메뉴 건너뛰기




Volumn , Issue , 2012, Pages 275-294

Risk analysis of coordinated cyber attacks on power grid

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEM FIREWALLS; CRIME; DATA ACQUISITION; ELECTRIC LOAD FLOW; ELECTRIC POWER TRANSMISSION; ELECTRIC POWER TRANSMISSION NETWORKS; NETWORK SECURITY; PETRI NETS; RISK ANALYSIS; RISK ASSESSMENT; STOCHASTIC CONTROL SYSTEMS; STOCHASTIC SYSTEMS;

EID: 84868253251     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4614-1605-14     Document Type: Chapter
Times cited : (24)

References (29)
  • 4
    • 67349092535 scopus 로고    scopus 로고
    • Vulnerability assessment of cybersecurity for SCADA systems
    • Ten C-W, Liu C-C, Manimaran G (2008) Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans Power Syst 23(4):1836-1846
    • (2008) IEEE Trans Power Syst , vol.23 , Issue.4 , pp. 1836-1846
    • Ten, C.-W.1    Liu, C.-C.2    Manimaran, G.3
  • 6
    • 2542628960 scopus 로고    scopus 로고
    • Analysis of electric grid security under terrorist threat
    • Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905-912
    • (2004) IEEE Trans Power Syst , vol.19 , Issue.2 , pp. 905-912
    • Salmeron, J.1    Wood, K.2    Baldick, R.3
  • 8
    • 67349092251 scopus 로고    scopus 로고
    • Detecting chains of vulnerabilites in industrial networks
    • Cheminod M, Bertolotti I, Durante L et al (2009) Detecting chains of vulnerabilites in industrial networks. IEEE Trans Ind Inf 5(2):181-193
    • (2009) IEEE Trans Ind Inf , vol.5 , Issue.2 , pp. 181-193
    • Cheminod, M.1    Bertolotti, I.2    Durante, L.3
  • 9
    • 34147116226 scopus 로고    scopus 로고
    • Application of sensor network for secure electric energy infrastructure
    • Leon RA, Vittal V, Manimaran G (2007) Application of sensor network for secure electric energy infrastructure. IEEE Trans Power Deliv 22(2):1021-1028
    • (2007) IEEE Trans Power Deliv , vol.22 , Issue.2 , pp. 1021-1028
    • Leon, R.A.1    Vittal, V.2    Manimaran, G.3
  • 10
    • 0009516633 scopus 로고    scopus 로고
    • A process control approach to cyber attack detection
    • Ye N, Giordano J, Feldman J (2001) A process control approach to cyber attack detection. Commun ACM 44(8):76-82
    • (2001) Commun ACM , vol.44 , Issue.8 , pp. 76-82
    • Ye, N.1    Giordano, J.2    Feldman, J.3
  • 12
    • 0035696915 scopus 로고    scopus 로고
    • Identifying, understanding and analyzing critical infrastructure interdependencies
    • Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding and analyzing critical infrastructure interdependencies. IEEE Contr Syst 21(6):11-25
    • (2001) IEEE Contr Syst , vol.21 , Issue.6 , pp. 11-25
    • Rinaldi, S.M.1    Peerenboom, J.P.2    Kelly, T.K.3
  • 14
    • 10044242551 scopus 로고    scopus 로고
    • North America's electricity infrastructure: Are we ready for more perfect storms
    • Amin M (2003) North America's electricity infrastructure: are we ready for more perfect storms? IEEE Security Privacy 1(5):19-25
    • (2003) IEEE Security Privacy , vol.1 , Issue.5 , pp. 19-25
    • Amin, M.1
  • 15
    • 85037105956 scopus 로고    scopus 로고
    • Cybersecurity for electric power industry
    • Institute for Security Technology Studies, Dartmouth College, December 2002
    • Goetz E (2002) Cybersecurity for electric power industry. In: Report of investigative research for infrastructure assurance (IRIA), Institute for Security Technology Studies, Dartmouth College, December 2002
    • (2002) Report of investigative research for infrastructure assurance (IRIA)
    • Goetz, E.1
  • 16
    • 0037002089 scopus 로고    scopus 로고
    • Security challenges for the electricity infrastructure
    • Amin M (2002) Security challenges for the electricity infrastructure. Computer 35(4):8-10
    • (2002) Computer , vol.35 , Issue.4 , pp. 8-10
    • Amin, M.1
  • 17
    • 38949137343 scopus 로고    scopus 로고
    • Estimating a system's mean time to compromise
    • Leversage DJ, James E (2008) Estimating a system's mean time to compromise. IEEE Security Privacy 6(1):52-60
    • (2008) IEEE Security Privacy , vol.6 , Issue.1 , pp. 52-60
    • Leversage, D.J.1    James, E.2
  • 20
    • 49249110834 scopus 로고    scopus 로고
    • Collaborative, trust-based security mechanisms for a regional utility intranet
    • Coates GM, Hopkinson KM, Graham SR, Kurkowski SH (2008) Collaborative, trust-based security mechanisms for a regional utility intranet. IEEE Trans Power Syst 23(3):831-844
    • (2008) IEEE Trans Power Syst , vol.23 , Issue.3 , pp. 831-844
    • Coates, G.M.1    Hopkinson, K.M.2    Graham, S.R.3    Kurkowski, S.H.4
  • 23
    • 70350284248 scopus 로고    scopus 로고
    • Modeling security of power communication systems using defense graphs and influence diagrams
    • Sommestad T, Ekstedt M, Nordstrom L (2009) Modeling security of power communication systems using defense graphs and influence diagrams. IEEE Trans Power Deliv 24(4):1801-1808
    • (2009) IEEE Trans Power Deliv , vol.24 , Issue.4 , pp. 1801-1808
    • Sommestad, T.1    Ekstedt, M.2    Nordstrom, L.3
  • 24
    • 70149102885 scopus 로고    scopus 로고
    • Understanding the physical and economic consequences of attacks on control systems
    • Huang Y-H, Cardenas AA et al (2009) Understanding the physical and economic consequences of attacks on control systems. Int J Critical Infrastructure Protection 2(3):72-83
    • (2009) Int J Critical Infrastructure Protection , vol.2 , Issue.3 , pp. 72-83
    • Huang, Y.-H.1    Cardenas, A.A.2
  • 25
    • 85008053873 scopus 로고    scopus 로고
    • Keep the lights on and the information flowing
    • Kirschen D, Bouffard F (2009) Keep the lights on and the information flowing. IEEE Power Energ Mag 7(1):55-60
    • (2009) IEEE Power Energ Mag , vol.7 , Issue.1 , pp. 55-60
    • Kirschen, D.1    Bouffard, F.2
  • 27
    • 67650661171 scopus 로고    scopus 로고
    • Advanced key-management architecture for secure SCADA communications
    • Choi D, Kim H, Won D, Kim S (2009) Advanced key-management architecture for secure SCADA communications. IEEE Trans Power Deliv 24(3):1154-1163
    • (2009) IEEE Trans Power Deliv , vol.24 , Issue.3 , pp. 1154-1163
    • Choi, D.1    Kim, H.2    Won, D.3    Kim, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.