1 |
Q. Pu et al., "Detection Mechanism of FDI Attack Feature Based on Deep Learning," in 2018 IEEE SmartWorld, Ubiquitous Intelligence Computing, Advanced Trusted Computing, Scalable Computing Communications, Cloud Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Oct. 2018, pp. 1761-1765. doi: 10.1109/SmartWorld.2018.00297.
DOI
|
2 |
S. P. Nandanoori, S. Kundu, S. Pal, K. Agarwal, and S. Choudhury, "Model-Agnostic Algorithm for Real-Time Attack Identification in Power Grid using Koopman Modes," in 2020 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), Nov. 2020, pp. 1-6. doi: 10.1109/SmartGridComm47815.2020.9303022.
DOI
|
3 |
J. Sullivan, "Neural Network from Scratch: Perceptron Linear Classifier," John Sullivan, Aug. 16, 2017. https://jtsulliv.github.io/perceptron/ (accessed Jan. 13, 2021).
|
4 |
"Bill Calculator." https://mzec.nama.om/enus/Pages/billcalculator.aspx (accessed Mar. 19, 2021).
|
5 |
Y. S. Patil and S. V. Sankpal, "EGSP: Enhanced Grid Sensor Placement Algorithm for Energy Theft Detection in Smart Grids," in 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), Mar. 2019, pp. 1-5. doi: 10.1109/I2CT45611.2019.9033759.
DOI
|
6 |
A. Sanjab, W. Saad, I. Guvenc, A. Sarwat, and S. Biswas, "Smart Grid Security: Threats, Challenges, and Solutions," arXiv:1606.06992 [cs, math], Jun. 2016, Accessed: Mar. 06, 2021. [Online]. Available: http://arxiv.org/abs/1606.06992
|
7 |
A. Takiddin, M. Ismail, U. Zafar, and E. Serpedin, "Robust Electricity Theft Detection Against Data Poisoning Attacks in Smart Grids," IEEE Transactions on Smart Grid, pp. 1-1, 2020, doi: 10.1109/TSG.2020.3047864.
DOI
|
8 |
J. Jiang and Y. Qian, "Defense Mechanisms against Data Injection Attacks in Smart Grid Networks," IEEE Communications Magazine, vol. 55, no. 10, pp. 76-82, Oct. 2017, doi: 10.1109/MCOM.2017.1700180.
DOI
|
9 |
L. Zhang, X. Shen, F. Zhang, M. Ren, B. Ge, and B. Li, "Anomaly Detection for Power Grid Based on Time Series Model," in 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Aug. 2019, pp. 188-192. doi: 10.1109/CSE/EUC.2019.00044.
DOI
|
10 |
X. Xia, Y. Xiao, W. Liang, and M. Zheng, "GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids," IEEE Transactions on Network Science and Engineering, vol. 7, no. 2, pp. 805-816, Apr. 2020, doi: 10.1109/TNSE.2018.2855139.
DOI
|
11 |
Y. He, G. J. Mendis, and J. Wei, "Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism," IEEE Transactions on Smart Grid, vol. 8, no. 5, pp. 2505-2516, Sep. 2017, doi: 10.1109/TSG.2017.2703842.
DOI
|
12 |
"Figure 1. Graphical presentation of the support vector machine...," ResearchGate. https://www.researchgate.net/figure/Graphicalpresentation-of-the-support-vector-machine-classifier-with-a-non-linear-kernel_fig1_299529384 (accessed Jan. 13, 2021).
|
13 |
ETV 2 NITTTRCHD, Cyber Security in Smart Grid: Overview Session 1 Module 15 by Janorious Rabeela, (Jan. 04, 2019). Accessed: Feb. 16, 2021. [Online Video]. Available: https://www.youtube.com/watch?v=bvGrh7lITeE
|
14 |
M. Jouini, L. B. A. Rabai, and A. B. Aissa, "Classification of Security Threats in Information Systems," Procedia Computer Science, vol. 32, pp. 489-496, Jan. 2014, doi: 10.1016/j.procs.2014.05.452.
DOI
|
15 |
E. Drayer and T. Routtenberg, "Detection of False Data Injection Attacks in Smart Grids Based on Graph Signal Processing," IEEE Systems Journal, vol. 14, no. 2, pp. 1886-1896, Jun. 2020, doi: 10.1109/JSYST.2019.2927469.
DOI
|
16 |
X. Xia, Y. Xiao, and W. Liang, "ABSI: An Adaptive Binary Splitting Algorithm for Malicious Meter Inspection in Smart Grid," IEEE Transactions on Information Forensics and Security, vol. 14, no. 2, pp. 445-458, Feb. 2019, doi: 10.1109/TIFS.2018.2854703.
DOI
|
17 |
W. Zhe, C. Wei, and L. Chunlin, "DoS attack detection model of smart grid based on machine learning method," in 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), Jul. 2020, pp. 735-738. doi: 10.1109/ICPICS50287.2020.9202401.
DOI
|
18 |
S. S. Keerthi and C.-J. Lin, "Asymptotic Behaviors of Support Vector Machines with Gaussian Kernel," Neural Computation, vol. 15, no. 7, pp. 1667-1689, Jul. 2003, doi: 10.1162/089976603321891855.
DOI
|
19 |
C. Kaygusuz, L. Babun, H. Aksu, and A. S. Uluagac, "Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques," in 2018 IEEE International Conference on Communications (ICC), May 2018, pp. 1-6. doi: 10.1109/ICC.2018.8423022.
DOI
|
20 |
S. Tan, W. Song, M. Stewart, J. Yang, and L. Tong, "Online Data Integrity Attacks Against Real-Time Electrical Market in Smart Grid," IEEE Transactions on Smart Grid, vol. 9, no. 1, pp. 313-322, Jan. 2018, doi: 10.1109/TSG.2016.2550801.
DOI
|
21 |
G. C. Calafiore and L. E. Ghaoui, Optimization Models. Cambridge University Press, 2014.
|
22 |
R. Grosse, "Lecture 3: Linear Classification," p. 10.
|
23 |
"Pages - Home." https://mzec.nama.om/enus/Pages/home.aspx (accessed Mar. 19, 2021).
|
24 |
F. Aloul, A. R. Al-Ali, R. Al-Dalky, M. Al-Mardini, and W. El-Hajj, "Smart Grid Security: Threats, Vulnerabilities and Solutions," SGCE, pp. 1-6, 2012, doi: 10.12720/sgce.1.1.1-6.
|
25 |
"Fig. 4. SVM classification with a hyperplane that maximizes the...," ResearchGate. https://www.researchgate.net/figure/SVM-classificationwith-a-hyperplane-that-maximizes-the-separating-margin-between-the-two_fig3_221926953 (accessed Jan. 13, 2021).
|
26 |
N. Cristianini, J. Shawe-Taylor, and D. of C. S. R. H. J. Shawe-Taylor, An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. Cambridge University Press, 2000.
|
27 |
M. Uma and G. Padmavathi, "A Survey on Various Cyber Attacks and Their Classification," p. 7, 2013.
|
28 |
D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. Rohde, "Protecting Smart Grid Automation Systems Against Cyberattacks," IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 782-795, Dec. 2011, doi: 10.1109/TSG.2011.2159999.
DOI
|