박사

A Study on the detection of covert cyber-attacks in smart grid-based power transmission system utilizing machine learning techniques

논문상세정보
' A Study on the detection of covert cyber-attacks in smart grid-based power transmission system utilizing machine learning techniques' 의 주제별 논문영향력
논문영향력 선정 방법
논문영향력 요약
주제
  • "Smart grid communications and security"
  • cyber-security
  • machine learning
  • state-estimation
동일주제 총논문수 논문피인용 총횟수 주제별 논문영향력의 평균
971 0

0.0%

' A Study on the detection of covert cyber-attacks in smart grid-based power transmission system utilizing machine learning techniques' 의 참고문헌

  • ||, \Isolation-based anomaly detection," ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 6, no. 1, p. 3, 2012.
  • Z. Zhang, S. Gong, A. D. Dimitrovski, and H. Li, \Time synchronization attack in smart grid: Impact and analysis," IEEE Transactions on Smart Grid, vol. 4, no. 1, pp. 87{98, 2013.
  • Z. Wang, X. Zhao, and X. Qian, \The application and issuse of linear wireless sensor networks," in 2011 International Conference on System science, Engineering design and Manufacturing informatization, vol. 2. IEEE, 2011, pp. 9{12.
  • Z. Qin, Q. Li, and M.-C. Chuah, \Unidenti able attacks in electric power systems," in Proceedings of the 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems. IEEE Computer Society, 2012, pp. 193{202.
  • Z. M. Fadlullah, M. M. Fouda, N. Kato, X. Shen, and Y. Nozaki, \An early warning system against malicious activities for smart grid communications," IEEE Network, vol. 25, no. 5, 2011.
  • Z. Ismail, J. Leneutre, D. Bateman, and L. Chen, \A game theoretical analysis of data con dentiality attacks on smart-grid ami," IEEE journal on selected areas in communications, vol. 32, no. 7, pp. 1486{1499, 2014.
  • Y.-C. Wu, L.-F. Cheung, K.-S. Lui, and P. W. Pong, \Ecient communication of sensors monitoring overhead transmission lines," IEEE Transactions on Smart Grid, vol. 3, no. 3, pp. 1130{1136, 2012.
  • Y. Zhang, L. Wang, W. Sun, R. C. Green II, and M. Alam, \Distributed intrusion detection system in a multi-layer network architecture of smart grids," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 796{808, 2011.
  • Y. Yuan, Z. Li, and K. Ren, \Modeling load redistribution attacks in power systems," IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 382{390, 2011.
  • Y. Yao, T. Edmunds, D. Papageorgiou, and R. Alvarez, \Trilevel optimization in power network defense," IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 37, no. 4, pp. 712{718, 2007.
  • Y. Yang, F. Lambert, and D. Divan, \A survey on technologies for implementing sensor networks for power delivery systems," in 2007 IEEE Power Engineering Society General Meeting. IEEE, 2007, pp. 1{8.
  • Y. Yang, D. Divan, R. G. Harley, and T. G. Habetler, \Design and implementation of power line sensornet for overhead transmission lines," in 2009 IEEE Power & Energy Society General Meeting. IEEE, 2009, pp. 1{8.
  • Y. Yan, Y. Qian, H. Sharif, and D. Tipper, \A survey on cyber security for smart grid communications," IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 998{1010, 2012.
  • Y. Saeys, I. Inza, and P. Larra~naga, \A review of feature selection techniques in bioinformatics," bioinformatics, vol. 23, no. 19, pp. 2507{2517, 2007.
  • Y. Mo, T. H.-J. Kim, K. Brancik, D. Dickinson, H. Lee, A. Perrig, and B. Sinopoli, \Cyber{physical security of a smart grid infrastructure," Proceedings of the IEEE, vol. 100, no. 1, pp. 195{209, 2012.
  • Y. Mo, S. Weerakkody, and B. Sinopoli, \Physical authentication of control systems: Designing watermarked control inputs to detect counterfeit sensor outputs," IEEE Control Systems, vol. 35, no. 1, pp. 93{109, 2015.
