메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Vulnerability assessment of cybersecurity for SCADA systems using attack trees

Author keywords

Attack tree; Cybersecurity; Defense systems; Power system control; Security vulnerability

Indexed keywords

ELECTRIC POWER SYSTEMS; ONLINE SYSTEMS; POWER CONTROL; TREES (MATHEMATICS);

EID: 42549101645     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PES.2007.385876     Document Type: Conference Paper
Times cited : (170)

References (16)
  • 2
    • 42549095325 scopus 로고    scopus 로고
    • Critical Infrastructure Protection
    • Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibility, GAO-05-434, May
    • Government Accountability Office (GAO) Report to Congressional Requesters, "Critical Infrastructure Protection: Department of Homeland Security Faces Challenges in Fulfilling Cybersecurity Responsibility," GAO-05-434, May 2005.
    • (2005) Government Accountability Office (GAO) Report to Congressional Requesters
  • 3
    • 42549114064 scopus 로고    scopus 로고
    • NERC cybersecurity standards final version
    • "NERC cybersecurity standards (final version)," http://www.nerc.com/-filez/standards/Cyber-Security-Permanent.html.
  • 4
    • 17844380284 scopus 로고    scopus 로고
    • Management of information security for an electric power utility - on security domains and use of ISO/IEC 17799 standard
    • April
    • G. N. Ericsson and A. Torkilseng. "Management of information security for an electric power utility - on security domains and use of ISO/IEC 17799 standard." IEEE Transactions on Power Delivery. Vol. 20, No. 2, April 2005, pp. 683-690.
    • (2005) IEEE Transactions on Power Delivery , vol.20 , Issue.2 , pp. 683-690
    • Ericsson, G.N.1    Torkilseng, A.2
  • 5
    • 27944439331 scopus 로고    scopus 로고
    • Institute for Security Technology Studies at Dartmouth College. December
    • E. Goetz, "Cyber security of the electric power industry," Institute for Security Technology Studies at Dartmouth College. December 2002.
    • (2002) Cyber security of the electric power industry
    • Goetz, E.1
  • 10
    • 42549128949 scopus 로고    scopus 로고
    • B. Schneier, Attack trees: modeling security threats, Dr. Dobb's Journal, December 1999.
    • B. Schneier, "Attack trees: modeling security threats," Dr. Dobb's Journal, December 1999.
  • 11
    • 42549127079 scopus 로고    scopus 로고
    • Vulnerability assessment methodology for electric power infrastructure, US Department of Energy, Office of Energy Assurance. September 30, 2002.
    • "Vulnerability assessment methodology for electric power infrastructure," US Department of Energy, Office of Energy Assurance. September 30, 2002.
  • 14
    • 10044242551 scopus 로고    scopus 로고
    • North America's electricity infrastructure: Are we ready for more perfect storms'?
    • M. Amin, "North America's electricity infrastructure: are we ready for more perfect storms'?" IEEE Computer Society: Security & Privacy, 2003, pp. 19-25.
    • (2003) IEEE Computer Society: Security & Privacy , pp. 19-25
    • Amin, M.1
  • 16
    • 42549149085 scopus 로고    scopus 로고
    • user manual for the workshop, North American Electric Reliability Council, September 28-29, Minneapolis, MN
    • "Cybersecurity standards workshop," user manual for the workshop, North American Electric Reliability Council, September 28-29, Minneapolis, MN.
    • Cybersecurity standards workshop


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.