-
1
-
-
21244468389
-
Energy infrastructure defense systems
-
Amin, S.M. (2005) 'Energy infrastructure defense systems', Proceedings of the IEEE, Vol. 93, No. 5, pp.861-875.
-
(2005)
Proceedings of the IEEE
, vol.93
, Issue.5
, pp. 861-875
-
-
Amin, S.M.1
-
2
-
-
55549088578
-
For the good of the grid
-
Amin, S.M. (2008) 'For the good of the grid', IEEE Power and Energy Magazine, Vol. 6, No. 6, pp.48-59.
-
(2008)
IEEE Power and Energy Magazine
, vol.6
, Issue.6
, pp. 48-59
-
-
Amin, S.M.1
-
3
-
-
78349298957
-
-
Report No. INL/EXT-09-15500, Iadaho National Laboratory, Idaho Falls, Idaho, USA
-
Boyer, W.F. and McBride, S.A. (2009) Study of Security Attributes of Smart Grid Systems - Current Cyber Security Issues, Report No. INL/EXT-09-15500, Iadaho National Laboratory, Idaho Falls, Idaho, USA.
-
(2009)
Study of Security Attributes of Smart Grid Systems - Current Cyber Security Issues
-
-
Boyer, W.F.1
McBride, S.A.2
-
4
-
-
85084140752
-
Research challenges for the security of control systems
-
Berkeley, California, USA
-
Cárdenas, A.A., Amin, S. and Sastry, S. (2008a) 'Research challenges for the security of control systems', Proc. 3rd USENIX Conference on Hot Topics in Security, Berkeley, California, USA, p.6.
-
(2008)
Proc. 3rd USENIX Conference on Hot Topics in Security
, pp. 6
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.3
-
5
-
-
51849091527
-
Secure control: Towards survivable cyber-physical systems
-
Beijing, China
-
Cárdenas, A.A., Amin, S. and Sastry, S. (2008b) 'Secure control: towards survivable cyber-physical systems', Proc. 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, pp.495-500.
-
(2008)
Proc. 28th International Conference on Distributed Computing Systems Workshops
, pp. 495-500
-
-
Cárdenas, A.A.1
Amin, S.2
Sastry, S.3
-
6
-
-
79954623734
-
Cyber security basic defenses and attack trends
-
Franceschetti G. and Grossi, M. (Eds.), Artech House, Chapter 4
-
Cárdenas, A.A., Roosta, T., Taban, G. and Sastry, S. (2008c) 'Cyber security basic defenses and attack trends', in Franceschetti, G. and Grossi, M. (Eds.): Homeland Security Technology Challenges, Artech House, Chapter 4, pp.73-101.
-
(2008)
Homeland Security Technology Challenges
, pp. 73-101
-
-
Cárdenas, A.A.1
Roosta, T.2
Taban, G.3
Sastry, S.4
-
8
-
-
79954622643
-
Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack
-
Washington DC
-
Conte de Leon, D., Alves-Foss, J., Krings, A. and Oman, P. (2002) 'Modeling complex control systems to identify remotely accessible devices vulnerable to cyber attack', Proc. First Workshop on Scientific Aspects of Cyber Terrorism, Washington DC.
-
(2002)
Proc. First Workshop on Scientific Aspects of Cyber Terrorism
-
-
Conte De Leon, D.1
Alves-Foss, J.2
Krings, A.3
Oman, P.4
-
9
-
-
0038309086
-
Vulnerability assessment activities
-
Columbus, Ohio
-
Dagle, J. (2001) 'Vulnerability assessment activities', Proc. Power Engineering Society Winter Meeting, Vol. 1, Columbus, Ohio, pp.108-113.
-
(2001)
Proc. Power Engineering Society Winter Meeting
, vol.1
, pp. 108-113
-
-
Dagle, J.1
-
10
-
-
48449088699
-
SCADA cyber security testbed development
-
Carbondale, IL, USA
-
Davis, C.M., Tate, J.E., Okhravi, H., Grier, C., Overbye, T.J. and Nicol, D. (2006) 'SCADA cyber security testbed development', Proc. 38th North American Power Symposium, Carbondale, IL, USA, pp.483-488.
