[1]邱承武, 宓群超. 利用电力数据四级网实现小电厂数据的采集[J]. 电力系统自动化, 2006, 30(3): 105-106.
QIU Chengwu, MI Qunchao. Using electric power IV network to collect power data in small power plant[J]. Automation of Electric Power Systems, 2006, 30(3): 105-106.
[2]金肇光, 梁奇峰, 黄少先. 计算机与网络仪表构成的电力数据实时测量系统[J]. 电力系统及其自动化学报, 2004, 16(1): 89-91.
JIN Zhaoguang, LIAN Qifeng, HUANG Shaoxian. The electric data real-time measurement system comprising computer and network instrument[J]. Proceedings of the Automation of Electric Power Systems, 2004, 16(1): 89-91.
[3]王兴志, 严正, 沈沉, 等. 基于在线核学习的电网不良数据检测与辨识方法[J]. 电力系统保护与控制, 2012, 40(1): 50-55.
WANG Xingzhi, YAN Zheng, SHEN Chen, et al. Power grid bad-data and identification based on online kernel learning method[J]. Power System Protection and Control, 2012, 40(1): 50-55.
[4]秦璇. 电力统计数据的质量评估及其异常检测方法研究[D]. 长沙:长沙理工大学, 2013.
QIN Xuan. Data quality evaluation and anomaly detection research based on the statistical data of power system[D]. Changsha:Changsha University of Science & Technology, 2013.
[5]TEN C W, LIU C C, MANIMARAN G. Vulnerability assessment of cybersecurity for SCADA systems[J]. IEEE Transactions on Power Systems, 2008, 23(4): 1836-1846.
[6]董朝阳, 赵俊华, 文福拴, 等. 从智能电网到能源互联网: 基本概念与研究框架[J]. 电力系统自动化, 2014, 38(15): 1-11.
DONG Zhaoyang, ZHAO Junhua, WEN Fushuan, et al. From smart grid to energy internet: Basic-concept and research framework[J]. Automation of Electric Power Systems, 2014, 38(15): 1-11.
[7]MO Y, KIM H H, BRANCIK K, et al. Cyber-physical security of a smart grid infrastructure[J]. Proceedings of the IEEE, 2012, 100(1): 195-209.
[8]唐新安, 胡铁斌. SCADA系统中坏数据的自动检测[J]. 电力自动化设备, 2002, 22(10): 81-82.
TANG Xinan, HU Tiebin. Automation detection of bad data in SCADA system[J]. Electric Power Automation Equipment, 2002, 22(10): 81-82.
[9]SINGH N, GLAVITSCH H. Detection and identification of topological errors in online power system analysis[J]. IEEE Transactions on Power Systems, 1991, 6(1): 324-331.
[10]MA J, CHEN Y, HUANG Z, et al. Detect abnormal SCADA data using state estimation residuals[C]// Proceedings of IEEE Power & Energy Society General Meeting. IEEE, 2010: 1-8.
[11]王增平,张晋芳, 钱诚. 基于同步测量信息的电网拓扑错误辨识方法[J]. 电力自动化设备, 2012, 32(1):1-8.
WANG Zengping, ZHANG Jinfang, QIAN Cheng. Topology error identification based on synchronized measurements for power network[J]. Electric Power |Automation Equipment, 2012, 32(1): 1-8.
[12]王传安, 张天会, 赵海燕,等. SCADA系统通信网中的高级持续性攻击检测方法[J]. 计算机科学与探索, 2015, 9(3): 352-359.
WANG Chuanan, ZHANG Tianhui, ZHAO Haiyan, et al. Detection of advanced persistent threats in SCADA communication network[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(3): 352-359.
[13]HAWKINS D M. Identification of Outliers[M]. Berlin: Springer Netherlands, 1980: 13-26.
[14]刘瑞叶, 李卫星, 李峰,等. 电网运行异常的状态特征与趋势指标[J]. 电力系统自动化, 2013, 37(20):47-53.
LIU Ruiye, LI Weixing, LI Feng, et al. State features and tendency indices embodying abnormal operation of power systems[J]. Automation of Electric Power Systems, 2013, 37(20):47-53.
[15]叶锋, 何桦, 顾全, 等. EMS中负荷预测不良数据的辨识与修正[J]. 电力系统自动化, 2006, 30(15):85-88.
YE Feng, HE Hua, GU Quan, et al. Bad data identification and correction for load forecasting in energy management system[J]. Automation of Electric Power Systems, 2006, 30(15):85-88.
[16]严英杰, 盛戈皞, 陈玉峰,等. 基于时间序列分析的输变电设备状态大数据清洗方法[J]. 电力系统自动化, 2015(7):138-144.
YAN Yingjie, SHENG Gehao, CHEN Yufeng, et al. Cleaning method for big data of power transmission and transformation equipment state based on time sequence analysis[J]. Automation of Electric Power Systems, 2015(7):138-144.
[17]BREUNIG M M, KRIEGEl H P, NG R, et al. LOF: Identifying density based local outliers[C]// Proceedings of the ACM SIGMOD International Conference on Management of Data. Dallas, 2000: 93-104.
[18]JIN W, TUNG A K H, HAN J, et al. Ranking outliers using symmetric neighborhood relationship.[C]// Proceedings of the 10th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining. Singapore: DBLP, 2006: 577-593.
[19]廖俊, 于雷, 罗寰, 等. 基于趋势转折点的时间序列分段线性表示[J]. 计算机工程与应用, 2010, 46(30): 50-53.
LIAO Jun, YU Lei, LUO Huan, et al. Time series piecewise linear representation based on trend transition point[J]. Computer Engineering and Applications, 2010, 46(30): 50-53.
[20]KEOGH E, CHAKRABARTI K, PAZZANI M, et al. Dimensionality reduction for fast similarity search in large time series databases[J]. Knowledge & Information Systems, 2002, 3(3): 263-286.
[21]YI B K, FALOUTSOS C. Fast time sequence indexing for arbitrary lp norms[C]// Proceedings of the 26th International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc. 2000: 385-394.
[22]PRATT K B, FINK E. Search for patterns in compressed time series [J]. International Journal of Image & Graphics, 2011,2(1):89-106.
[23]曲吉林, 寇纪淞, 李敏强, 等. 基于Voronoi图的异常检测算法[J]. 计算机工程, 2007, 33(23): 35-36.
QU Jilin, KOU Jisong, LI Minqiang, et al. Outlier detection algorithm based on Voronoi diagram[J]. Computer Engineering, 2007, 33(23): 35-36.
[24]PREPARATA F P, SHAMOS M I. Computational geometry- an introduction[M]. New York: Springer-Verlay, 1985:56-82.
[25]杨莉, 李鹏举. 基于数据挖掘的日负荷曲线预测与修正[J]. 计算机系统应用, 2014, 23(12): 182-186.
YANG Li, LI Pengju. Forecasting and modification of daily load curve based on data mining[J]. Computer Systems & Applications, 2014, 23(12): 182-186.
|