共 50 条
- [22] Cyber-Attack on a Power Plant using Bias Injected Measurements [J]. 2017 AMERICAN CONTROL CONFERENCE (ACC), 2017, : 5507 - 5512
- [23] Algorithmic Approaches to Characterizing Power Flow Cyber-Attack Vulnerabilities [J]. 2019 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2019,
- [24] Rapid Cyber-Attack Detection System with Low Probability of Missed Attack Warnings [J]. 2022 IEEE 17TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2022, : 1423 - 1429
- [25] Linux-based system modelling for cyber-attack simulation [J]. ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 585 - 596
- [26] Machine learning classifier-based detection of cyber-attack on power system: Comparative analysis [J]. 2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC, 2022,
- [27] A Data Preparation Method for Machine-Learning-Based Power System Cyber-Attack Detection [J]. 2018 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2018, : 3003 - 3009
- [28] Cyber-attack Detection in the Networked Control System with Faulty Plant [J]. 2017 25TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2017, : 980 - 985
- [29] Cyber-attack and defense simulation framework [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
- [30] Cyber-attack as inevitable kinetic war [J]. COMPUTER LAW & SECURITY REVIEW, 2015, 31 (03) : 390 - 400