{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T04:12:48Z","timestamp":1727064768064},"reference-count":41,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61833011","61673255","61533010"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003399","name":"Shanghai Science and Technology Commission","doi-asserted-by":"publisher","award":["18XD1401600"],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1016\/j.ins.2019.08.080","type":"journal-article","created":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T12:22:39Z","timestamp":1567081359000},"page":"380-392","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":13,"special_numbering":"C","title":["A penalty-based adaptive secure estimation for power systems under false data injection attacks"],"prefix":"10.1016","volume":"508","author":[{"given":"Minjing","family":"Yang","sequence":"first","affiliation":[]},{"given":"Hao","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3652-2233","authenticated-orcid":false,"given":"Chen","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6508-0051","authenticated-orcid":false,"given":"Yulong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2019.08.080_bib0001","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1109\/ACCESS.2015.2389659","article-title":"Synchrophasor measurement technology in power systems: panorama and state-of-the-art","volume":"2","author":"Aminifar","year":"2014","journal-title":"IEEE Access"},{"issue":"12","key":"10.1016\/j.ins.2019.08.080_bib0002","doi-asserted-by":"crossref","first-page":"3299","DOI":"10.1109\/TAC.2015.2416926","article-title":"Risk-sensitive control under markov modulated denial-of-service (dos) attack strategies","volume":"60","author":"Befekadu","year":"2015","journal-title":"IEEE Trans. Autom. Control"},{"issue":"6","key":"10.1016\/j.ins.2019.08.080_bib0003","doi-asserted-by":"crossref","first-page":"2372","DOI":"10.1109\/TCYB.2018.2827037","article-title":"Neural-network-based output-feedback control under round-robin scheduling protocols","volume":"49","author":"Ding","year":"2019","journal-title":"IEEE Trans. Cybern."},{"issue":"5","key":"10.1016\/j.ins.2019.08.080_bib0004","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/TII.2019.2905295","article-title":"A survey on model-based distributed control and filtering for industrial cyber-physical systems","volume":"15","author":"Ding","year":"2019","journal-title":"IEEE Trans. Indus. Inf."},{"issue":"1","key":"10.1016\/j.ins.2019.08.080_bib0005","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/00396338.2011.555586","article-title":"Stuxnet and the future of cyber war","volume":"53","author":"Farwell","year":"2011","journal-title":"Survival"},{"issue":"6","key":"10.1016\/j.ins.2019.08.080_bib0006","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1109\/TAC.2014.2303233","article-title":"Secure estimation and control for cyber-physical systems under adversarial attacks","volume":"59","author":"Fawzi","year":"2014","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.08.080_bib0007","doi-asserted-by":"crossref","DOI":"10.1109\/TCYB.2017.2769722","article-title":"Distributed event-triggered estimation over sensor networks: a survey","author":"Ge","year":"2019","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2019.08.080_bib0008","series-title":"Proceedings of IEEE International Conference on Evolutionary Computation","first-page":"804","article-title":"A survey of penalty techniques in genetic algorithms","author":"Gen","year":"1996"},{"issue":"1","key":"10.1016\/j.ins.2019.08.080_bib0009","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1109\/TCYB.2017.2769722","article-title":"A dynamic event-triggered transmission scheme for distributed set-membership estimation over wireless sensor networks","volume":"49","author":"Ge","year":"2019","journal-title":"IEEE Trans. Cybern."},{"issue":"4","key":"10.1016\/j.ins.2019.08.080_bib0010","doi-asserted-by":"crossref","first-page":"1060","DOI":"10.1016\/j.epsr.2010.11.012","article-title":"A taxonomy of multi-area state estimation methods","volume":"81","author":"Gmez-Expsito","year":"2011","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.ins.2019.08.080_bib0011","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.epsr.2015.02.002","article-title":"Methodology for multiarea state estimation solved by a decomposition method","volume":"123","author":"Gonzlez","year":"2015","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.ins.2019.08.080_bib0012","doi-asserted-by":"crossref","DOI":"10.1109\/TCYB.2019.2903817","article-title":"Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks","author":"Hu","year":"2019","journal-title":"IEEE Trans. Cybern."