메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Impact of cyber-security issues on Smart Grid

Author keywords

Cyber attack; Cyber security; Smart Grid

Indexed keywords

CROSS-DISCIPLINARY RESEARCH; CYBER SECURITY; CYBER-ATTACKS; INTERCONNECTIVITY; INTRUSION DETECTION AND PREVENTION; REAL POWER SYSTEMS; SMART GRID; STUDY CASE; WORK PLAN;

EID: 84860756046     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISGTEurope.2011.6162722     Document Type: Conference Paper
Times cited : (86)

References (42)
  • 3
    • 84860732486 scopus 로고    scopus 로고
    • U.S. Nuclear Regulatory Commission. (2003) [Online]
    • U.S. Nuclear Regulatory Commission. (2003) NRC Information Notice 2003-14. [Online] Available: http://www.nrc.gov/reading-rm/doccollections/gen- comm/infonotices/2003/in200 314.pdf
    • NRC Information Notice 2003-14
  • 5
    • 84860721550 scopus 로고    scopus 로고
    • Antiy CERT Sep Antiy Corp., Harbin, China. [Online]
    • Antiy CERT. (2010, Sep.). Report on the Worm Stuxnet's Attack. Antiy Corp., Harbin, China. [Online] Available: http://www.antiy.net/en/analysts/ Report-On-the-Attacking-of-Worm-Struxnet-by-antiy
    • (2010) Report on the Worm Stuxnet's Attack
  • 6
    • 79954605963 scopus 로고    scopus 로고
    • The Smart Grid Interoperability Panel-Cyber Security Working Group. (2010, Oct.) NIST, Gaithersburg, MD. [Online]
    • The Smart Grid Interoperability Panel-Cyber Security Working Group. (2010, Oct.). Guidelines for Smart Grid Cyber Security. NIST, Gaithersburg, MD. [Online] Available: http://csrc.nist.gov/publications/PubsNISTIRs.html
    • Guidelines for Smart Grid Cyber Security
  • 7
    • 77958167622 scopus 로고    scopus 로고
    • Beijing: Higher Education Press and New York: Springer Berlin Heidelberg
    • Jie Wang, Computer Network Security. Beijing: Higher Education Press and New York: Springer Berlin Heidelberg, 2009, p. 3-24.
    • (2009) Computer Network Security , pp. 3-24
    • Wang, J.1
  • 10
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attacks
    • May
    • T. Messerges, E. A. Dabbish, and R. H. Sloan, "Examining smart-card security under the threat of power analysis attacks," IEEE Trans. Computer, vol. 51, pp. 541-552, May 2002.
    • (2002) IEEE Trans. Computer , vol.51 , pp. 541-552
    • Messerges, T.1    Dabbish, E.A.2    Sloan, R.H.3
  • 12
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
    • P. Kocher, "Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems," in Proc. Crypto, 1996, pp. 104-113.
    • (1996) Proc. Crypto , pp. 104-113
    • Kocher, P.1
  • 14
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for SCADA Systems
    • Nov.
    • Chee-Wooi, T., L. Chen-Ching, and G. Manimaran, "Vulnerability Assessment of Cybersecurity for SCADA Systems." IEEE Trans. Power Systems, vol. 23, pp.1836-1846, Nov. 2008.
    • (2008) IEEE Trans. Power Systems , vol.23 , pp. 1836-1846
    • Chee-Wooi, T.1    Chen-Ching, L.2    Manimaran, G.3
  • 15
    • 71849094936 scopus 로고    scopus 로고
    • PENET: A practical method and tool for integrated modeling of security attacks and countermeasures
    • May
    • Srdjan Pudar, G. Manimaran and Chen-Ching Liu, "PENET: A practical method and tool for integrated modeling of security attacks and countermeasures," Computers & Security, vol. 28, pp. 754-771, May 2009.
    • (2009) Computers & Security , vol.28 , pp. 754-771
    • Pudar, S.1    Manimaran, G.2    Liu, C.-C.3
  • 26
    • 33646340926 scopus 로고    scopus 로고
    • EPOCHS: A platform for agent-based electric power and communication simulation built from commercial off-the-shelf components
    • May.
    • K. Hopkinson, X. Wang, R. Giovanini, J. Thorp, K. Birman, and D. Coury, "EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components," IEEE Trans. Power Systems, vol. 21, pp. 548-558, May. 2006.
    • (2006) IEEE Trans. Power Systems , vol.21 , pp. 548-558
    • Hopkinson, K.1    Wang, X.2    Giovanini, R.3    Thorp, J.4    Birman, K.5    Coury, D.6
  • 27
    • 84860721553 scopus 로고    scopus 로고
    • NERC CIP Cyber Security Standards Feb.
    • NERC CIP Cyber Security Standards, NERC Reliability Standards: CIP, Feb. 2011.
    • (2011) NERC Reliability Standards: CIP
  • 28
    • 84860721551 scopus 로고    scopus 로고
    • NIST. (2009, Aug.), NIST Special Publication, 800-53 Revision 3: Recommended Security Controls for Federal Information Systems and Organizations. NIST, Gaithersburg, MD. [Online]
    • NIST. (2009, Aug.). NIST Special Publication 800-53 Revision 3: Recommended Security Controls for Federal Information Systems and Organizations. NIST, Gaithersburg, MD. [Online] Available: http://csrc.nist.gov/publications/ nistpubs/800-53-Rev3/sp800-53-rev3-final.pdf
  • 29
    • 84860712170 scopus 로고    scopus 로고
    • NERC May NERC, Princeton, NJ. [Online]
    • NERC. (2011, May). 2012 NERC Business Plan and Budget-DRAFT 1. NERC, Princeton, NJ. [Online] Available: http://www.nerc.com/filez/business-plan-2012. html
    • (2011) 2012 NERC Business Plan and Budget-DRAFT 1
  • 31
  • 35
    • 50649107305 scopus 로고    scopus 로고
    • Idaho national laboratory supervisory control and data acquisition intrusion detection System (SCADA IDS)
    • J. Verba and M. Milvich, "Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)," in Proc. 2008 IEEE Conf. on Technologies for Homeland Security, pp. 469-473.
    • Proc. 2008 IEEE Conf. on Technologies for Homeland Security , pp. 469-473
    • Verba, J.1    Milvich, M.2
  • 42
    • 0142219252 scopus 로고    scopus 로고
    • An improved reference flow control model for policy-based intrusion detection
    • J. Zimmermann, L. Me, and C. Bidan, "An improved reference flow control model for policy-based intrusion detection," in Proc. Computer Security, ESORICS 2003, pp. 291-308.
    • (2003) Proc. Computer Security, ESORICS , pp. 291-308
    • Zimmermann, J.1    Me, L.2    Bidan, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.