[1] |
朱炳铨, 郭逸豪, 郭创新, 等. 信息失效威胁下的电力信息物理系统安全评估与防御研究综述[J]. 电力系统保护与控制, 2021, 49(1): 178-187.
|
|
ZHU Bingquan, GUO Yihao, GUO Chuangxin, et al. A survey of the security assessment and security defense of a cyber physical power system under cyber failure threat[J]. Power System Protection and Control, 2021, 49(1): 178-187.
|
[2] |
张宇航, 倪明, 孙永辉, 等. 针对网络攻击的配电网信息物理系统风险量化评估[J]. 电力系统自动化, 2019, 43(21): 12-22.
|
|
ZHANG Yuhang, NI Ming, SUN Yonghui, et al. Quantitative risk assessment of cyber-physical system for cyber-attacks in distribution network[J]. Automation of Electric Power Systems, 2019, 43(21): 12-22.
|
[3] |
刘念, 余星火, 张建华. 网络协同攻击: 乌克兰停电事件的推演与启示[J]. 电力系统自动化, 2016, 40(6): 144-147.
|
|
LIU Nian, YU Xinghuo, ZHANG Jianhua. Coordinated cyber-attack: Inference and thinking of incident on Ukrainian power grid[J]. Automation of Electric Power Systems, 2016, 40(6): 144-147.
|
[4] |
田猛, 王先培, 董政呈, 等. 基于拉格朗日乘子法的虚假数据攻击策略[J]. 电力系统自动化, 2017, 41(11): 26-32.
|
|
TIAN Meng, WANG Xianpei, DONG Zhengcheng, et al. Injected attack strategy for false data based on Lagrange multipliers method[J]. Automation of Electric Power Systems, 2017, 41(11): 26-32.
|
[5] |
KHAZAEI J. Stealthy cyberattacks on loads and distributed generation aimed at multi-transmission line congestions in smart grids[J]. IEEE Transactions on Smart Grid, 2021, 12(3): 2518-2528.
doi: 10.1109/TSG.2020.3038045
URL
|
[6] |
舒隽, 郭志锋, 韩冰. 电网虚假数据注入攻击的非线性分析模型[J]. 华北电力大学学报(自然科学版), 2018, 45(2): 75-81.
|
|
SHU Jun, GUO Zhifeng, HAN Bing. Nonlinear analysis model of false data injection attack for power grid[J]. Journal of North China Electric Power University (Natural Science Edition), 2018, 45(2): 75-81.
|
[7] |
阳育德, 蓝水岚, 覃智君, 等. 电力信息物理融合系统的网络-物理协同攻击[J]. 电力自动化设备, 2020, 40(2): 97-103.
|
|
YANG Yude, LAN Shuilan, QIN Zhijun, et al. Coordinated cyber-physical attacks of cyber-physical power system[J]. Electric Power Automation Equipment, 2020, 40(2): 97-103.
|
[8] |
LI Z Y, SHAHIDEHPOUR M, ALABDULWAHAB A, et al. Bilevel model for analyzing coordinated cyber-physical attacks on power systems[J]. IEEE Transactions on Smart Grid, 2016, 7(5): 2260-2272.
doi: 10.1109/TSG.2015.2456107
URL
|
[9] |
陈刘东, 刘念. 面向互动需求响应的虚假数据注入攻击及其检测方法[J]. 电力系统自动化, 2021, 45(3): 15-23.
|
|
CHEN Liudong, LIU Nian. False data injection attack and its detection method for interactive demand response[J]. Automation of Electric Power Systems, 2021, 45(3): 15-23.
|
[10] |
DAYARATNE T, RUDOLPH C, LIEBMAN A, et al. High impact false data injection attack against real-time pricing in smart grids[C]// 2019 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe). IEEE, 2019: 1-5.
|
[11] |
ZHANG Z H, GONG S P, DIMITROVSKI A D, et al. Time synchronization attack in smart grid: Impact and analysis[J]. IEEE Transactions on Smart Grid, 2013, 4(1): 87-98.
doi: 10.1109/TSG.2012.2227342
URL
|
[12] |
ZHANG Y C, WANG L F, XIANG Y M, et al. Power system reliability evaluation with SCADA cyber security considerations[J]. IEEE Transactions on Smart Grid, 2015, 6(4): 1707-1721.
doi: 10.1109/TSG.2015.2396994
URL
|
[13] |
孙平远, 刘科研, 齐冬莲. 基于电力信息物理系统实时仿真平台的网络安全仿真[J]. 电力建设, 2020, 41(2):40-46.
|
|
SUN Pingyuan, LIU Keyan, QI Donglian. Cyber security simulation based on real-time simulation platform of cyber physical power system[J]. Electric Power Construction, 2020, 41(2):40-46.
|
[14] |
LIU X, LI Z Y. Trilevel modeling of cyber attacks on transmission lines[J]. IEEE Transactions on Smart Grid, 2017, 8(2): 720-729.
