel Optimization in Power Network Defense. IEEE transactions on systems, man and cybernetics. a publication of the IEEE Systems, Man, and Cybernetics Society. Part C, Applications and reviews, vol.37, no.4, 712-718.
Ma, Chris Y. T., Yau, David K. Y., Xin Lou, Rao, Nageswara S. V.. Markov Game Analysis for Attack-Defense of Power Networks Under Possible Misinformation. IEEE transactions on power systems : a publication of the Power Engineering Society, vol.28, no.2, 1676-1686.
Esmalifalak, Mohammad, Liu, Lanchao, Nguyen, Nam, Zheng, Rong, Han, Zhu. Detecting Stealthy False Data Injection Using Machine Learning in Smart Grid. IEEE systems journal, vol.11, no.3, 1644-1652.
Ahmed, Saeed, Lee, YoungDoo, Hyun, Seung-Ho, Koo, Insoo. Covert Cyber Assault Detection in Smart Grid Networks Utilizing Feature Selection and Euclidean Distance-Based Machine Learning. Applied sciences, vol.8, no.5, 772-.
Ahmed, Saeed, Lee, Youngdoo, Hyun, Seung-Ho, Koo, Insoo. Feature Selection–Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning. IEEE access : practical research, open solutions, vol.6, 27518-27529.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.