Open Access
Issue
E3S Web Conf.
Volume 260, 2021
2021 International Conference on Advanced Energy, Power and Electrical Engineering (AEPEE2021)
Article Number 02005
Number of page(s) 10
Section Power Electronics Technology and Application
DOI https://doi.org/10.1051/e3sconf/202126002005
Published online 19 May 2021
  1. R. He, H. Xie, J. Deng, T. Feng, L. L. Lai and M. Shahidehpour, “Reliability Modeling and Assessment of Cyber Space in Cyber-Physical Power Systems,” IEEE Trans. Smart Grid, 11, 5, (2020) [Google Scholar]
  2. W. Liu, Q. Gong, H. Han, Z. Wang and L. Wang, “Reliability Modeling and Evaluation of Active Cyber Physical Distribution System,” IEEE Trans. Power Syst., 33, 6, (2018) [Google Scholar]
  3. Telecontrol Equipment and Systems—Part 5-104: Transmission Protocols—Network Access for IeC 60870-5-101 Using Standard Transport Profiles, IEC Standard 60870, (2006) [Google Scholar]
  4. G. Han, B. Xu and J. Suonan, “IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104,” IEEE Trans. Power Del., 27, 4, (2012) [Google Scholar]
  5. J. Valenzuela, J. Wang and N. Bissinger, “Real-time intrusion detection in power system operations,” IEEE Trans. Power Syst., 28, 2, (2013) [Google Scholar]
  6. G. Chaojun, P. Jirutitijaroen and M. Motani, “Detecting False Data Injection Attacks in AC State Estimation,” IEEE Trans. Smart Grid, 6, 5, (2015) [Google Scholar]
  7. J. J. Q. Yu, Y. Hou and V. O. K. Li, “Online False Data Injection Attack Detection With Wavelet Transform and Deep Neural Networks,” IEEE Trans. Industrial Informatics, 14, 7, (2018) [Google Scholar]
  8. W. Guoli, “Traffic Prediction and Attack Detection Approach Based on PSO Optimized Elman Neural Network,” 2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), Qiqihar, China, 2019. [Google Scholar]
  9. M. S. Elsayed, N.-A. Le-Khac, S. Dev and A.D. Jurcut, “Detecting Abnormal Traffic in Large-Scale Networks,” 2020 International Symposium on Networks, Computers and Communications (ISNCC), Montreal, QC, Canada, 2020. [Google Scholar]
  10. U. K. Premaratne, J. Samarabandu, T. S. Sidhu, R. Beresh and J. Tan, “An Intrusion Detection System for IEC61850 Automated Substations,” IEEE Trans. Power Del., 25, 4, (2010) [Google Scholar]
  11. Y. Yang, K. McLaughlin, S. Sezer, Y. B. Yuan and W. Huang, “Stateful intrusion detection for IEC 60870-5-104 SCADA security,” 2014 IEEE PES General Meeting | Conference & Exposition, National Harbor, MD, USA, 2014. [Google Scholar]
  12. Y. Yang, H. Xu, L. Gao, Y. Yuan, K. McLaughlin and S. Sezer, “Multidimensional Intrusion Detection System for IEC 61850-Based SCADA Networks,” IEEE Trans. Power Del., 32, 2, (2017) [Google Scholar]
  13. B. Dong and X. Wang, “Comparison Deep Learning Method to Traditional Methods Using for Network Intrusion Detection,” 2016 8th IEEE International Conference on Communication Software and Networks (ICCSN), Beijing, China, 2016. [Google Scholar]
  14. Y. Yang, K. McLaughlin, T. Littler, S. Sezer, B. Pranggono and H. F. Wang, “Intrusion Detection System for IEC 60870-5-104 based SCADA networks,” 2013 IEEE Power & Energy Society General Meeting, Vancouver, BC, Canada, 2013. [Google Scholar]
  15. W. Lai, M. Zhou, F. Hu, K. Bian and Q. Song, “A New DBSCAN Parameters Determination Method Based on Improved MVO,” IEEE Access, 7, 2019. [Google Scholar]
  16. P. Musil and P. Mlynek, “Overview of Communication Scenarios for IEC 60870-5-104 Substation Model,” 2020 21st International Scientific Conference on Electric Power Engineering (EPE), Prague, Czech Republic, 2020. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.