  • Y. Mo, R. Chabukswar, and B. Sinopoli, \Detecting integrity attacks on scada systems," IEEE Transactions on Control Systems Technology, vol. 22, no. 4, pp. 1396{1407, 2014.
  • Y. Liu, P. Ning, and M. K. Reiter, \False data injection attacks against state estimation in electric power grids," ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 1, p. 13, 2011.
  • Y. Huang, J. Tang, Y. Cheng, H. Li, K. A. Campbell, and Z. Han, \Real-time detection of false data injection in smart grid networks: An adaptive cusum method and analysis," IEEE Systems Journal, vol. 10, no. 2, pp. 532{543, 2016.
  • Y. Guo, C.-W. Ten, S. Hu, and W. W. Weaver, \Preventive maintenance for advanced metering infrastructure against malware propagation," IEEE Transactions on Smart Grid, vol. 7, no. 3, pp. 1314{1328, 2016.
  • Y. Fan, Z. Zhang, M. Trinkle, A. D. Dimitrovski, J. B. Song, and H. Li, \A crosslayer defense mechanism against gps spoo ng attacks on pmus in smart grids," IEEE Transactions on Smart Grid, vol. 6, no. 6, pp. 2659{2668, 2015.
  • X. Lu, P. Wang, D. Niyato, D. I. Kim and Z. Han, "Wireless Charging Technologies: Fundamentals, Standards, and Network Applications," IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1413 - 1452, 2016.
  • X. Liu, Z. Li, and Z. Li, \Optimal protection strategy against false data injection attacks in power systems," IEEE Transactions on Smart Grid, vol. 8, no. 4, pp. 1802{1810, 2017.
  • X. Liu and Z. Li, \Local load redistribution attacks in power systems with incomplete network information," IEEE Transactions on Smart Grid, vol. 5, no. 4, pp. 1665{1676, 2014.
  • W. Wang, Y. Xu, and M. Khanna, \A survey on the communication architectures in smart grid," Computer networks, vol. 55, no. 15, pp. 3604{3629, 2011.
  • W. Wang and Z. Lu, \Cyber security in the smart grid: Survey and challenges," Computer Networks, vol. 57, no. 5, pp. 1344{1371, 2013.
  • V. Vapnik, The nature of statistical learning theory. Springer science & business media, 2013.
  • V. Rodoplu and T. H. Meng, \Bits-per-joule capacity of energy-limited wireless networks," IEEE Transactions on Wireless Communications, vol. 6, no. 3, pp. 857{865, 2007.
  • V. Dehalwar, A. Kalam, M. L. Kolhe, and A. Zayegh, \Compliance of ieee 802.22 wran for eld area network in smart grid," in 2016 IEEE International Conference on Power System Technology (POWERCON). IEEE, 2016, pp. 1{6.
  • V. Chandola, V. Mithal, and V. Kumar, \Comparative evaluation of anomaly detection techniques for sequence data," in Data Mining, 2008. ICDM'08. Eighth IEEE International Conference on. IEEE, 2008, pp. 743{748.
  • V. Chandala, A. Banerjee, and V. Kumar, \Anomaly detection: A survey, acm computing surveys," University of Minnesota, 2009.
  • V. C. Gungor and F. C. Lambert, \A survey on communication networks for electric system automation," Computer Networks, vol. 50, no. 7, pp. 877{897, 2006.
  • U. K. Premaratne, J. Samarabandu, T. S. Sidhu, R. Beresh, and J.-C. Tan, \An intrusion detection system for iec61850 automated substations," IEEE Transactions on Power Delivery, vol. 25, no. 4, pp. 2376{2383, 2010.
  • T. T. Kim and H. V. Poor, \Strategic protection against data injection attacks on power grids," IEEE Transactions on Smart Grid, vol. 2, no. 2, pp. 326{333, 2011.
  • T. Ohki and A. Otsuka, \A study on autoencoder-based reconstruction method for wi- location data with erasures," in Proceedings of the 2017 on Multimedia Privacy and Security. ACM, 2017, pp. 13{18.
