메뉴 건너뛰기




Volumn 10, Issue 4, 2012, Pages 62-70

Challenges in power system information security

Author keywords

information availability; SCADA communications; state estimation; systemwide security

Indexed keywords

INFORMATION AVAILABILITY; IT INFRASTRUCTURES; SYSTEMWIDE SECURITY;

EID: 84865395858     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2011.151     Document Type: Article
Times cited : (33)

References (14)
  • 1
    • 84865375551 scopus 로고    scopus 로고
    • Nat'l Inst. Standards and Tech., Aug.
    • "NISTIR 7628, Guidelines for Smart Grid Cyber Security," vols. 1-3, Nat'l Inst. Standards and Tech., Aug. 2010; http://csrc.nist.gov/ publications/PubsNISTIRs.html.
    • NISTIR 7628, Guidelines for Smart Grid Cyber Security , vol.1-3 , pp. 2010
  • 2
    • 84865375550 scopus 로고    scopus 로고
    • The viking project-towards more secure scada systems
    • G. Björkman, "The VIKING Project -Towards More Secure SCADA Systems," Proc. HSCC 1st Workshop Secure Control Systems, 2010; www.truststc.org/conferences/10/CPSWeek/papers/scs1-paper-1.pdf.
    • (2010) Proc. HSCC 1st Workshop Secure Control Systems
    • Björkman, G.1
  • 3
    • 0002670359 scopus 로고    scopus 로고
    • Attack trees: Modeling security threats
    • Dec.
    • B. Schneier, "Attack Trees: Modeling Security Threats," Dr. Dobb's J., Dec. 1999, www.schneier.com/paper-attacktreesddj-ft.html.
    • (1999) Dr. Dobb's J.
    • Schneier, B.1
  • 4
    • 77955417822 scopus 로고    scopus 로고
    • A probabilistic relational model for security risk analysis
    • T. Sommestad, M. Ekstedt, and P. Johnson, "A Probabilistic Relational Model for Security Risk Analysis," Computers & Security, vol. 29, no. 6, 2010, pp. 659-679.
    • (2010) Computers & Security , vol.29 , Issue.6 , pp. 659-679
    • Sommestad, T.1    Ekstedt, M.2    Johnson, P.3
  • 6
    • 48249098845 scopus 로고    scopus 로고
    • Yasir: A low-latency, high-integrity security retrofit for legacy scada systems
    • Springer
    • P. Tsang and S. Smith, "YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy Scada Systems,'' Proc. IFIP/TC11 Int'l Information Security Conference, Springer, 2008, pp. 445-459.
    • (2008) Proc. IFIP/TC11 Int'l Information Security Conference , pp. 445-459
    • Tsang, P.1    Smith, S.2
  • 9
    • 84885756672 scopus 로고    scopus 로고
    • Stealth attacks and protection schemes for state estimators in power systems
    • IEEE
    • G. Dán and H. Sandberg, "Stealth Attacks and Protection Schemes for State Estimators in Power Systems," Proc. IEEE SmartGridComm, IEEE, 2010.
    • (2010) Proc. IEEE SmartGridComm
    • Dán, G.1    Sandberg, H.2
  • 10
    • 84855825082 scopus 로고    scopus 로고
    • Network-layer protection schemes against stealth attacks on state estimators in power systems
    • IEEE
    • O. Vukovic et al., "Network-Layer Protection Schemes against Stealth Attacks on State Estimators in Power Systems," Proc. IEEE SmartGridComm, IEEE, 2011, pp. 184-189.
    • (2011) Proc. IEEE SmartGridComm , pp. 184-189
    • Vukovic, O.1
  • 11
    • 84865362297 scopus 로고    scopus 로고
    • Outage analysis: Italy
    • H. Mueller, "Outage Analysis: Italy," Network Manager News, vol. 2, no. 1, 2004, pp. 1-3.
    • (2004) Network Manager News , vol.2 , Issue.1 , pp. 1-3
    • Mueller, H.1
  • 12
    • 68049114593 scopus 로고    scopus 로고
    • Concurrent multipath transfer during path failure
    • P. Natarajan et al., "Concurrent Multipath Transfer during Path Failure," Computer Comm., vol. 32, no. 15, 2009, pp. 1577-1587.
    • (2009) Computer Comm. , vol.32 , Issue.15 , pp. 1577-1587
    • Natarajan, P.1
  • 13
    • 33947418087 scopus 로고    scopus 로고
    • A survey on mix networks and their secure applications
    • K. Sampigethaya and R. Poovendran, "A Survey on Mix Networks and Their Secure Applications," Proc. IEEE, vol. 94, no. 12, 2006, pp. 2142-2181.
    • (2006) Proc. IEEE , vol.94 , Issue.12 , pp. 2142-2181
    • Sampigethaya, K.1    Poovendran, R.2
  • 14
    • 80052185753 scopus 로고    scopus 로고
    • On the trade-off between relationship anonymity and communication overhead in anonymity networks
    • IEEE
    • O. Vukovic, G. Dán, and G. Karlsson, "On the Trade-off between Relationship Anonymity and Communication Overhead in Anonymity Networks," Proc. IEEE Int'l Conf. Communications (ICC 11), IEEE, 2011, pp. 1-6.
    • (2011) Proc. IEEE Int'l Conf. Communications (ICC 11) , pp. 1-6
    • Vukovic, O.1    Dán, G.2    Karlsson, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.