-
(2006)
Proc. 38th North American Power Symposium
, pp. 483-488
-
-
Davis, C.M.1
Tate, J.E.2
Okhravi, H.3
Grier, C.4
Overbye, T.J.5
Nicol, D.6
-
11
-
-
84872800478
-
SKMA - A key management architecture for SCADA systems
-
Dawson, R., Boyd, C., Dawson, E. and Manuel Gonzàlez Nieto, J. (2006) 'SKMA - a key management architecture for SCADA systems', Proc. Fourth Australasian Workshops on Grid Computing and E-Research, Vol. 54, pp.183-192.
-
(2006)
Proc. Fourth Australasian Workshops on Grid Computing and E-Research
, vol.54
, pp. 183-192
-
-
Dawson, R.1
Boyd, C.2
Dawson, E.3
Manuel Gonzàlez Nieto, J.4
-
12
-
-
33847422324
-
Risk assessment for physical and cyber attacks on critical infrastructures
-
Atlantic City, NJ
-
Depoy, J., Phelan, J., Sholander, P., Smith, B., Varnado, G.B. and Wyss, G. (2005) 'Risk assessment for physical and cyber attacks on critical infrastructures', Proc. IEEE Military Communications Conference, Vol. 3, Atlantic City, NJ , pp.1961-1969.
-
(2005)
Proc. IEEE Military Communications Conference
, vol.3
, pp. 1961-1969
-
-
Depoy, J.1
Phelan, J.2
Sholander, P.3
Smith, B.4
Varnado, G.B.5
Wyss, G.6
-
13
-
-
70349189347
-
Supporting cyber risk assessment of power control systems with experimental data
-
Seattle, Washington, USA
-
Dondossola, G., Garrone, F. and Szanto, J. (2009) 'Supporting cyber risk assessment of power control systems with experimental data', Proc. IEEE Power Systems Conference and Exposition, Seattle, Washington, USA, pp.1-3.
-
(2009)
Proc. IEEE Power Systems Conference and Exposition
, pp. 1-3
-
-
Dondossola, G.1
Garrone, F.2
Szanto, J.3
-
14
-
-
34548777587
-
CIMS: A framework for infrastructure interdependency modeling and analysis
-
Dudenhoeffer, D.D., Permann, M.R. and Manic, M. (2006) 'CIMS: a framework for infrastructure interdependency modeling and analysis', Proc. 38th Winter Simulation Conference, Monterey, California, pp.478-485.
-
(2006)
Proc. 38th Winter Simulation Conference, Monterey, California
, pp. 478-485
-
-
Dudenhoeffer, D.D.1
Permann, M.R.2
Manic, M.3
-
15
-
-
79954587527
-
Interdependency modeling and emergency response
-
San Diego, California
-
Dudenhoeffer, D.D., Permann, M.R., Woolsey, S., Timpany, R., Miller, C., McDermott, A. and Manic, M. (2007) 'Interdependency modeling and emergency response', Proc. 2007 Summer Computer Simulation Conference, San Diego, California, pp.1230-1237.
-
(2007)
Proc. 2007 Summer Computer Simulation Conference
, pp. 1230-1237
-
-
Dudenhoeffer, D.D.1
Permann, M.R.2
Woolsey, S.3
Timpany, R.4
Miller, C.5
McDermott, A.6
Manic, M.7
-
17
-
-
50249126693
-
Implementation and validation of a mult-level security model architecture
-
Toki Messe, Niigata, Japan
-
Edwards, D., Srivastava, S.K., Cartes, D.A., Simmons, S. and Wilde, N. (2007) 'Implementation and validation of a mult-level security model architecture', Proc. International Conference on Intelligent Systems Applications to Power Systems, Toki Messe, Niigata, Japan, pp.1-4.
-
(2007)
Proc. International Conference on Intelligent Systems Applications to Power Systems
, pp. 1-4
-
-
Edwards, D.1
Srivastava, S.K.2
Cartes, D.A.3
Simmons, S.4
Wilde, N.5
-
18
-
-
70349165347
-
Enterprise architecture models for cyber security analysis
-
Seattle, Washington, USA
-
Ekstedt, M. and Sommestad, T. (2009) 'Enterprise architecture models for cyber security analysis', Proc. IEEE Power Systems Conference and Exposition, Seattle, Washington, USA, pp.1-6.
-
(2009)
Proc. IEEE Power Systems Conference and Exposition
, pp. 1-6
-
-
Ekstedt, M.1
Sommestad, T.2
-
19
-
-
56749177762
-
Analyzing aspects of cyber security standards for M&CS
-
Tokyo, Japan
-
Endoh, H. (2008) 'Analyzing aspects of cyber security standards for M&CS', Proc. SICE Annual Conference, Tokyo, Japan, pp.1478-1481.