  • T. Baumeister, \Literature review on smart grid cyber security," Collaborative Software Development Laboratory at the University of Hawaii, 2010.
  • S.-H. Min, J. Lee, and I. Han, \Hybrid genetic algorithms and support vector machines for bankruptcy prediction," Expert systems with applications, vol. 31, no. 3, pp. 652{660, 2006.
  • S. Sridhar, A. Hahn, and M. Govindarasu, \Cyber{physical system security for the electric power grid," Proceedings of the IEEE, vol. 100, no. 1, pp. 210{224, 2012.
  • S. Patro and K. K. Sahu, \Normalization: A preprocessing stage," arXiv preprint arXiv:1503.06462, 2015.
  • S. Pal, B. Sikdar, and J. H. Chow, \Detecting malicious manipulation of synchrophasor data," in Smart Grid Communications (SmartGridComm), 2015 IEEE International Conference on. IEEE, 2015, pp. 145{150.
  • S. Pal and B. Sikdar, \A mechanism for detecting data manipulation attacks on pmu data," in Communication Systems (ICCS), 2014 IEEE International Conference on. IEEE, 2014, pp. 253{257.
  • S. Malhara and V. Vittal, \Mechanical state estimation of overhead transmission lines using tilt sensors," IEEE Transactions on Power Systems, vol. 25, no. 3, pp. 1282{1290, 2010.
  • S. Ma, X. Song, and J. Huang, \Supervised group lasso with applications to microarray data analysis," BMC bioinformatics, vol. 8, no. 1, p. 60, 2007.
  • S. Krishnamurthy, M. Thoppian, S. Venkatesan, and R. Prakash, \Control channel based mac-layer con guration, routing and situation awareness for cognitive radio networks," in MILCOM 2005-2005 IEEE Military Communications Conference. IEEE, 2005, pp. 455{460.
  • S. K. Singh, K. Khanna, R. Bose, B. K. Panigrahi, and A. Joshi, \Joint-transformationbased detection of false data injection attacks in smart grid," IEEE Transactions on Industrial Informatics, vol. 14, no. 1, pp. 89{97, 2018.
  • S. Iqbal, M. L. M. Kiah, B. Dhaghighi, M. Hussain, S. Khan, M. K. Khan, and K.-K. R. Choo, \On cloud security attacks: A taxonomy and intrusion detection and prevention as a service," Journal of Network and Computer Applications, vol. 74, pp. 98{120, 2016.
  • S. Bi and Y. J. Zhang, \Using covert topological information for defense against malicious attacks on dc state estimation," IEEE Journal on Selected Areas in Communications, vol. 32, no. 7, pp. 1471{1485, 2014.
  • S. Bi and Y. J. Zhang, \Graphical methods for defense against false-data injection attacks on power system state estimation," IEEE Transactions on Smart Grid, vol. 5, no. 3, pp. 1216{1227, 2014.
  • S. Avidan, \Support vector tracking," in Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, vol. 1. IEEE, 2001, pp. I{I.
  • S. Ahmed, Y. Lee, S.-H. Hyun, and I. Koo, \Feature selection{based detection of covert cyber deception assaults in smart grid communications networks using machine learning," IEEE Access, 2018.
  • S. Ahmed, Y. Lee, S.-H. Hyun, and I. Koo, \Covert cyber assault detection in smart grid networks utilizing feature selection and euclidean distance-based machine learning," Applied Sciences, vol. 8, no. 5, p. 772, 2018.
  • S. Ahmed, Y. Lee, H. Seung-Ho, and I. Koo, \Unsupervised machine learning|based detection of covert data integrity assault in smart grid networks utilizing isolation forest," IEEE Transactions on Information Forensics and Security, 2019.
  • S. Ahmed, Y. D. Lee, S. H. Hyun, and I. Koo, \A cognitive radio-based energy-ecient system for power transmission line monitoring in smart grids," Journal of Sensors, vol. 2017, 2017.
  • S. Abe, \Feature selection and extraction," in Support Vector Machines for Pattern Classi cation. Springer, 2010, pp. 331{341.
