IEEE/CAA Journal of Automatica Sinica
Citation: | Song Deng, Dong Yue, Xiong Fu and Aihua Zhou, "Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming," IEEE/CAA J. of Autom. Sinica, vol. 2, no. 4, pp. 431-439, 2015. |
[1] |
Zhao Jun-Hua, Wen Fu-Shuan, Xue Yu-Sheng, Li Xue, Dong Zhao-Yang. Cyber physical power systems: architecture, implementation techniques and challenges. Automation of Electric Power Systems, 2010, 34(16): 1-7 (in Chinese)
|
[2] |
Ju Ping, Qin Chuan, Huang Hua, Wu Feng, Jin Yu-Qing. Research trends of power system modeling geared to smart grid. Automation of Electric Power Systems, 2012, 36(11): 1-6 (in Chinese)
|
[3] |
Yu Yi-Xin, Luan Wen-Peng. Basic philosophy of smart grid. Journal of Tianjin University, 2011, 44(5): 377-384 (in Chinese)
|
[4] |
Vellaithurai C, Srivastava A, Zonouz S, Berthier R. CPINDEX: cyberphysical vulnerability assessment for power-grid infrastructures. IEEE Transactions on Smart Grid, 2015, 6(2): 566-575
|
[5] |
Hong J H, Liu C C, Govindarasu M. Integrated anomaly detection for cyber security of the substations. IEEE Transactions on Smart Grid, 2014, 5(4): 1643-1653
|
[6] |
Sridhar S, Govindarasu M. Model-based attack detection and mitigation for automatic generation control. IEEE Transactions on Smart Grid, 2014, 5(2): 580-591
|
[7] |
Zonouz S, Davis C M, Davis K R, Berthier R, Bobba R B, Sanders W H. SOCCA: a security-oriented cyber-physical contingency analysis in power infrastructures. IEEE Transactions on Smart Grid, 2014, 5(1): 3-13
|
[8] |
Hu J K, Pota H R, Guo S. Taxonomy of attacks for agent-based smart grids. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(7): 1886-1895
|
[9] |
Mei Sheng-Wei, Wang Ying-Ying, Chen Lai-Jun. Overviews and prospects of the cyber security of smart grid from the view of complex network theory. High Voltage Engineering, 2011, 37(3): 672-679 (in Chinese)
|
[10] |
Feng Deng-Guo, Zhang Yang, Zhang Yu-Qing. Survey of information security risk assessment. Journal of China Institute of Communications, 2004, 25(7): 10-18 (in Chinese)
|
[11] |
Guo Chuang-Xin, Yu Bin, Guo Jia, Wen Bo-Jian, Zhang Jin-Jiang, Zhang Li, Lu Hai-Bo, Li Bo. Security risk assessment of the IEC61850-based substation automation system. Proceedings of the CSEE, 2014, 34(4): 685-694 (in Chinese)
|
[12] |
Liu N, Zhang J H, Wu X. Asset analysis of risk assessment for IEC 61850-based power control systems, Part I: methodology. IEEE Transactions on Power Delivery, 2011, 26(2): 869-875
|
[13] |
Liu N, Zhang J H, Wu X. Asset analysis of risk assessment for IEC 61850-based power control systems, Part II: application in substation. IEEE Transactions on Power Delivery, 2011, 26(2): 876-881
|
[14] |
Bompard E, Gao C W, Napoli R, Russo A, Masera M, Stefanini A. Risk assessment of malicious attacks against power systems. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 2009, 39(5): 1074-1085
|
[15] |
Zhang Li, Yao Yi-Zhan, Peng Jian-Fen, Chen Hong-Bo, Du Yu-Ge. Intelligent information security risk assessment based on a decision tree algorithm. Journal of Tsinghua University (Science and Technology), 2011, 51(10): 1236-1239 (in Chinese)
|
[16] |
Zhao Dong-Mei, Liu Jin-Xing, Ma Jian-Feng. Risk assessment of information security based on improved wavelet neural network. Computer Science, 2010, 37(2): 90-93 (in Chinese)
|
[17] |
Zhao Gang, Wu Tian-Shui. Information security risk assessment based on G-ANP. Journal of Tsinghua University (Science and Technology), 2013, 53(12): 1761-1767 (in Chinese)
|
[18] |
Chang L Y, Lee Z J. Applying fuzzy expert system to information security risk assessment-a case study on an attendance system. In: Proceedings of the 2013 International Conference on Fuzzy Theory and Its Applications. Taipei, China: IEEE, 2013. 346-351
|
[19] |
Wang Bo. Research on Security Risk and Vulnerability Assessment Methods of Complicated Power System [Ph. D. dissertation], Huazhong University of Science and Technology, China, 2011. (in Chinese)
|
[20] |
Yin Lin-Zi, Yang Chun-Hua, Wang Xiao-Li, Gui Wei-Hua. An incremental algorithm for attribute reduction based on labeled discernibility matrix. Acta Automatica Sinica, 2014, 40(3): 397-404 (in Chinese)
|
[21] |
Jiang Yun-Liang, Yang Zhang-Xian, Liu Yong. Quick distribution reduction algorithm in inconsistent information system. Acta Automatica Sinica, 2012, 38(3): 382-388 (in Chinese)
|
[22] |
Pawlak Z. Rough sets. International Journal of Computer and Information Sciences, 1982, 11(5): 341-356
|
[23] |
Zeng Qing-Hong, Lu De-Tang. Curve and surface fitting based on moving least-squares methods. Journal of Engineering Graphics, 2004, 25(1): 84-89 (in Chinese)
|
[24] |
Koza J R. Genetic Programming II: Automatic Discovery of Reusable Programs. Cambridge: MIT Press, 1994. 110-199
|
[25] |
Ferreira, C. Gene expression programming: a new adaptive algorithm for solving problems. Complex Systems, 2001, 13(2): 87-129
|
[26] |
Deng S, Wang R C, Fu X, Yang L C. Gene expression programming for attribution reduction in rough set. International Journal of Computers and Applications, 2010, 32(2): 226-231
|
[27] |
Hu Jian-Jun, Tang Chang-Jie, Duan Lei, Zuo Jie, Peng Jing, Yuan Chang-An. The strategy for diversifying initial population of gene expression programming. Chinese Journal of Computers, 2007, 30(2): 305-310 (in Chinese)
|
[28] |
Liu Qi-Hong, Tang Chang-Jie, Hu Jian-Jun, Zeng Tao, Liu Ying-Tian, Qiu Jiang-Tao. Gene expression programming based on diversity-guided grading evolution. Journal of Sichuan University (Engineering Science Edition), 2006, 38(6): 108-113 (in Chinese)
|
[29] |
Deng Song, Wang Ru-Chuan. Classification of distributed GEP-BP based on grid service. Acta Electronica Sinica, 2009, 37(11): 2600-2603 (in Chinese)
|
[30] |
Header A -R, Wang J, Fukushima M. Tabu search for attribute reduction in rough set theory. Soft Computing, 2007, 12(9): 909-918
|