-
(2008)
Proc. SICE Annual Conference
, pp. 1478-1481
-
-
Endoh, H.1
-
20
-
-
67650711721
-
Information security for electric power utilities (EPUs) - CIGRÉ developments on frameworks, risk assessment, and technology
-
Ericsoon, G.N. (2009) 'Information security for electric power utilities (EPUs) - CIGRÉ developments on frameworks, risk assessment, and technology', IEEE Transactions on Power Delivery, Vol. 24, No. 3, pp.1174-1181.
-
(2009)
IEEE Transactions on Power Delivery
, vol.24
, Issue.3
, pp. 1174-1181
-
-
Ericsoon, G.N.1
-
21
-
-
52349117043
-
Securing IEC 61850
-
Pittsburgh, Pennsylvania, USA
-
Falk, H. (2008) 'Securing IEC 61850', Proc. IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, Pennsylvania, USA, pp.1-3.
-
(2008)
Proc. IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century
, pp. 1-3
-
-
Falk, H.1
-
22
-
-
78649588282
-
Dynamic load management for NG IPS ships
-
Minneapolis, Minnesota
-
Feng, X., Zourntos, T. and Butler-Purry, K.L. (2010) 'Dynamic load management for NG IPS ships', Proc. IEEE Power Engineering Society General Meeting, Minneapolis, Minnesota.
-
(2010)
Proc. IEEE Power Engineering Society General Meeting
-
-
Feng, X.1
Zourntos, T.2
Butler-Purry, K.L.3
-
23
-
-
77954796687
-
A testbed for secure and robust SCADA systems
-
Article No. 4
-
Giani, A., Karsai, G., Roosta, T., Shah, A., Sinopoli, B. and Wiley, J. (2008) 'A testbed for secure and robust SCADA systems', SIGBED Review, Vol. 5, No. 2, Article No. 4.
-
(2008)
SIGBED Review
, vol.5
, Issue.2
-
-
Giani, A.1
Karsai, G.2
Roosta, T.3
Shah, A.4
Sinopoli, B.5
Wiley, J.6
-
24
-
-
70449645520
-
Generating configuration for missing traffic detector and security measures in industrial control systems based on the system description files
-
Waltham, Massachusetts, USA
-
Hadeli, H., Schierholz, R., Braendle, M. and Tuduce, C. (2009) 'Generating configuration for missing traffic detector and security measures in industrial control systems based on the system description files', Proc. IEEE Conference on Technologies for Homeland Security, Waltham, Massachusetts, USA, pp.503-510.
-
(2009)
Proc. IEEE Conference on Technologies for Homeland Security
, pp. 503-510
-
-
Hadeli, H.1
Schierholz, R.2
Braendle, M.3
Tuduce, C.4
-
25
-
-
70349179223
-
Modeling cyber and physical interdependencies - Application in ICT and power grids
-
Seattle, Washington, USA
-
HadjSaid, N., Tranchita, C., Rozel, B., Viziteu, M. and Caire, R. (2009) 'Modeling cyber and physical interdependencies - application in ICT and power grids', Proc. IEEE Power Systems Conference and Exposition, Seattle, Washington, USA, pp.1-6.
-
(2009)
Proc. IEEE Power Systems Conference and Exposition
, pp. 1-6
-
-
Hadjsaid, N.1
Tranchita, C.2
Rozel, B.3
Viziteu, M.4
Caire, R.5
-
26
-
-
0038548185
-
Coordination of groups of mobile autonomous agents using nearest neighbor rules
-
IEEE Transactions on
-
Jadbabaie, A., Lin, J. and Morse, A. S. (2003) 'Coordination of groups of mobile autonomous agents using nearest neighbor rules', Automatic Control, IEEE Transactions on, Vol. 48, No. 6, pp.988-1001.
-
(2003)
Automatic Control
, vol.48
, Issue.6
, pp. 988-1001
-
-
Jadbabaie, A.1
Lin, J.2
Morse, A.S.3
-
27
-
-
67651064508
-
Vulnerability assessment of cyber security in power industry
-
Atlanta, Georgia
-
Jiaxi, Y., Anjia, M. and Zhizhong, G. (2006) 'Vulnerability assessment of cyber security in power industry', Proc. IEEE Power Systems Conference and Exposition, Atlanta, Georgia, pp.2200-2205.