  • R. Mitchell and R. Chen, \Behavior-rule based intrusion detection systems for safety critical smart grid applications," IEEE Transactions on Smart Grid, vol. 4, no. 3, pp. 1254{1263, 2013.
  • R. Ma, H.-H. Chen, Y.-R. Huang, and W. Meng, \Smart grid communication: Its challenges and opportunities," IEEE transactions on Smart Grid, vol. 4, no. 1, pp. 36{46, 2013.
  • R. Leszczyna, \Standards on cyber security assessment of smart grid," International Journal of Critical Infrastructure Protection, vol. 22, pp. 70{89, 2018.
  • R. Huang, C. Liu, G. Li, and J. Zhou, \Adaptive deep supervised autoencoder based image reconstruction for face recognition," Mathematical Problems in Engineering, vol. 2016, 2016.
  • R. H. Etemad and F. Lahouti, \Resilient decentralized consensus-based state estimation for smart grid in presence of false data," in Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on. IEEE, 2016, pp. 3466{3470.
  • R. Domingues, M. Filippone, P. Michiardi, and J. Zouaoui, \A comparative evaluation of outlier detection algorithms: Experiments and analyses," Pattern Recognition, vol. 74, pp. 406{421, 2018.
  • R. Deng, G. Xiao, and R. Lu, \Defending against false data injection attacks on power system state estimation," IEEE Transactions on Industrial Informatics, vol. 13, no. 1, pp. 198{207, 2017.
  • R. D. Zimmerman, C. E. Murillo-Sanchez, and R. J. Thomas, \Matpower: Steady-state operations, planning, and analysis tools for power systems research and education," IEEE Transactions on power systems, vol. 26, no. 1, pp. 12{19, 2011.
  • R. C. Qiu, Z. Hu, Z. Chen, N. Guo, R. Ranganathan, S. Hou, and G. Zheng, \Cognitive radio network for the smart grid: Experimental system architecture, control algorithms, security, and microgrid testbed." IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 724{740, 2011.
  • R. A. Len, V. Vittal, and G. Manimaran, \Application of sensor network for secure electric energy infrastructure," IEEE Transactions on Power Delivery, vol. 22, no. 2, pp. 1021{1028, 2007.
  • Q. Meng, D. Catchpoole, D. Skillicom, and P. J. Kennedy, \Relational autoencoder for feature extraction," in 2017 International Joint Conference on Neural Networks (IJCNN). IEEE, 2017, pp. 364{371.
  • P. Yi, T. Zhu, Q. Zhang, Y. Wu, and J. Li, \A denial of service attack in advanced metering infrastructure network," in 2014 IEEE International Conference on Communications (ICC). IEEE, 2014, pp. 1029{1034.
  • P. Y. Chen, S. M. Cheng, and K. C. Chen, \Smart attacks in smart grid communication networks," IEEE Communications Magazine, vol. 50, no. 8, 2012.
  • P. Vincent, H. Larochelle, Y. Bengio, and P.-A. Manzagol, \Extracting and composing robust features with denoising autoencoders," in Proceedings of the 25th international conference on Machine learning. ACM, 2008, pp. 1096{1103.
  • P. Kundur, N. J. Balu, and M. G. Lauby, Power system stability and control. McGrawhill New York, 1994, vol. 7.
  • P. Jafari and F. Azuaje, \An assessment of recently published gene expression data analyses: reporting experimental design and statistical factors," BMC Medical Informatics and Decision Making, vol. 6, no. 1, p. 27, 2006.
  • O. Holland, H. Bogucka, and A. Medeisis, Opportunistic spectrum sharing and white space access: The practical reality. John Wiley & Sons, 2015.
  • N. Framework, \Roadmap for smart grid interoperability standards," 2010.
  • N. Abe, B. Zadrozny, and J. Langford, \Outlier detection by active learning," in Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2006, pp. 504{509.
  • M. Tschannen, O. Bachem, and M. Lucic, \Recent advances in autoencoder-based representation learning," arXiv preprint arXiv:1812.05069, 2018.
  • M. Talebi, J. Wang, and Z. Qu, \Secure power systems against malicious cyber-physical data attacks: Protection and identi cation," in International Conference on Power Systems Engineering, 2012, pp. 11{12.
