-
1
-
-
34250201862
-
-
CLEVELAND F. IEC TC57 Security Standards for the Power System's Information Infrastructure\Beyond Simple Encryption.//IEEE Power Eng. Soc. Transm. Distrib. 2005/2006, May 21-24, 2006
-
CLEVELAND F. IEC TC57 Security Standards for the Power System's Information Infrastructure\Beyond Simple Encryption.//IEEE Power Eng. Soc. Transm. Distrib. 2005/2006, May 21-24, 2006.
-
-
-
-
2
-
-
21644440888
-
Security for industrial communication systems
-
Jun.
-
D. Dzung, M. Naedele, T. V. hoff, and M. Crevatin, "Security for industrial communication systems, " Proc. IEEE, vol.93, no.6, pp. 1152-1177, Jun. 2005.
-
(2005)
Proc. IEEE
, vol.93
, Issue.6
, pp. 1152-1177
-
-
Dzung, D.1
Naedele, M.2
Hoff, T.V.3
Crevatin, M.4
-
3
-
-
47149112288
-
Context information-based cyber security defense of protection system
-
Jul.
-
S. Sheng, W. Chan, K. Li, D. Xianzhong, and Z. Xiangjun, "Context information-based cyber security defense of protection system, " IEEE Trans. Power Del., vol.22, no.3, pp. 1477-1481, Jul. 2007.
-
(2007)
IEEE Trans. Power Del.
, vol.22
, Issue.3
, pp. 1477-1481
-
-
Sheng, S.1
Chan, W.2
Li, K.3
Xianzhong, D.4
Xiangjun, Z.5
-
4
-
-
17844380284
-
Management of information security for an electric power utility\on security domains and use of ISO/IEC 17799 standard
-
Apr.
-
G. Ericsson and A. Torkilseng, "Management of information security for an electric power utility\on security domains and use of ISO/IEC 17799 standard, " IEEE Trans. Power Del., vol.20, no.2, pp. 683-690, Apr. 2005.
-
(2005)
IEEE Trans. Power Del.
, vol.20
, Issue.2
, pp. 683-690
-
-
Ericsson, G.1
Torkilseng, A.2
-
5
-
-
54049149494
-
Toward a framework for managing information security for an electric power utility\CIGRE experiences
-
Jul.
-
G. Ericsson, "Toward a framework for managing information security for an electric power utility\CIGRE experiences, " IEEE Trans. Power Del., vol.22, no.3, pp. 1461-1469, Jul. 2007.
-
(2007)
IEEE Trans. Power Del.
, vol.22
, Issue.3
, pp. 1461-1469
-
-
Ericsson, G.1
-
6
-
-
33846375405
-
Study on PMI based access control of substation automation system
-
Montreal, QC, Canada, Jun. 18-22
-
N. Liu, B. Duan, J. Wang, and S. Huang, "Study on PMI based access control of substation automation system, " in Proc. IEEE Power Eng. Soc. General Meeting, Montreal, QC, Canada, Jun. 18-22, 2006.
-
(2006)
Proc. IEEE Power Eng. Soc. General Meeting
-
-
Liu, N.1
Duan, B.2
Wang, J.3
Huang, S.4
-
7
-
-
42549093947
-
Security operation modes for enhancement of utility computer network cyber-security
-
Tampa, FL, Jun. 24-28
-
L. Wang, T. Mander, H. Cheung, F. Nabhani, and R. Cheung, "Security operation modes for enhancement of utility computer network cyber-security, " presented at the IEEE Power Eng. Soc. General Meeting, Tampa, FL, Jun. 24-28, 2007.
-
(2007)
Presented at the IEEE Power Eng. Soc. General Meeting
-
-
Wang, L.1
Mander, T.2
Cheung, H.3
Nabhani, F.4
Cheung, R.5
-
8
-
-
54049115837
-
A security mechanism of web services-based communication for wind power plants
-
Oct.
-
N. Liu, J. Zhang, and W. Liu, "A security mechanism of web services-based communication for wind power plants, " IEEE Trans. Power Del., vol.23, no.4, pp. 1930-1938, Oct. 2008.
-
(2008)
IEEE Trans. Power Del.
, vol.23
, Issue.4
, pp. 1930-1938
-
-
Liu, N.1
Zhang, J.2
Liu, W.3
-
9
-
-
54049117980
-
Toward authenticating the master in the modbus protocol
-
Oct.
-
G. Y. Liao, Y. J. Chen, W. C. Lu, and T. C. Cheng, "Toward authenticating the master in the modbus protocol, " IEEE Trans. Power Del., vol.23, no.4, pp. 2628-2629, Oct. 2008.
-
(2008)
IEEE Trans. Power Del.
, vol.23
, Issue.4
, pp. 2628-2629
-
-
Liao, G.Y.1
Chen, Y.J.2
Lu, W.C.3
Cheng, T.C.4
-
11
-
-
67651064508
-
Vulnerability assessment of cyber security in power industry
-
Atlanta, GA, Nov.
