, Blackout in the United States and Canada: Causes and Recommendations, 2003.

D. Alderson and R. D. Pietro, Operational technology: Are you vulnerable?, Governance Directions, vol.68, issue.6, pp.339-343, 2016.

, Progress and Research in Cybersecurity: Supporting a Resilient and Trustworthy System for the UK, 2016.

Y. Liu, P. Ning, and M. K. Reiter, False data injection attacks against state estimation in electric power grids, Proc

, ACM Conf. on Computer and Communications Security, pp.21-32, 2009.

G. Dan and H. Sandberg, Stealth Attacks and Protection Schemes for State Estimators in Power Systems, 2010 First IEEE International Conference on Smart Grid Communications, pp.214-219, 2010.
DOI : 10.1109/SMARTGRID.2010.5622046

H. Sandberg, A. Teixeira, and K. H. Johansson, On security indices for state estimators in power networks, Proc. 1st Workshop on Secure Control Systems, 2010.

K. C. Sou, H. Sandberg, and K. H. Johansson, On the Exact Solution to a Smart Grid Cyber-Security Analysis Problem, IEEE Transactions on Smart Grid, vol.4, issue.2, pp.856-865, 2013.
DOI : 10.1109/TSG.2012.2230199

T. T. Kim and H. V. Poor, Strategic Protection Against Data Injection Attacks on Power Grids, IEEE Transactions on Smart Grid, vol.2, issue.2, pp.326-333, 2011.
DOI : 10.1109/TSG.2011.2119336

A. Tajer, S. Kar, H. V. Poor, and S. Cui, Distributed joint cyber attack detection and state recovery in smart grids, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.202-207, 2011.
DOI : 10.1109/SmartGridComm.2011.6102319

M. Ozay, I. Esnaola, F. T. Vural, S. R. Kulkarni, and H. V. Poor, Sparse Attack Construction and State Estimation in the Smart Grid: Centralized and Distributed Models, IEEE Journal on Selected Areas in Communications, vol.31, issue.7, pp.1306-1318, 2013.
DOI : 10.1109/JSAC.2013.130713

C. Genes, I. Esnaola, S. M. Perlaza, L. F. Ochoa, and D. Coca, Recovering missing data via matrix completion in electricity distribution systems, 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), pp.1-6, 2016.
DOI : 10.1109/SPAWC.2016.7536744

URL : https://hal.archives-ouvertes.fr/hal-01322929

O. Kosut, L. Jia, R. J. Thomas, and L. Tong, Malicious Data Attacks on the Smart Grid, IEEE Transactions on Smart Grid, vol.2, issue.4, pp.645-658, 2011.
DOI : 10.1109/TSG.2011.2163807

I. Esnaola, S. M. Perlaza, H. V. Poor, and O. Kosut, Maximum Distortion Attacks in Electricity Grids, IEEE Transactions on Smart Grid, vol.7, issue.4, pp.2007-2015, 2016.
DOI : 10.1109/TSG.2016.2550420

URL : https://hal.archives-ouvertes.fr/hal-01343248

Q. Li, T. Cui, Y. Weng, R. Negi, F. Franchetti et al., An Information-Theoretic Approach to PMU Placement in Electric Power Systems, IEEE Transactions on Smart Grid, vol.4, issue.1, pp.446-456, 2013.
DOI : 10.1109/TSG.2012.2228242

D. Varodayan and A. Khisti, Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp.1932-1935, 2011.
DOI : 10.1109/ICASSP.2011.5946886

L. Sankar, S. R. Rajagopalan, S. Mohajer, and H. V. Poor, Smart Meter Privacy: A Theoretical Framework, IEEE Transactions on Smart Grid, vol.4, issue.2, pp.837-846, 2013.
DOI : 10.1109/TSG.2012.2211046

O. Tan, D. Gündüz, and H. V. Poor, Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices, IEEE Journal on Selected Areas in Communications, vol.31, issue.7, pp.1331-1341, 2013.
DOI : 10.1109/JSAC.2013.130715

M. Arrieta and I. Esnaola, Smart meter privacy via the trapdoor channel, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp.227-282, 2017.
DOI : 10.1109/SmartGridComm.2017.8340722

K. Sun, I. Esnaola, S. M. Perlaza, and H. V. Poor, Information-theoretic attacks in the smart grid, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm)
DOI : 10.1109/SmartGridComm.2017.8340708

URL : https://hal.archives-ouvertes.fr/hal-01574532

, Conf. on Smart Grid Comm, pp.455-460, 2017.

J. Hou and G. Kramer, Effective secrecy: Reliability, confusion and stealth, Proc. IEEE Int. Symp. on Information Theory, pp.601-605, 2014.

O. Vukovi´cvukovi´c, K. C. Sou, G. Dán, and H. Sandberg, Network-layer protection schemes against stealth attacks on state estimators in power systems, IEEE Int. Conf. on Smart Grid Comm, pp.184-189, 2011.

Y. Huang, M. Esmalifalak, H. Nguyen, R. Zheng, Z. Han et al., Bad data injection in smart grid: attack and defense mechanisms, IEEE Communications Magazine, vol.51, issue.1, pp.27-33, 2013.
DOI : 10.1109/MCOM.2013.6400435

B. Laurent and P. Massart, Adaptive estimation of a quadratic functional of a density by model selection, ESAIM: Probability and Statistics, vol.28, issue.5, pp.1302-1338, 2000.
DOI : 10.1214/aos/1015957395

A. Abur and A. G. Expósito, Power System State Estimation: Theory and Implementation, 2004.
DOI : 10.1201/9780203913673

J. J. Grainger and W. D. Stevenson, , 1994.

I. Shomorony and A. S. Avestimehr, Worst-Case Additive Noise in Wireless Networks, IEEE Transactions on Information Theory, vol.59, issue.6, pp.3833-3847, 2013.
DOI : 10.1109/TIT.2013.2248875

J. Neyman and E. S. Pearson, On the problem of the most efficient tests of statistical hypotheses, Breakthroughs in Statistics, pp.73-108, 1992.

T. M. Cover and J. A. Thomas, Elements of Information Theory, 2012.

S. Boyd and L. Vandenberghe, Convex Optimization, 2004.

D. A. Bodenham and N. M. Adams, A comparison of efficient approximations for a weighted sum of chi-squared random variables, Statistics and Computing, vol.35, issue.3, pp.917-928, 2016.
DOI : 10.1214/009053606000001505

G. Bruce, R. S. Lindsay, P. Pilla, and . Basak, Moment-based approximations of distributions using mixtures: Theory and applications, Ann. Inst. Stat. Math, vol.52, issue.2, pp.215-230, 2000.

D. Hsu, S. M. Kakade, and T. Zhang, A tail inequality for quadratic forms of subgaussian random vectors, Electronic Communications in Probability, vol.17, issue.0, pp.1-6, 2012.
DOI : 10.1214/ECP.v17-2079

R. D. Zimmerman, C. E. Murillo-sánchez, and R. J. Thomas, MATPOWER: Steady-State Operations, Planning, and Analysis Tools for Power Systems Research and Education, IEEE Transactions on Power Systems, vol.26, issue.1, pp.12-19, 2011.
DOI : 10.1109/TPWRS.2010.2051168

D. Bodenham, Momentchi2: Moment-Matching Methods for Weighted Sums of Chi-Squared Random Variables Available: https://cran.r-project, 2016.