  • M. Ozay, I. Esnaola, F. T. Y. Vural, S. R. Kulkarni, and H. V. Poor, \Machine learning methods for attack detection in the smart grid," IEEE Transactions on Neural Networks and Learning Systems, vol. 27, no. 8, pp. 1773{1786, Aug 2016.
  • M. Ivanov, \Comparison of pca with ica from data distribution perspective," arXiv preprint arXiv:1709.10222, 2017.
  • M. Esmalifalak, Z. Han, and L. Song, \E ect of stealthy bad data injection on network congestion in market based power system," in Wireless Communications and Networking Conference (WCNC), 2012 IEEE. IEEE, 2012, pp. 2468{2472.
  • M. Esmalifalak, L. Liu, N. Nguyen, R. Zheng, and Z. Han, \Detecting stealthy false data injection using machine learning in smart grid," IEEE Systems Journal, 2014.
  • M. Emmanuel and R. Rayudu, \Communication technologies for smart grid applica tions: A survey," Journal of Network and Computer Applications, vol. 74, pp. 133{148, 2016.
  • M. E. El-Hawary, \The smart grid|state-of-the-art and future trends," Electric Power Components and Systems, vol. 42, no. 3-4, pp. 239{250, 2014.
  • M. Cesana, F. Cuomo, and E. Ekici, \Routing in cognitive radio networks: Challenges and solutions," Ad Hoc Networks, vol. 9, no. 3, pp. 228{248, 2011.
  • M. CINAR and A. KAYGUSUZ, \Self-healing in smart grid: A review," Bitlis Eren  Universitesi Fen Bilimleri Dergisi, vol. 7, no. 2, pp. 492{503, 2018.
  • M. Brew, F. Darbari, L. H. Crockett, M. Waddell, M. Fitch, S. Weiss, and R. W. Stewart, \Uhf white space network for rural smart grid communications," in 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm). IEEE, 2011, pp. 138{142.
  • M. A. Ferrag, L. A. Maglaras, H. Janicke, and J. Jiang, \A survey on privacy-preserving schemes for smart grid communications," arXiv preprint arXiv:1611.07722, 2016.
  • M. A. Demel, A. G. Janecek, K.-M. Thai, G. F. Ecker, and W. N. Gansterer, \Predictive qsar models for polyspeci c drug targets: The importance of feature selection," Current Computer-Aided Drug Design, vol. 4, no. 2, pp. 91{110, 2008.
  • L. Zhao and B. Zeng, \Vulnerability analysis of power grids with line switching," IEEE Transactions on Power Systems, vol. 28, no. 3, pp. 2727{2736, 2013.
  • L. Xie, Y. Mo, and B. Sinopoli, \Integrity data attacks in power market operations," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 659{666, 2011.
  • K. Khanna, B. K. Panigrahi, and A. Joshi, \Data integrity attack in smart grid: optimised attack to gain momentary economic pro t," IET Generation, Transmission & Distribution, vol. 10, no. 16, pp. 4032{4039, 2016.
  • K. Hung, W. Lee, V. Li, K. Lui, P. Pong, K.Wong, G. Yang, and J. Zhong, \On wireless sensors communication for overhead transmission line monitoring in power delivery systems," in 2010 First IEEE International Conference on Smart Grid Communications. IEEE, 2010, pp. 309{314.
  • K. G. Vamvoudakis, J. P. Hespanha, B. Sinopoli, and Y. Mo, \Detection in adversarial environments," IEEE Transactions on Automatic Control, vol. 59, no. 12, pp. 3209{ 3223, 2014.
  • K. C. Ruland, J. Sassmannshausen, K. Waedt, and N. Zivic, \Smart grid security{an overview of standards and guidelines," e & i Elektrotechnik und Informationstechnik, vol. 134, no. 1, pp. 19{25, 2017.
  • J.Wang, W. Tu, L. C. Hui, S.-M. Yiu, and E. K.Wang, \Detecting time synchronization attacks in cyber-physical systems with machine learning techniques," in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2017, pp. 2246{2251.
