메뉴 건너뛰기




Volumn , Issue , 2007, Pages 29-34

Cybersecurity for electric power control and automation systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATION; CONTROL SYSTEMS; ELECTRIC POWER SYSTEMS; SECURITY OF DATA;

EID: 40949132948     PISSN: 1062922X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSMC.2007.4414239     Document Type: Conference Paper
Times cited : (33)

References (19)
  • 2
    • 0036698949 scopus 로고    scopus 로고
    • An information architecture for future power systems and its reliability analysis
    • Aug
    • Z. Xie, M. Govindarasu, V. Vittal, A. G. Phadke, and V. Centeno, "An information architecture for future power systems and its reliability analysis," IEEE Trans. on Power Systems, vol. 17, no.3, Aug. 2002, pp.857-863.
    • (2002) IEEE Trans. on Power Systems , vol.17 , Issue.3 , pp. 857-863
    • Xie, Z.1    Govindarasu, M.2    Vittal, V.3    Phadke, A.G.4    Centeno, V.5
  • 3
    • 33747585156 scopus 로고    scopus 로고
    • Assessment of interactions between power and telecommunications infrastructures
    • Aug
    • K. P. Schneider, C.-C. Liu, and J.-P. Paul, "Assessment of interactions between power and telecommunications infrastructures," IEEE Trans. on Power Systems, vol. 21, no.3, Aug. 2006, pp.1123-1130.
    • (2006) IEEE Trans. on Power Systems , vol.21 , Issue.3 , pp. 1123-1130
    • Schneider, K.P.1    Liu, C.-C.2    Paul, J.-P.3
  • 4
    • 40949160889 scopus 로고    scopus 로고
    • Critical infrastructure protection report, Critical Infrastructure Protection GAO-05-434, Department of Homeland Security Faces Challenge in Fulfilling Cybersecurity Responsibilities, May 2005. [online]. Available: http://www.gao.gov/new.items/d05434, pdf
    • "Critical infrastructure protection report," Critical Infrastructure Protection GAO-05-434, Department of Homeland Security Faces Challenge in Fulfilling Cybersecurity Responsibilities, May 2005. [online]. Available: http://www.gao.gov/new.items/d05434, pdf
  • 5
    • 40949092986 scopus 로고    scopus 로고
    • Urgent action standard 1200 - Cyber security, NERC directive, 2003.
    • "Urgent action standard 1200 - Cyber security", NERC directive, 2003.
  • 6
    • 17844380284 scopus 로고    scopus 로고
    • Management of information security for an electric power utility - On security domains and use of ISO/IEC 17799 standard
    • Apr
    • G. N. Ericsson and A. Torkilseng, "Management of information security for an electric power utility - On security domains and use of ISO/IEC 17799 standard," IEEE Trans. on Power Delivery, vol. 20, no. 2, Apr. 2005, pp. 683-690.
    • (2005) IEEE Trans. on Power Delivery , vol.20 , Issue.2 , pp. 683-690
    • Ericsson, G.N.1    Torkilseng, A.2
  • 7
    • 40949085506 scopus 로고    scopus 로고
    • Supervisory Control and Data Acquisition (SCADA) Systems, Technical Information Bulletin 04-1, National Communication System, Oct. 2004. [online]. Available: http://www.ncs.gov/library/tech bullctins/2004/tib 04-1.pdf
    • "Supervisory Control and Data Acquisition (SCADA) Systems," Technical Information Bulletin 04-1, National Communication System, Oct. 2004. [online]. Available: http://www.ncs.gov/library/tech bullctins/2004/tib 04-1.pdf
  • 8
    • 40949102097 scopus 로고    scopus 로고
    • Understanding SCADA system security vulnerabilities
    • Symantec White Paper
    • "Understanding SCADA system security vulnerabilities," Symantec White Paper, 2005.
    • (2005)
  • 9
    • 20844463674 scopus 로고    scopus 로고
    • Security in SCADA systems: How to handle the growing menace to process automation
    • Jun./Jul
    • T. Brown, "Security in SCADA systems: How to handle the growing menace to process automation," IEE Comp. and Control Eng., vol. 16, no. 3, Jun./Jul. 2005, pp.42-47.
    • (2005) IEE Comp. and Control Eng , vol.16 , Issue.3 , pp. 42-47
    • Brown, T.1
  • 10
    • 40949126839 scopus 로고    scopus 로고
    • Control systems cyber security awareness, US-CERT, Information Focus Paper, 2005.
    • "Control systems cyber security awareness," US-CERT, Information Focus Paper, 2005.
  • 13
    • 40949148483 scopus 로고    scopus 로고
    • NERC, online, Available:, 2006
    • [13]"Cyber security standards," NERC. [online]. Available: http://www.nerc.com/~filez/standards/Cyber-Security-P crmanent.html. 2006.
    • Cyber security standards
  • 14
    • 40949156562 scopus 로고    scopus 로고
    • M. Berg and J. Stamp, A reference model for control and automation systems in electric power, Sandia National Laboratories. [online]. Available: httr://www.sandia.gov/scada/documents/sand 2005 10 00C.pdf
    • M. Berg and J. Stamp, "A reference model for control and automation systems in electric power," Sandia National Laboratories. [online]. Available: httr)://www.sandia.gov/scada/documents/sand 2005 10 00C.pdf
  • 15
    • 40949108784 scopus 로고    scopus 로고
    • Direct generator communications - manual, NYISO May 2003
    • "Direct generator communications - manual," NYISO May 2003
  • 16
    • 40949120889 scopus 로고    scopus 로고
    • Some guidelines for developing a framework for managing cybersecurity for an electric power utility,
    • JWG D2/B3/C2.01, no. 228, Oct. 2006
    • A. Torkilseng and G. Ericsson, "Some guidelines for developing a framework for managing cybersecurity for an electric power utility," ELECTRA Report - JWG D2/B3/C2.01, no. 228, Oct. 2006.
    • ELECTRA Report
    • Torkilseng, A.1    Ericsson, G.2
  • 17
  • 18
    • 0024645936 scopus 로고
    • Petri nets: Properties, analysis, and applications
    • Apr
    • T. Murata, "Petri nets: Properties, analysis, and applications," Proc. of the IEEE, vol. 77, no. 4, Apr. 1989, pp. 541-580.
    • (1989) Proc. of the IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 19
    • 40949110860 scopus 로고    scopus 로고
    • PENET: A pragmatic method for attack modeling and validation
    • submitted for publication
    • S. Pudar, M. Govindarasu, C.-C. Liu, "PENET: A pragmatic method for attack modeling and validation," submitted for publication, 2007.
    • (2007)
    • Pudar, S.1    Govindarasu, M.2    Liu, C.-C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.