-
(2006)
Proc. IEEE Power Systems Conference and Exposition
, pp. 2200-2205
-
-
Jiaxi, Y.1
Anjia, M.2
Zhizhong, G.3
-
28
-
-
70349176082
-
Cybersecurity of SCADA systems: Vulnerability assessment and mitigation
-
Seattle, Washington, USA
-
Liu, C-C., Ten, C-W. and Govindarasu, M. (2009) 'Cybersecurity of SCADA systems: Vulnerability assessment and mitigation', Proc. IEEE Power Systems Conference and Exposition, Seattle, Washington, USA, pp.1-3.
-
(2009)
Proc. IEEE Power Systems Conference and Exposition
, pp. 1-3
-
-
Liu, C.-C.1
Ten, C.-W.2
Govindarasu, M.3
-
29
-
-
77951004557
-
Strategies for protection and control standardization and integrated data management applications
-
Chicago, Illinois, USA
-
Madani, V. and Witham, T. (2008) 'Strategies for protection and control standardization and integrated data management applications', Proc. IEEE/PES Transmission and Distribution Conference and Exposition, Chicago, Illinois, USA, pp.1-6.
-
(2008)
Proc. IEEE/PES Transmission and Distribution Conference and Exposition
, pp. 1-6
-
-
Madani, V.1
Witham, T.2
-
30
-
-
42549106749
-
Integrated network security protocol layer for open-access power distribution systems
-
Tampa, Florida, USA
-
Mander, T., Nabhani, F., Wang, L. and Cheung, R. (2007) 'Integrated network security protocol layer for open-access power distribution systems', Proc. IEEE Power Engineering Society General Meeting, Tampa, Florida, USA, pp.1-8.
-
(2007)
Proc. IEEE Power Engineering Society General Meeting
, pp. 1-8
-
-
Mander, T.1
Nabhani, F.2
Wang, L.3
Cheung, R.4
-
31
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
McDaniel, P. and Smith, S.W. (2009) 'Security and privacy challenges in the smart grid', IEEE Security and Privacy, Vol. 7, No. 3, pp.75-77.
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
Smith, S.W.2
-
32
-
-
49649120409
-
New considerations for security compliance, reliability and business continuity
-
Charleston, South Carolina
-
McDonald, R. (2008) 'New considerations for security compliance, reliability and business continuity', Proc. IEEE Rural Electric Power Conference, Charleston, South Carolina, pp.B1-B1-7.
-
(2008)
Proc. IEEE Rural Electric Power Conference
-
-
McDonald, R.1
-
33
-
-
70349170149
-
Complexities of information security in cyber-physical power systems
-
Phoenix, Arizona
-
McMillin, B. (2009) 'Complexities of information security in cyber-physical power systems', Proc. IEEE Power Systems Conference and Exposition, Phoenix, Arizona, pp.1-2.
-
(2009)
Proc. IEEE Power Systems Conference and Exposition
, pp. 1-2
-
-
McMillin, B.1
-
34
-
-
33749639831
-
Quantitative cyber risk reduction estimation methodology for small SCADA control system
-
Kauai, Hawaii, USA
-
McQueen, M.A., Boyer, W.F., Flynn, M.A. and Beitel, G.A. (2006) 'Quantitative cyber risk reduction estimation methodology for small SCADA control system', Proc. 39th Annual Hawaii International Conference on Systems Sciences, Kauai, Hawaii, USA, Vol. 9, pp.226-236.
-
(2006)
Proc. 39th Annual Hawaii International Conference on Systems Sciences
, vol.9
, pp. 226-236
-
-
McQueen, M.A.1
Boyer, W.F.2
Flynn, M.A.3
Beitel, G.A.4
-
35
-
-
52349108087
-
NERC CIP compliance: We've identified our critical assets, how what?
-
Pittsburgh, Pennsylvania, USA
-
Mertz, M. (2008) 'NERC CIP compliance: We've identified our critical assets, how what?', Proc. IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, Pennsylvania, USA, pp.1-2.
-
(2008)
Proc. IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century
, pp. 1-2
-
-
Mertz, M.1
-
36
-
-
79954627572
-
-
Report No. D2-02-C02, CIGRÉ Study Committee D2: Information Systems and Telecommunications
-
Pietre-Cambacedes, L., Chalhoub, C. and Cleveland, F. (2007) IEC TC57 WG15 - Cyber Security Standards for the Power Systems, Report No. D2-02-C02, CIGRÉ Study Committee D2: Information Systems and Telecommunications.