  • J. M. Arroyo and F. J. Fernandez, \A genetic algorithm approach for the analysis of electric grid interdiction with line switching," in Intelligent System Applications to Power Systems, 2009. ISAP'09. 15th International Conference on. IEEE, 2009, pp. 1{6.
  • J. Liu, Y. Xiao, S. Li, W. Liang, and C. P. Chen, \Cyber security and privacy issues in smart grids," IEEE Communications Surveys & Tutorials, vol. 14, no. 4, pp. 981{997, 2012.
  • J. Lin, B. Zhu, P. Zeng, W. Liang, H. Yu, and Y. Xiao, \Monitoring power transmission lines using a wireless sensor network," Wireless Communications and Mobile Computing, vol. 15, no. 14, pp. 1799{1821, 2015.
  • J. I. Huertas, R. Barraza, and J. M. Echeverry, \Wireless data transmission from inside electromagnetic elds," in 2009 6th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE). IEEE, 2009, pp. 1{7.
  • J. Chen, S. Kher, and A. K. Somani, \Energy ecient model for data gathering in structured multiclustered wireless sensor network," in 2006 IEEE International Performance Computing and Communications Conference. IEEE, 2006, pp. 8{pp.
  • J. Casazza, J. Casazza, and F. Delea, Understanding electric power systems: an overview of the technology and the marketplace. John Wiley & Sons, 2003, vol. 13.
  • J. Ausen, B. F. Fitzgerald, E. A. Gust, D. C. Lawry, J. P. Lazar, and R. L. Oye, \Dynamic thermal rating system relieves transmission constraint," in ESMO 2006-2006 IEEE 11th International Conference on Transmission & Distribution Construction, Operation and Live-Line Maintenance. IEEE, 2006.
  • J. Anatory, N. Theethayi, and R. Thottappillil, \Channel characterization for indoor power-line networks," IEEE Transactions on Power Delivery, vol. 24, no. 4, pp. 1883{1888, 2009.
  • I. Steinwart and C. Scovel, \Mercer's theorem on general domains: on the interaction between measures, kernels, and rkhss," Constructive Approximation, vol. 35, no. 3, pp. 363{417, 2012.
  • I. Dietrich and F. Dressler, \On the lifetime of wireless sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 5, no. 1, p. 5, 2009.
  • I. Ashraf, F. Boccardi, and L. Ho, \Sleep mode techniques for small cell deployments," IEEE Communications Magazine, vol. 49, no. 8, pp. 72{79, 2011.
  • H. Ma, L. Zheng, X. Ma et al., \Spectrum aware routing for multi-hop cognitive radio networks with a single transceiver," in 2008 3rd International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CrownCom 2008). IEEE, 2008, pp. 1{6.
  • H. Lin, A. Slagell, Z. Kalbarczyk, P. Sauer, and R. Iyer, \Runtime semantic security analysis to detect and mitigate control-related attacks in power grids," IEEE Transactions on Smart Grid, 2016.
  • H. He and J. Yan, \Cyber-physical attacks and defences in the smart grid: a survey," IET Cyber-Physical Systems: Theory & Applications, vol. 1, no. 1, pp. 13{27, 2016.
  • H. Bao, R. Lu, B. Li, and R. Deng, \Blithe: Behavior rule-based insider threat detection for smart grid," IEEE Internet of Things Journal, vol. 3, no. 2, pp. 190{205, 2016.
  • G. Miao, N. Himayat, Y. Li, and A. Swami, \Cross-layer optimization for energye cient wireless communications: a survey," Wireless Communications and Mobile Computing, vol. 9, no. 4, pp. 529{542, 2009.
  • G. Jiang, P. Xie, H. He, and J. Yan, \Wind turbine fault detection using a denoising autoencoder with temporal information," IEEE/ASME Transactions on Mechatronics, vol. 23, no. 1, pp. 89{100, 2018.
  • G. Jiang, H. He, P. Xie, and Y. Tang, \Stacked multilevel-denoising autoencoders: A new representation learning approach for wind turbine gearbox fault diagnosis," IEEE Transactions on Instrumentation and Measurement, vol. 66, no. 9, pp. 2391{2402, 2017.
