, Blackout in the United States and Canada: Causes and Recommendations, 2003.
Operational technology: Are you vulnerable?, Governance Directions, vol.68, issue.6, pp.339-343, 2016. ,
, Progress and Research in Cybersecurity: Supporting a Resilient and Trustworthy System for the UK, 2016.
False data injection attacks against state estimation in electric power grids, Proc ,
, ACM Conf. on Computer and Communications Security, pp.21-32, 2009.
Stealth Attacks and Protection Schemes for State Estimators in Power Systems, 2010 First IEEE International Conference on Smart Grid Communications, pp.214-219, 2010. ,
DOI : 10.1109/SMARTGRID.2010.5622046
On security indices for state estimators in power networks, Proc. 1st Workshop on Secure Control Systems, 2010. ,
On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem, IEEE Transactions on Smart Grid, vol.4, issue.2, pp.856-865, 2013. ,
DOI : 10.1109/TSG.2012.2230199
Strategic Protection Against Data Injection Attacks on Power Grids, IEEE Transactions on Smart Grid, vol.2, issue.2, pp.326-333, 2011. ,
DOI : 10.1109/TSG.2011.2119336
Distributed joint cyber attack detection and state recovery in smart grids, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.202-207, 2011. ,
DOI : 10.1109/SmartGridComm.2011.6102319
Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models, IEEE Journal on Selected Areas in Communications, vol.31, issue.7, pp.1306-1318, 2013. ,
DOI : 10.1109/JSAC.2013.130713
Recovering missing data via matrix completion in electricity distribution systems, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp.1-6, 2016. ,
DOI : 10.1109/SPAWC.2016.7536744
URL : https://hal.archives-ouvertes.fr/hal-01322929
Malicious Data Attacks on the Smart Grid, IEEE Transactions on Smart Grid, vol.2, issue.4, pp.645-658, 2011. ,
DOI : 10.1109/TSG.2011.2163807
Maximum Distortion Attacks in Electricity Grids, IEEE Transactions on Smart Grid, vol.7, issue.4, pp.2007-2015, 2016. ,
DOI : 10.1109/TSG.2016.2550420
URL : https://hal.archives-ouvertes.fr/hal-01343248
An Information-Theoretic Approach to PMU Placement in Electric Power Systems, IEEE Transactions on Smart Grid, vol.4, issue.1, pp.446-456, 2013. ,
DOI : 10.1109/TSG.2012.2228242
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1932-1935, 2011. ,
DOI : 10.1109/ICASSP.2011.5946886
Smart Meter Privacy: A Theoretical Framework, IEEE Transactions on Smart Grid, vol.4, issue.2, pp.837-846, 2013. ,
DOI : 10.1109/TSG.2012.2211046
Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices, IEEE Journal on Selected Areas in Communications, vol.31, issue.7, pp.1331-1341, 2013. ,
DOI : 10.1109/JSAC.2013.130715
Smart meter privacy via the trapdoor channel, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.227-282, 2017. ,
DOI : 10.1109/SmartGridComm.2017.8340722
Information-theoretic attacks in the smart grid, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm) ,
DOI : 10.1109/SmartGridComm.2017.8340708
URL : https://hal.archives-ouvertes.fr/hal-01574532
, Conf. on Smart Grid Comm, pp.455-460, 2017.
Effective secrecy: Reliability, confusion and stealth, Proc. IEEE Int. Symp. on Information Theory, pp.601-605, 2014. ,
Network-layer protection schemes against stealth attacks on state estimators in power systems, IEEE Int. Conf. on Smart Grid Comm, pp.184-189, 2011. ,
Bad data injection in smart grid: attack and defense mechanisms, IEEE Communications Magazine, vol.51, issue.1, pp.27-33, 2013. ,
DOI : 10.1109/MCOM.2013.6400435
Adaptive estimation of a quadratic functional of a density by model selection, ESAIM: Probability and Statistics, vol.28, issue.5, pp.1302-1338, 2000. ,
DOI : 10.1214/aos/1015957395
Power System State Estimation: Theory and Implementation, 2004. ,
DOI : 10.1201/9780203913673
, , 1994.
Worst-Case Additive Noise in Wireless Networks, IEEE Transactions on Information Theory, vol.59, issue.6, pp.3833-3847, 2013. ,
DOI : 10.1109/TIT.2013.2248875
On the problem of the most efficient tests of statistical hypotheses, Breakthroughs in Statistics, pp.73-108, 1992. ,
, Elements of Information Theory, 2012.
Convex Optimization, 2004. ,
A comparison of efficient approximations for a weighted sum of chi-squared random variables, Statistics and Computing, vol.35, issue.3, pp.917-928, 2016. ,
DOI : 10.1214/009053606000001505
Moment-based approximations of distributions using mixtures: Theory and applications, Ann. Inst. Stat. Math, vol.52, issue.2, pp.215-230, 2000. ,
A tail inequality for quadratic forms of subgaussian random vectors, Electronic Communications in Probability, vol.17, issue.0, pp.1-6, 2012. ,
DOI : 10.1214/ECP.v17-2079
MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education, IEEE Transactions on Power Systems, vol.26, issue.1, pp.12-19, 2011. ,
DOI : 10.1109/TPWRS.2010.2051168
Momentchi2: Moment-Matching Methods for Weighted Sums of Chi-Squared Random Variables Available: https://cran.r-project, 2016. ,