JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 35-40.doi: 10.6040/j.issn.1671-9352.2.2014.388
Previous Articles Next Articles
LIU Ting, ZHAO Yu-chen, LIU Yang, SUN Ya-nan
CLC Number:
[1] WANG Wenye, LU Zhuo. Cyber security in the Smart Grid:survey and challenges[J]. Computer Networks, 2013, 57(5):1344-1371. [2] FALLIERE N, MURCHU L O, CHIEN E. W32stuxnet dossier[R]. Symantec Corp, Security Response, 2011. [3] CHEN T M. Stuxnet, the real start of cyber warfare? [J]. IEEE Network, 2010, 24(6):2-3. [4] LU Zhuo, LU Xiang, WANG Wenye, et al. Review and evaluation of security threats on the communication networks in the smart grid[C]//Proceedings of Military Communications Conference(MILCOM 2010). [S.l.]:[s.n.], 2010:1830-1835. [5] GRID N S. Introduction to NISTIR 7628 guidelines for smart grid cyber security[R].USA:NIST, 2010. [6] SYSTEMS C. Security for the smart grid[R]. San Jose:Cisco,2009. [7] SCHWEPPE F C, HANDSCHIN E J. Static state estimation in electric power systems [J]. Proceedings of the IEEE, 1974, 62(7):972-982. [8] YI Huang, ESMALIFALAK M, NGUYEN H, et al. Bad data injection in smart grid:attack and defense mechanisms [J]. IEEE Communications Magazine, 2013, 51(1):27-33. [9] LIU Ting, YUN Gu, DAI Wang, et al. A novel method to detect bad data injection attack in smart grid[C]//Proceedings of the 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). Washington:IEEE Computer Society, 2013:49-54. [10] WANG Dai, GUAN Xiaohong, LIU Ting, et al. Extended distributed state estimation:a detection method against tolerable false data injection attacks in smart grids [J]. Energies, 2014, 7(3):1517-1538. [11] KOSUT O, JIA Liyan, THOMAS R J, et al. Malicious data attacks on the smart grid [J]. IEEE Transactions on Smart Grid, 2011, 2(4):645-658. [12] LIU Yao, NING Peng, REITER M K. False data injection attacks against state estimation in electric power grids[J]. ACM Transactions on Information and System Security, 2011, 14(1):13.1-13.33. [13] LEE A, BREWER T. Smart grid cyber security strategy and requirements[R]. USA:NISTIR, 2009. [14] ZONOUZ S, ROGERS K M, BERTHIER R, et al. SCPSE:security-oriented cyber-Physical state estimation for power grid critical infrastructures [J]. IEEE Transactions on Smart Grid, 2012, 3(4):1790-1799. [15] SUN Yanan, GUAN Xiaohong, LIU Ting, et al. A cyber-physical monitoring system for attack detection in smart grid[C]//IEEE INFOCOM 2013. Washington:IEEE Computer Society, 2013. |
[1] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[2] | YU Ming, WANG Dong-ju. Detectability of TCP-based DDoS attacks at their sourceend networks [J]. J4, 2012, 47(11): 50-53. |
|