  • G. Dan and H. Sandberg, \Stealth attacks and protection schemes for state estimators in power systems," in 2010 First IEEE International Conference on Smart Grid Communications. IEEE, 2010, pp. 214{219.
  • G. Chen, Z. Y. Dong, D. J. Hill, and Y. S. Xue, \Exploring reliable strategies for defending power systems against targeted attacks," IEEE Transactions on Power Systems, vol. 26, no. 3, pp. 1000{1009, 2011.
  • F. T. Liu, K. M. Ting, and Z.-H. Zhou, \Isolation forest," in 2008 Eighth IEEE International Conference on Data Mining. IEEE, 2008, pp. 413{422.
  • F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R.Weiss, V. Dubourg et al., \Scikit-learn: Machine learning in python," Journal of machine learning research, vol. 12, no. Oct, pp. 2825{2830, 2011.
  • F. M. Cleveland, \Cyber security issues for advanced metering infrasttructure (ami)," in 2008 IEEE Power and Energy Society General Meeting-Conversion and Delivery of Electrical Energy in the 21st Century. IEEE, 2008, pp. 1{5.
  • F. Khan, A. ur Rehman, M. Arif, M. Aftab, and B. K. Jadoon, \A survey of communication technologies for smart grid connectivity," in 2016 International Conference on Computing, Electronic and Electrical Engineering (ICE Cube). IEEE, 2016, pp. 256{261.
  • F. Guo, H. Hayat, and J. Wang, \Energy harvesting devices for high voltage transmission line monitoring," in 2011 IEEE Power and Energy Society General Meeting, July 2011, pp. 1{8.
  • E. R. Hruschka, E. R. Hruschka, and N. F. Ebecken, \Feature selection by bayesian networks," in Conference of the Canadian Society for Computational Studies of Intelligence. Springer, 2004, pp. 370{379.
  • E. D. Knapp and R. Samani, Applied cyber security and the smart grid: implementing security controls into the modern power infrastructure. Newnes, 2013.
  • E. Cole, Network security bible. John Wiley & Sons, 2011, vol. 768.
  • D. Tibaduiza, L. Mujica, M. Anaya, J. Rodellar, and A. Guemes, \Principal component analysis vs independent component analysis for damage detection," in Proceedings of the sixth European workshop on Structural Health Monitoring, vol. 2, 2012, pp. 3{6.
  • D. Kushner, \The real story of stuxnet," ieee Spectrum, vol. 3, no. 50, pp. 48{53, 2013.
  • D. Gozupek, S. Buhari, and F. Alagoz, \A spectrum switching delay-aware scheduling algorithm for centralized cognitive radio networks," IEEE Transactions on Mobile Computing, vol. 12, no. 7, pp. 1270{1280, 2013.
  • D. Deka, R. Baldick, and S. Vishwanath, \Data attack on strategic buses in the power grid: Design and protection," in PES General Meeting| Conference & Exposition, 2014 IEEE. IEEE, 2014, pp. 1{5.
  • C.-W. Ten, C.-C. Liu, and G. Manimaran, \Vulnerability assessment of cybersecurity for scada systems," IEEE Transactions on Power Systems, vol. 23, no. 4, pp. 1836{1846, 2008.
  • C.-C. Liu, A. Stefanov, J. Hong, and P. Panciatici, \Intruders in the grid," IEEE Power and Energy magazine, vol. 10, no. 1, pp. 58{66, 2012.
  • C. Y. Ma, D. K. Yau, X. Lou, and N. S. Rao, \Markov game analysis for attack-defense of power networks under possible misinformation," IEEE Transactions on Power Systems, vol. 28, no. 2, pp. 1676{1686, 2013.
  • C. Queiroz, A. Mahmood, and Z. Tari, \Scadasim|a framework for building scada simulations," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 589{597, 2011.
  • C. Pyo, X. Zhang, C. Song, M. Zhou, and H. Harada, \A new standard activity in ieee 802.22 wireless regional area networks: Enhancement for broadband services and monitoring applications in tv whitespace," in The 15th International Symposium on Wireless Personal Multimedia Communications, Sep. 2012, pp. 108{112.