|
[15] |
LIU Y G, GAO S B, SHI J, et al. Pre-overload-graph-based vulnerable correlation identification under load redistribution attacks[J]. IEEE Transactions on Smart Grid, 2020, 11(6): 5216-5226.
doi: 10.1109/TSG.2020.3008515
URL
|
[16] |
LIU Y G, GAO S B, SHI J, et al. Sequential-mining-based vulnerable branches identification for the transmission network under continuous load redistribution attacks[J]. IEEE Transactions on Smart Grid, 2020, 11(6): 5151-5160.
doi: 10.1109/TSG.2020.3003340
URL
|
[17] |
LIU C S, LIANG H, CHEN T W. Network parameter coordinated false data injection attacks against power system AC state estimation[J]. IEEE Transactions on Smart Grid, 2021, 12(2): 1626-1639.
doi: 10.1109/TSG.2020.3033520
URL
|
[18] |
KAVIANI R, HEDMAN K W. A detection mechanism against load-redistribution attacks in smart grids[J]. IEEE Transactions on Smart Grid, 2021, 12(1): 704-714.
doi: 10.1109/TSG.2020.3017562
URL
|
[19] |
蔡星浦, 王琦, 邰伟, 等. 基于多阶段博弈的电力CPS虚假数据注入攻击防御方法[J]. 电力建设, 2019, 40(5): 48-54.
|
|
CAI Xingpu, WANG Qi, TAI Wei, et al. A multi-stage game based defense method against false data injection attack on cyber physical power system[J]. Electric Power Construction, 2019, 40(5): 48-54.
|
[20] |
舒隽, 郭志锋, 韩冰. 电网虚假数据注入攻击的双层优化模型[J]. 电力系统自动化, 2019, 43(10): 95-100.
|
|
SHU Jun, GUO Zhifeng, HAN Bing. Bi-level optimization model of false data injection attack for power grid[J]. Automation of Electric Power Systems, 2019, 43(10): 95-100.
|
[21] |
黄校娟, 付蓉, 吴英俊, 等. 网络攻击下基于贝叶斯图论的配电系统安全分析[J]. 电力建设, 2019, 40(1): 86-95.
|
|
HUANG Xiaojuan, FU Rong, WU Yingjun, et al. Analysis on security of distribution system based on Bayesian graph theory under network attack[J]. Electric Power Construction, 2019, 40(1): 86-95.
|
[22] |
LIANG J W, SANKAR L, KOSUT O. Vulnerability analysis and consequences of false data injection attack on power system state estimation[J]. IEEE Transactions on Power Systems, 2016, 31(5): 3864-3872.
doi: 10.1109/TPWRS.2015.2504950
URL
|
[23] |
倪良华, 闻佳妍, 张晓莲, 等. 基于受冲击与断开后果脆弱度的电网关键线路识别[J]. 电力系统保护与控制, 2020, 48(1): 81-87.
|
|
NI Lianghua, WEN Jiayan, ZHANG Xiaolian, et al. Critical lines identification in power grid based on vulnerability of line under impact and disconnection consequence[J]. Power System Protection and Control, 2020, 48(1): 81-87.
|
[24] |
康忠健, 李昌超, 于洪国, 等. 一种识别电力系统关键输电线路的方法[J]. 电力自动化设备, 2020, 40(4): 63-70.
|
|
KANG Zhongjian, LI Changchao, YU Hongguo, et al. Identification method of key transmission lines in power system[J]. Electric Power Automation Equipment, 2020, 40(4): 63-70.
|
[25] |
栗然, 靳保源. 基于潮流转移分布熵和负荷冲击灵敏度熵的电力系统关键线路识别[J]. 电力自动化设备, 2018, 38(9): 148-154.
|
|
LI Ran, JIN Baoyuan. Critical line identification of power grid based on power flow transferring distribution entropy and load impact sensitivity entropy[J]. Electric Power Automation Equipment, 2018, 38(9): 148-154.
|
[26] |
ZIMMERMAN R D, MURILLO-SÁNCHEZ C E, THOMAS R J. MATPOWER: steady-state operations, planning, and analysis tools for power systems research and education[J]. IEEE Transactions on Power Systems, 2011, 26(1): 12-19.
doi: 10.1109/TPWRS.2010.2051168
URL
|
[27] |
LIANG G Q, ZHAO J H, LUO F J, et al. A review of false data injection attacks against modern power systems[J]. IEEE Transactions on Smart Grid, 2017, 8(4): 1630-1638.
doi: 10.1109/TSG.2015.2495133
URL
|
[28] |
ABUSORRAH A, ALABDULWAHAB A, LI Z Y, et al. Minimax-regret robust defensive strategy against false data injection attacks[J]. IEEE Transactions on Smart Grid, 2019, 10(2): 2068-2079.
doi: 10.1109/TSG.2017.2788040
URL
|