-
J. Yu, A. Mao, and Z. Guo, "Vulnerability assessment of cyber security in power industry, " in Proc. IEEE Power Eng. Soc. Power Systems Conf. Expo., Atlanta, GA, Nov. 1, 2006, pp. 2200-2205.
-
(2006)
Proc. IEEE Power Eng. Soc. Power Systems Conf. Expo.
, vol.1
, pp. 2200-2205
-
-
Yu, J.1
Mao, A.2
Guo, Z.3
-
12
-
-
33845295452
-
PRA for vulnerability assessment of power system infrastructure security
-
Oct. 23-25
-
K. Lin and K. E. Holbert, "PRA for vulnerability assessment of power system infrastructure security, " in Proc. 37th Annu. North American Power Symp., Oct. 23-25, 2005, pp. 43-51.
-
(2005)
Proc. 37th Annu. North American Power Symp.
, pp. 43-51
-
-
Lin, K.1
Holbert, K.E.2
-
13
-
-
33749614388
-
Risk analysis and probabilistic survivability assessment (RAPSA): An assessment approach for power substation hardening
-
Washington, DC Nov.
-
C. Taylor, A. Krings, and J. Alves-Foss, "Risk analysis and probabilistic survivability assessment (RAPSA): An assessment approach for power substation hardening, " presented at the ACM SACT, Washington, DC, Nov. 2002.
-
(2002)
Presented at the ACM SACT
-
-
Taylor, C.1
Krings, A.2
Alves-Foss, J.3
-
14
-
-
77953999153
-
Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack
-
Washington, DC Nov.
-
D. Leon, J. Alves-foss, A. Krings, and P. Oman, "Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack, " presented at the ACM SACT, Washington, DC, Nov. 2002.
-
(2002)
Presented at the ACM SACT
-
-
Leon, D.1
Alves-Foss, J.2
Krings, A.3
Oman, P.4
-
15
-
-
47149106407
-
Assessment of information security levels in power communication systems using evidential reasoning
-
Jul.
-
L. Nordstrom, "Assessment of information security levels in power communication systems using evidential reasoning, " IEEE Trans. Power Del., vol.23, no.3, pp. 1384-1391, Jul. 2008.
-
(2008)
IEEE Trans. Power Del.
, vol.23
, Issue.3
, pp. 1384-1391
-
-
Nordstrom, L.1
-
16
-
-
17744373483
-
-
Ph.D. dissertation, Dept. Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA
-
O. M. Sheyner, "Scenario graphs and attack graphs, " Ph.D. dissertation, Dept. Comput. Sci., Carnegie Mellon Univ., Pittsburgh, PA, 2004.
-
(2004)
Scenario Graphs and Attack Graphs
-
-
Sheyner, O.M.1
-
20
-
-
33747426565
-
A vulnerability model of distributed systems based on reliability theory, " (Chinese)
-
P. Feng, Y. Lian, and Y. Dai, "A vulnerability model of distributed systems based on reliability theory, " (in Chinese) J. Softw., vol.17, no.7, pp. 1633-1640, 2006
-
(2006)
J. Softw.
, vol.17
, Issue.7
, pp. 1633-1640
-
-
Feng, P.1
Lian, Y.2
Dai, Y.3
-
21
-
-
77954001109
-
-
IEC61850-1, Communication Network and Systems in Substations\Part 1: Introduction and Overview, IEC, IEC61850-1
-
IEC61850-1, Communication Network and Systems in Substations\Part 1: Introduction and Overview, IEC, IEC61850-1, 2003.
-
(2003)
-
-
-
23
-
-
77953972539
-
-
IEC 61850-8-1, Communication Networks and Systems in Substation-Part 8-1: Specific Communication Service Mapping (SCSM)\Map-ping to MMS(ISO/IEC 9506-1 and ISO/IEC 9506-2) and to ISO/IEC 8802-3, IEC, IEC 61850-8-11
-
IEC 61850-8-1, Communication Networks and Systems in Substation-Part 8-1: Specific Communication Service Mapping (SCSM)\Map-ping to MMS(ISO/IEC 9506-1 and ISO/IEC 9506-2) and to ISO/IEC 8802-3, IEC, IEC 61850-8-11, 2003
-
(2003)
-
-
-
24
-
-
77954008185
-
-
IEC 61850-9-1, Communication Networks and Systems in Substation-Part 9-1: Specific Communication Service Mapping (SCSM)-Sampled Values Over Serial Unidirectional Multidrop Point to Point Link, IEC, IEC 61850-9-11
-
IEC 61850-9-1, Communication Networks and Systems in Substation-Part 9-1: Specific Communication Service Mapping (SCSM)-Sampled Values Over Serial Unidirectional Multidrop Point to Point Link, IEC, IEC 61850-9-11, 2003.
-
(2003)
-
-
|