|
[1]C. W. Ten, J. Hong, and C. C. Liu, “Anomaly detection for cybersecurity of the substations,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 865–873, Dec. 2011. [2]Y. Chen and B. Lou, “S2A: Secure smart household appliances,” in Proc. 2nd ACM Conf. Data Appl. Sec. Privacy, San Antonio, TX, USA, pp. 217–228, 2012. [3]R. Mitchell and I.-R. Chen, “Behavior-rule based intrusion detection systems for safety critical smart grid applications,” IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1254–1263, Sep. 2013. [4]G.Coates, K.Hopkinson, S.Graham, and S.Kurkowski,“Collaborative, trust-based security mechanisms for a regional utility intranet,” IEEE Trans. Power Syst., vol. 23, no. 3, pp. 831–844, Aug. 2008. [5]Y. Yang, K. McLaughlin, S. Sezer, T. Littler, B. Pranggono, P. Brogan, and H. F. Wang, “Intrusion detection system for network security in synchrophasor systems,” in Proc. IET Int. Conf. Inf. Commun. Technol., Beijing, China, pp. 246–252, 2013. [6]Y. Zhang, L. Wang, W. Sun, R. C. Green II and M. Alam, "Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids," in IEEE Transactions on Smart Grid, vol. 2, no. 4, pp. 796-808, Dec. 2011. [7]H. Hadeli, R. Schierholz, M. Braendle, and C. Tuduce, “Leveraging determinism in industrial control systems for advanced anomaly detection and reliable security configuration,” in Proc. IEEE Conf. Emerg. Technol. Factory Autom., Mallorca, Spain, pp. 1–8, 2009. [8]R. Berthier and W. H. Sanders, “Specification-based intrusion detec- tion for advanced metering infrastructures,” in Proc. IEEE 17th Pac. Rim Int. Symp. Depend. Comput., Pasadena, CA, USA, pp. 184–193, 2011. [9]W. Lee, S. Stolfo, and K. Mok, “A data mining framework for building intrusion detection models,” in Proc. IEEE Symp. Sec. Privacy, Oakland, CA, USA, pp. 120–132, 1999. [10]M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and H. Witten, “The Weka Data Mining Software: An Update,” Sigkdd Explorations, Vol. 11, No. 1, 2009. [11]R. C. Borges Hink, J. M. Beaver, M. A. Buckner, T. Morris, U. Adhikari and S. Pan, "Machine learning for power system disturbance and cyber-attack discrimination," 2014 7th International Symposium on Resilient Control Systems (ISRCS), Denver, CO, pp. 1-8, 2014. [12]P. J. Werbos, "Backpropagation through time: what it does and how to do it," in Proceedings of the IEEE, vol. 78, no. 10, pp. 1550-1560, Oct. 1990.
|