  • C. M. Bishop, Neural Networks for Pattern Recognition. Oxford University Press, 1995.
  • C. H. Papadimitriou and K. Steiglitz, Combinatorial optimization: algorithms and complexity. Courier Corporation, 1998.
  • C. Ambroise and G. J. McLachlan, \Selection bias in gene extraction on the basis of microarray gene-expression data," Proceedings of the national academy of sciences, vol. 99, no. 10, pp. 6562{6566, 2002.
  • B. R. Preiss, Data structures and algorithms. John Wiley & Sons, Inc., 1999.
  • B. Li, R. Lu, W. Wang, and K.-K. R. Choo, \Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system," Journal of Parallel and Distributed Computing, vol. 103, pp. 32{41, 2017.
  • B. Li, R. Lu, W. Wang, and K.-K. R. Choo, \Ddoa: A dirichlet-based detection scheme for opportunistic attacks in smart grid cyber-physical system," IEEE Transactions on Information Forensics and Security, vol. 11, no. 11, pp. 2415{2425, 2016.
  • B. Li, B. Zhang, J. Guo, and J. Yao, \Study on cognitive radio based wireless access communication of power line and substation monitoring system of smart grid," in 2012 International Conference on Computer Science and Service System. IEEE, 2012, pp. 1146{1149.
  • B. Fateh, M. Govindarasu, and V. Ajjarapu, \Wireless network design for transmission line monitoring in smart grid," IEEE transactions on smart grid, vol. 4, no. 2, pp. 1076{1086, 2013.
  • A. Sargolzaei, K. Yen, and M. N. Abdelghani, \Delayed inputs attack on load frequency control in smart grid," in ISGT 2014. IEEE, 2014, pp. 1{5.
  • A. Sanjab and W. Saad, \Data injection attacks on smart grids with multiple adversaries: A game-theoretic perspective," IEEE Transactions on Smart Grid, vol. 7, no. 4, pp. 2038{2049, 2016.
  • A. S. Cacciapuoti, M. Cale, F. Marino, and L. Paura, \Enabling smart grid via tv white space cognitive radio," in 2015 IEEE International Conference on Communication Workshop (ICCW), June 2015, pp. 568{572.
  • A. R. Metke and R. L. Ekl, \Security technology for smart grid networks," IEEE Transactions on Smart Grid, vol. 1, no. 1, pp. 99{107, 2010.
  • A. O. Otuoze, M. W. Mustafa, and R. M. Larik, \Smart grids security challenges: Classi cation by sources of threats," Journal of Electrical Systems and Information Technology, vol. 5, no. 3, pp. 468{483, 2018.
  • A. Monticelli, State estimation in electric power systems: a generalized approach. Springer Science & Business Media, 1999, vol. 507.
  • A. Lee, \Guidelines for smart grid cyber security," Tech. Rep., 2010.
  • A. L. Blum and P. Langley, \Selection of relevant features and examples in machine learning," Arti cial intelligence, vol. 97, no. 1-2, pp. 245{271, 1997.
  • A. K. Jain and B. Chandrasekaran, \Dimensionality and sample size considerations in pattern recognition practice," Handbook of statistics, vol. 2, pp. 835{855, 1982.
  • A. Gomez-Exposito and A. Abur, Power system state estimation: theory and implementation. CRC press, 2004.
  • A. Anwar, A. N. Mahmood, and Z. Tari, \Identi cation of vulnerable node clusters against false data injection attack in an ami based smart grid," Information Systems, vol. 53, pp. 201{212, 2015.
  • A. A. Khan, M. H. Rehmani, and M. Reisslein, \Cognitive radio for smart grids: Survey of architectures, spectrum sensing mechanisms, and networking protocols," IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 860{898, 2016.
  • A. A. Cardenas, S. Amin, and S. Sastry, \Secure control: Towards survivable cyberphysical systems," in Distributed Computing Systems Workshops, 2008. ICDCS'08. 28th International Conference on. IEEE, 2008, pp. 495{500.