},{"issue":"2","key":"10.1016\/j.ins.2019.08.080_bib0013","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1023\/A:1004603514434","article-title":"Alternating direction method with self-adaptive penalty parameters for monotone variational inequalities","volume":"106","author":"He","year":"2000","journal-title":"J. Optim. Theory Appl."},{"issue":"1","key":"10.1016\/j.ins.2019.08.080_bib0014","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/BF02392210","article-title":"On some non-linear elliptic differential-functional equations","volume":"115","author":"Hartman","year":"1966","journal-title":"Acta Math."},{"key":"10.1016\/j.ins.2019.08.080_bib0015","series-title":"Numerical Analysis and Applications","article-title":"An introduction to variational inequalities: elementary theory","author":"Han","year":"2007"},{"issue":"1","key":"10.1016\/j.ins.2019.08.080_bib0016","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1109\/TPWRS.2004.840438","article-title":"Recent philosophies of automatic generation control strategies in power systems","volume":"20","author":"Ibraheem","year":"2005","journal-title":"IEEE Trans. Power Syst."},{"issue":"4","key":"10.1016\/j.ins.2019.08.080_bib0017","doi-asserted-by":"crossref","first-page":"1580","DOI":"10.1109\/TPWRS.2008.2002285","article-title":"Diakoptic state estimation using phasor measurement units","volume":"23","author":"Jiang","year":"2008","journal-title":"IEEE Trans. Power Syst."},{"issue":"2","key":"10.1016\/j.ins.2019.08.080_bib0018","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/TPWRS.2012.2219629","article-title":"Distributed robust power system state estimation","volume":"28","author":"Kekatos","year":"2013","journal-title":"IEEE Trans. Power Syst."},{"issue":"2","key":"10.1016\/j.ins.2019.08.080_bib0019","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1109\/TSG.2013.2284438","article-title":"Detecting false data injection attacks on power grid by sparse optimization","volume":"5","author":"Liu","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"10.1016\/j.ins.2019.08.080_bib0020","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1952982.1952995","article-title":"False data injection attacks against state estimation in electric power grids","volume":"14","author":"Liu","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"6","key":"10.1016\/j.ins.2019.08.080_bib0021","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1049\/ip-gtd:20010563","article-title":"Power system harmonics estimation using linear least squares method and SVD","volume":"148","author":"Lobos","year":"2001","journal-title":"IEEE Proceed.-Gener. Transmission Distrib."},{"key":"10.1016\/j.ins.2019.08.080_bib0022","series-title":"Power and Energy Society General Meeting","first-page":"1","article-title":"The supercalibratora fully distributed state estimator","author":"Meliopoulos","year":"2010"},{"key":"10.1016\/j.ins.2019.08.080_bib0023","series-title":"Network Economics: A Variational Inequality Approach","author":"Nagurney","year":"2013"},{"issue":"1","key":"10.1016\/j.ins.2019.08.080_bib0024","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1287\/trsc.30.1.3","article-title":"Transportation network policy modeling with goal targets and generalized penalty functions","volume":"30","author":"Nagurney","year":"1996","journal-title":"Transp. Sci."},{"issue":"3","key":"10.1016\/j.ins.2019.08.080_bib0025","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1109\/TSMC.2018.2814572","article-title":"Consensus of multi-agent systems with nonlinear dynamics using an integrated sampled-data-based event-triggered communication scheme","volume":"49","author":"Peng","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"5","key":"10.1016\/j.ins.2019.08.080_bib0026","doi-asserted-by":"crossref","first-page":"4110","DOI":"10.1109\/TPWRS.2016.2634122","article-title":"Resilient event-triggered h\u221e load frequency control for networked power systems with energy-limited dos attacks","volume":"32","author":"Peng","year":"2017","journal-title":"IEEE Trans. Power Syst."},{"issue":"8","key":"10.1016\/j.ins.2019.08.080_bib0027","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1109\/TSMC.2018.2884952","article-title":"A survey on security communication and control for smart grids under malicious cyber attacks","volume":"49","author":"Peng","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"issue":"2","key":"10.1016\/j.ins.2019.08.080_bib0028","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1109\/TIE.2015.2504044","article-title":"On designing a novel self-triggered sampling scheme for networked control systems with network-induced delays and data dropouts","volume":"63","author":"Peng","year":"2016","journal-title":"IEEE Trans. Ind. Electron."