-
4
-
-
67349092535
-
Vulnerability assessment of cybersecurity for SCADA systems
-
Ten C-W, Liu C-C, Manimaran G (2008) Vulnerability assessment of cybersecurity for SCADA systems. IEEE Trans Power Syst 23(4):1836-1846
-
(2008)
IEEE Trans Power Syst
, vol.23
, Issue.4
, pp. 1836-1846
-
-
Ten, C.-W.1
Liu, C.-C.2
Manimaran, G.3
-
5
-
-
70349173266
-
Reliability impacts from cyber attack on electric power systems
-
PSCE'09, March 15-18,2009
-
Stamp J, McIntyre A, Richardson B (2009) Reliability impacts from cyber attack on electric power systems. In: IEEE PES power systems conference and exposition, PSCE'09, March 15-18,2009, pp 1-8
-
(2009)
IEEE PES power systems conference and exposition
, pp. 1-8
-
-
Stamp, J.1
McIntyre, A.2
Richardson, B.3
-
6
-
-
2542628960
-
Analysis of electric grid security under terrorist threat
-
Salmeron J, Wood K, Baldick R (2004) Analysis of electric grid security under terrorist threat. IEEE Trans Power Syst 19(2):905-912
-
(2004)
IEEE Trans Power Syst
, vol.19
, Issue.2
, pp. 905-912
-
-
Salmeron, J.1
Wood, K.2
Baldick, R.3
-
7
-
-
7244226268
-
Performance of generator protection during major system disturbances
-
Patel S, Stephan K, Bajpai M, Das R, Domin TJ, Fennell E, Gardell JD, Gibbs I, Henville C, Kerrigan PM, King HJ, Kumar P, Mozina CJ, Reichard M, Uchiyama J, Usman S, Viers D, Wardlow D, Yalla M (2004) Performance of generator protection during major system disturbances. IEEE Trans Power Deliv 19(4):1650-1662
-
(2004)
IEEE Trans Power Deliv
, vol.19
, Issue.4
, pp. 1650-1662
-
-
Patel, S.1
Stephan, K.2
Bajpai, M.3
Das, R.4
Domin, T.J.5
Fennell, E.6
Gardell, J.D.7
Gibbs, I.8
Henville, C.9
Kerrigan, P.M.10
King, H.J.11
Kumar, P.12
Mozina, C.J.13
Reichard, M.14
Uchiyama, J.15
Usman, S.16
Viers, D.17
Wardlow, D.18
Yalla, M.19
-
8
-
-
67349092251
-
Detecting chains of vulnerabilites in industrial networks
-
Cheminod M, Bertolotti I, Durante L et al (2009) Detecting chains of vulnerabilites in industrial networks. IEEE Trans Ind Inf 5(2):181-193
-
(2009)
IEEE Trans Ind Inf
, vol.5
, Issue.2
, pp. 181-193
-
-
Cheminod, M.1
Bertolotti, I.2
Durante, L.3
-
9
-
-
34147116226
-
Application of sensor network for secure electric energy infrastructure
-
Leon RA, Vittal V, Manimaran G (2007) Application of sensor network for secure electric energy infrastructure. IEEE Trans Power Deliv 22(2):1021-1028
-
(2007)
IEEE Trans Power Deliv
, vol.22
, Issue.2
, pp. 1021-1028
-
-
Leon, R.A.1
Vittal, V.2
Manimaran, G.3
-
10
-
-
0009516633
-
A process control approach to cyber attack detection
-
Ye N, Giordano J, Feldman J (2001) A process control approach to cyber attack detection. Commun ACM 44(8):76-82
-
(2001)
Commun ACM
, vol.44
, Issue.8
, pp. 76-82
-
-
Ye, N.1
Giordano, J.2
Feldman, J.3
-
11
-
-
2642532056
-
Representation and analysis of coordinated attacks
-
New York, NY, USA
-
Braynov S, Jadliwala M (2003) Representation and analysis of coordinated attacks. In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering (FMSE '03). ACM, New York, NY, USA, pp 43-51
-
(2003)
Proceedings of the 2003 ACM workshop on Formal methods in security engineering (FMSE '03). ACM
, pp. 43-51
-
-
Braynov, S.1
Jadliwala, M.2
-
12
-
-
0035696915
-
Identifying, understanding and analyzing critical infrastructure interdependencies
-