-
(2007)
IEC TC57 WG15 - Cyber Security Standards for the Power Systems
-
-
Pietre-Cambacedes, L.1
Chalhoub, C.2
Cleveland, F.3
-
37
-
-
84898264508
-
Cybersecurity standards for the electric power industry - A "survival kit"
-
Paper D2-213
-
Piétre-Cambacédès, L., Kropp, T., Weiss, J. and Pellizzonni, R. (2008) 'Cybersecurity standards for the electric power industry - a "survival kit"', Proc. CIGRÉ Paris Session, Paper D2-213.
-
(2008)
Proc. CIGRÉ Paris Session
-
-
Piétre-Cambacédès, L.1
Kropp, T.2
Weiss, J.3
Pellizzonni, R.4
-
38
-
-
52349089504
-
Towards a common model for studying critical infrastructure interdependencies
-
Pittsburgh, Pennsylvania
-
Rozel, B., Viziteu, M., Caire, R., Hadjsaid, N. and Rognon, J-P. (2008) 'Towards a common model for studying critical infrastructure interdependencies', Proc. IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century, Pittsburgh, Pennsylvania, pp.1-6.
-
(2008)
Proc. IEEE Power and Energy Society General Meeting - Conversion and Delivery of Electrical Energy in the 21st Century
, pp. 1-6
-
-
Rozel, B.1
Viziteu, M.2
Caire, R.3
Hadjsaid, N.4
Rognon, J.-P.5
-
39
-
-
47149112288
-
Context information-based cyber security defense of protection system
-
Sheng, S., Chan, W.L., Li, K.K., Xianzhong, D. and Xiangjun, Z. (2007) 'Context information-based cyber security defense of protection system', IEEE Transactions on Power Delivery, Vol. 22, No. 3, pp.1477-1481.
-
(2007)
IEEE Transactions on Power Delivery
, vol.22
, Issue.3
, pp. 1477-1481
-
-
Sheng, S.1
Chan, W.L.2
Li, K.K.3
Xianzhong, D.4
Xiangjun, Z.5
-
40
-
-
70349173266
-
Reliability impacts from cyber attack on electric power systems
-
Seattle, Washington, USA
-
Stamp, J., McIntyre, A. and Ricardson, B. (2009) 'Reliability impacts from cyber attack on electric power systems', Proc. IEEE Power Systems Conference and Exposition, Seattle, Washington, USA, pp.1-8.
-
(2009)
Proc. IEEE Power Systems Conference and Exposition
, pp. 1-8
-
-
Stamp, J.1
McIntyre, A.2
Ricardson, B.3
-
41
-
-
51849087726
-
Security property violation in CPS through timing
-
Beijing, China
-
Tang, H. and McMillin, B. (2008) 'Security property violation in CPS through timing', Proc. 28th International Conference on Distributed Computing Systems Workshops, Beijing, China, pp.519-524.
-
(2008)
Proc. 28th International Conference on Distributed Computing Systems Workshops
, pp. 519-524
-
-
Tang, H.1
McMillin, B.2
-
42
-
-
84921821569
-
-
Thesis, University of Missouri-Rolla, Rolla, Missouri, USA
-
Tan, H. (2007) Security Analysis of a Cyber-Physical System, Master's Thesis, University of Missouri-Rolla, Rolla, Missouri, USA.
-
(2007)
Security Analysis of A Cyber-Physical System, Master's
-
-
Tan, H.1
-
43
-
-
26244452473
-
Security and vulnerability in electric power systems
-
Rolla, Missouri
-
Watts, D. (2003) 'Security and vulnerability in electric power systems', Proc. 35th North American Power Symposium, Rolla, Missouri, pp.559-566.
-
(2003)
Proc. 35th North American Power Symposium
, pp. 559-566
-
-
Watts, D.1
-
44
-
-
38549122472
-
A workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in cyber environment
-
Minneapolis, Minnesota, USA
-
Xiao, K., Chen, N., Ren, S., Shen, L., Sun, X., Kwiat, K. and Macalik, M. (2007) 'A workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in cyber environment', Proc. Third International Workshop on Software Engineering for Secure Systems, Minneapolis, Minnesota, USA.
-
(2007)
Proc. Third International Workshop on Software Engineering for Secure Systems
-
-
Xiao, K.1
Chen, N.2
Ren, S.3
Shen, L.4
Sun, X.5
Kwiat, K.6
MacAlik, M.7
|