ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Statistical outlier detection for diagnosis of cyber attacks in power state estimation
2016 IEEE Power and Energy Society General Meeting (PESGM)
◽
10.1109/pesgm.2016.7741572
◽
2016
◽
Cited By ~ 7
Author(s):
Yacine Chakhchoukh
◽
Song Liu
◽
Masashi Sugiyama
◽
Hideaki Ishii
Keyword(s):
State Estimation
◽
Outlier Detection
◽
Cyber Attacks
Download Full-text
Related Documents
Cited By
References
Sub-Erroneous Outlier Detection of Cyber Attacks in a Smart Grid State Estimation System
2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
◽
10.1109/uemcon51285.2020.9298162
◽
2020
◽
Author(s):
Stephen Hopkins
◽
Ezhil Kalaimannan
◽
Caroline Sangeetha John
Keyword(s):
Smart Grid
◽
State Estimation
◽
Outlier Detection
◽
Cyber Attacks
◽
Estimation System
Download Full-text
Resilient State Estimation in Presence of Severe Coordinated Cyber-Attacks on Large-Scale Power Systems
2020 IEEE Power & Energy Society General Meeting (PESGM)
◽
10.1109/pesgm41954.2020.9281683
◽
2020
◽
Author(s):
Ana Jevtic
◽
Marija Ilic
Keyword(s):
Power Systems
◽
State Estimation
◽
Large Scale
◽
Cyber Attacks
Download Full-text
Comparing Kalman Filters and Observers for Power System Dynamic State Estimation With Model Uncertainty and Malicious Cyber Attacks
IEEE Access
◽
10.1109/access.2018.2876883
◽
2018
◽
Vol 6
◽
pp. 77155-77168
◽
Cited By ~ 15
Author(s):
Junjian Qi
◽
Ahmad F. Taha
◽
Jianhui Wang
Keyword(s):
Power System
◽
State Estimation
◽
Model Uncertainty
◽
Kalman Filters
◽
Cyber Attacks
◽
System Dynamic
◽
Dynamic State
◽
Dynamic State Estimation
Download Full-text
Diagnosis of Outliers and Cyber Attacks in Dynamic PMU-Based Power State Estimation
IEEE Transactions on Power Systems
◽
10.1109/tpwrs.2019.2939192
◽
2020
◽
Vol 35
(2)
◽
pp. 1188-1197
◽
Cited By ~ 1
Author(s):
Yacine Chakhchoukh
◽
Hangtian Lei
◽
Brian K. Johnson
Keyword(s):
State Estimation
◽
Cyber Attacks
Download Full-text
Residual Saturation Based Kalman Filter for Smart Grid State Estimation Under Cyber Attacks
2019 IEEE 9th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER)
◽
10.1109/cyber46603.2019.9066737
◽
2019
◽
Cited By ~ 2
Author(s):
Md Masud Rana
◽
Rui Bo
◽
Bong Jun Choi
Keyword(s):
Kalman Filter
◽
Smart Grid
◽
State Estimation
◽
Cyber Attacks
◽
Residual Saturation
Download Full-text
Secure state estimation for systems under mixed cyber-attacks: Security and performance analysis
Information Sciences
◽
10.1016/j.ins.2020.08.124
◽
2021
◽
Vol 546
◽
pp. 943-960
Author(s):
Hong Lin
◽
James Lam
◽
Zheng Wang
Keyword(s):
Performance Analysis
◽
State Estimation
◽
Cyber Attacks
◽
And Performance
Download Full-text
Cyber attacks on AC state estimation: Unobservability and physical consequences
2014 IEEE PES General Meeting | Conference & Exposition
◽
10.1109/pesgm.2014.6939486
◽
2014
◽
Cited By ~ 19
Author(s):
Jingwen Liang
◽
Oliver Kosut
◽
Lalitha Sankar
Keyword(s):
State Estimation
◽
Cyber Attacks
◽
Physical Consequences
Download Full-text
Vulnerability Assessment of AC State Estimation With Respect to False Data Injection Cyber-Attacks
IEEE Transactions on Smart Grid
◽
10.1109/tsg.2012.2195338
◽
2012
◽
Vol 3
(3)
◽
pp. 1362-1370
◽
Cited By ~ 253
Author(s):
Gabriela Hug
◽
Joseph Andrew Giampapa
Keyword(s):
State Estimation
◽
Vulnerability Assessment
◽
Cyber Attacks
◽
False Data Injection
Download Full-text
Cyber attacks, detection and protection in smart grid state estimation
2016 North American Power Symposium (NAPS)
◽
10.1109/naps.2016.7747874
◽
2016
◽
Cited By ~ 5
Author(s):
Yi Zhou
◽
Zhixin Miao
Keyword(s):
Smart Grid
◽
State Estimation
◽
Cyber Attacks
Download Full-text
Secure state estimation for nonlinear power systems under cyber attacks
2017 American Control Conference (ACC)
◽
10.23919/acc.2017.7963372
◽
2017
◽
Cited By ~ 5
Author(s):
Qie Hu
◽
Dariush Fooladivanda
◽
Young Hwan Chang
◽
Claire J. Tomlin
Keyword(s):
Power Systems
◽
State Estimation
◽
Cyber Attacks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close