},{"issue":"2","key":"10.1016\/j.ins.2019.08.080_bib0029","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1109\/TPWRS.2009.2036822","article-title":"Computing rightmost eigenvalues for small-signal stability assessment of large-scale power systems","volume":"25","author":"Rommes","year":"2010","journal-title":"EEE Trans. Power Syst."},{"issue":"8","key":"10.1016\/j.ins.2019.08.080_bib0030","doi-asserted-by":"crossref","first-page":"2079","DOI":"10.1109\/TAC.2015.2492159","article-title":"Event-triggered state observers for sparse sensor noise\/attacks","volume":"61","author":"Shoukry","year":"2016","journal-title":"IEEE Trans. Autom. Control"},{"key":"10.1016\/j.ins.2019.08.080_bib0031","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1016\/j.automatica.2014.10.067","article-title":"A secure control framework for resource-limited adversaries","volume":"51","author":"Teixeira","year":"2015","journal-title":"Automatica"},{"key":"10.1016\/j.ins.2019.08.080_bib0032","series-title":"Joint International Conference on Power System Technology","first-page":"1","article-title":"A review of power system dynamic state estimation techniques","author":"Shivakumar","year":"2008"},{"key":"10.1016\/j.ins.2019.08.080_bib0033","series-title":"Proceedings of the IEEE","first-page":"80","article-title":"Wide-area monitoring, protection, and control of future electric power networks","volume":"volume\u00a099","author":"Terzija","year":"2011"},{"key":"10.1016\/j.ins.2019.08.080_bib0034","series-title":"Protecting Industrial Control Systems from Electronic Threats","author":"Weiss","year":"2010"},{"issue":"9","key":"10.1016\/j.ins.2019.08.080_bib0035","doi-asserted-by":"crossref","first-page":"2750","DOI":"10.1109\/TCYB.2018.2829730","article-title":"Network-based T-S fuzzy dynamic positioning controller design for unmanned marine vehicles","volume":"48","author":"Wang","year":"2018","journal-title":"IEEE Trans. Cybern."},{"issue":"6","key":"10.1016\/j.ins.2019.08.080_bib0036","doi-asserted-by":"crossref","first-page":"2022","DOI":"10.1109\/TCYB.2018.2817249","article-title":"Security research on wireless networked control systems subject to jamming attacks","volume":"49","author":"Yang","year":"2018","journal-title":"IEEE Trans. Cybern."},{"issue":"3","key":"10.1016\/j.ins.2019.08.080_bib0037","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TCST.2015.2462741","article-title":"Optimal DoS attack scheduling in wireless networked control system","volume":"24","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Cont. Syst. Tech."},{"key":"10.1016\/j.ins.2019.08.080_bib0038","doi-asserted-by":"crossref","DOI":"10.1109\/JAS.2019.1911651","article-title":"Networked control systems: a survey of trends and techniques","author":"Zhang","year":"2019","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"10.1016\/j.ins.2019.08.080_bib0039","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jsv.2016.01.008","article-title":"Event-triggered H\u221e reliable control for offshore structures in network environments","volume":"368","author":"Zhang","year":"2016","journal-title":"J. Sound Vib."},{"issue":"6","key":"10.1016\/j.ins.2019.08.080_bib0040","doi-asserted-by":"crossref","first-page":"1888","DOI":"10.1109\/TCYB.2017.2716970","article-title":"Event-triggered communication for leader-following consensus of second-order multi-agent systems","volume":"48","author":"Zhao","year":"2018","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.ins.2019.08.080_bib0041","series-title":"State Estimation and Control of Networked Control Systems under Malicious Attacks","first-page":"26","author":"Zhang","year":"2018"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025519308291?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025519308291?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T13:28:25Z","timestamp":1610890105000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025519308291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1]]},"references-count":41,"alternative-id":["S0020025519308291"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2019.08.080","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2020,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A penalty-based adaptive secure estimation for power systems under false data injection attacks","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2019.08.080","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}