[1] Amin, M. “Energy Infrastructure Defense Systems”; Proc. IEEE, 2005, 93, 861-876.DOI:DOI:10.1109/JPROC. 2005.847257
[2] Pablo, H.; Ruiz, M. E. “Against Aall Odds”; IEEE Power Energy Mag., 2011, 9, 59-66.DOI:DOI:10.1109/MPE. 2011.940266
[3] Baozhong, T.; Wang, J.; Li, G. “Operational Risk-Averse Routing Optimization for Cyber-Physical Power Systems”; CSEE Journal of Power and Energy Systems, 2022, 8, 801–811.DOI:DOI: 10.17775/CSEEJPES.2021.00370
[4] Liang, G.; Weller, S. R.; Zhao, J.; Luo, F. “The 2015 Ukraine Blackout: Implications for False Data Injection Attacks”; IEEE Trans. Power Ssyst., 2017, 32, 3317-3318.DOI:DOI: 10.1109/TPWRS.2016.2631891
[5] Shayan, H.; Amraee, T. “Network Constrainted Unit Commitment under Cyber Attack Driven Overloads”; IEEE Trans. Smart Grid, 2019, 10, 6449–6460.DOI: DOI: 10.1109/TPWRS.2016.2631891
[6] Li, F.; Yan, X.; Xie, Y. “A Review of Cyber-Attack Methods in Cyber-Physical Power System”; IEEE 8th International Conference on Advanced Power System Automation and protection, 2019.DOI:DOI: 10.1109/ APAP47170.2019.9225126
[7] Ranjbar, M. H.; Pirayesh, A. “Optimal Reserve Allocation of Power System in Critical Situation for Preparation against Threats”; Advance Defense Sci. & Technol., 2016, 8, 159–167.DOI:DOR: 20.1001.1.26762935.1395.7.2.7.0
[8] Viafora, N.; Delikaraoglou, S.; Pinson, P.; Hug, G. “Dynamic Reserve and Transmission Capacity Allocation in Wind-Dominated Power Systems”; IEEE Trans. Power Syst., 2021, 36, 3017–3028.DOI:DOI: 10.1109/TPWRS. 2020.3043225
[9] Washburn, A. “Two-Person Zero-Sum Games”; US Springer,DOI:DOI: 2014. 10.1007/978-1-4614-9050-0
[10] Ranjbar, M. H.; Kheradmandi, M.; Pirayesh, A. “Assigning Operating Reserves in Power Systems under Imminent Intelligent Attack Threat”; IEEE Trans. Power Syst., 2019, 34, 2768–2777.DOI:DOI: 10.1109/TPWRS.2019. 2897595
[11] Ganjkhani, M.; Hosseini, M. M.; Parvania, M. “Optimal Defensive Strategy for Power Distribution Systems against Relay Setting Attacks”; IEEE Trans. Power Deliv., 2023, 38, 1499–1509.DOI:DOI: 10.1109/TPWRD.2022. 3230946
[12] Yan, B.; Yao, P.; Yang, T.; Zhou, B. “Game-Theoretical Model for Dynamic Defense Resource Allocation in Cyber-Physical Power Systems under Distributed Denial of Service Attacks”; J. Mod. Power Syst. Clean Energy, 2023, 38, 1-10.DOI:DOI: 10.35833/MPCE.2022.000524
[13] Yan, K.; Liu, X.; Lu, Y. “A Cyber-Physical Power System Risk Assessment Model against Cyberattacks”; IEEE Syst. J., 2023, 17, 218–228.DOI:DOI: 10.1109/JSYST. 2022.3215591
[14] “The US Blackout Timeline”; Power Eng., 2003, 17, 11–1.
[15] Chen, G.; Dong, Z. Y.; Hill, D. J.; Xue, Y. S. “Exploring Reliable Strategies for Defending Power Systems against Targeted Attacks”; IEEE Trans. Power Syst., 2011, 26, 76–84.DOI:10.1109/TPWRS.2010.2078524