Rinaldi SM, Peerenboom JP, Kelly TK (2001) Identifying, understanding and analyzing critical infrastructure interdependencies. IEEE Contr Syst 21(6):11-25
-
(2001)
IEEE Contr Syst
, vol.21
, Issue.6
, pp. 11-25
-
-
Rinaldi, S.M.1
Peerenboom, J.P.2
Kelly, T.K.3
-
14
-
-
10044242551
-
North America's electricity infrastructure: Are we ready for more perfect storms
-
Amin M (2003) North America's electricity infrastructure: are we ready for more perfect storms? IEEE Security Privacy 1(5):19-25
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.5
, pp. 19-25
-
-
Amin, M.1
-
15
-
-
85037105956
-
Cybersecurity for electric power industry
-
Institute for Security Technology Studies, Dartmouth College, December 2002
-
Goetz E (2002) Cybersecurity for electric power industry. In: Report of investigative research for infrastructure assurance (IRIA), Institute for Security Technology Studies, Dartmouth College, December 2002
-
(2002)
Report of investigative research for infrastructure assurance (IRIA)
-
-
Goetz, E.1
-
16
-
-
0037002089
-
Security challenges for the electricity infrastructure
-
Amin M (2002) Security challenges for the electricity infrastructure. Computer 35(4):8-10
-
(2002)
Computer
, vol.35
, Issue.4
, pp. 8-10
-
-
Amin, M.1
-
17
-
-
38949137343
-
Estimating a system's mean time to compromise
-
Leversage DJ, James E (2008) Estimating a system's mean time to compromise. IEEE Security Privacy 6(1):52-60
-
(2008)
IEEE Security Privacy
, vol.6
, Issue.1
, pp. 52-60
-
-
Leversage, D.J.1
James, E.2
-
20
-
-
49249110834
-
Collaborative, trust-based security mechanisms for a regional utility intranet
-
Coates GM, Hopkinson KM, Graham SR, Kurkowski SH (2008) Collaborative, trust-based security mechanisms for a regional utility intranet. IEEE Trans Power Syst 23(3):831-844
-
(2008)
IEEE Trans Power Syst
, vol.23
, Issue.3
, pp. 831-844
-
-
Coates, G.M.1
Hopkinson, K.M.2
Graham, S.R.3
Kurkowski, S.H.4
-
21
-
-
73849140062
-
A trust system architecture for SCADA network security
-
Coates GM, Hopkinson KM, Graham SR, Kurkowski SH (2010) A trust system architecture for SCADA network security. IEEE Trans Power Deliv 25(1):158-169
-
(2010)
IEEE Trans Power Deliv
, vol.25
, Issue.1
, pp. 158-169
-
-
Coates, G.M.1
Hopkinson, K.M.2
Graham, S.R.3
Kurkowski, S.H.4
-
22
-
-
77953691077
-
Emerging information technology scenarios for the control and management of the distribution grid
-
Vienna, Austria, March 21-24, 2007
-
Dondossola G, Garrone F, Szanto J, Fiorenza G (2007) Emerging information technology scenarios for the control and management of the distribution grid. In: Proceedings of 19th international conference and enhibition on electricity distribution, Vienna, Austria, March 21-24, 2007.
-
(2007)
Proceedings of 19th international conference and enhibition on electricity distribution
-
-
Dondossola, G.1
Garrone, F.2
Szanto, J.3
Fiorenza, G.4
-
23
-
-
70350284248
-
Modeling security of power communication systems using defense graphs and influence diagrams
-
Sommestad T, Ekstedt M, Nordstrom L (2009) Modeling security of power communication systems using defense graphs and influence diagrams. IEEE Trans Power Deliv 24(4):1801-1808
-
(2009)
IEEE Trans Power Deliv
, vol.24
, Issue.4
, pp. 1801-1808
-
-
Sommestad, T.1
Ekstedt, M.2
Nordstrom, L.3
-
24
-
-
70149102885
-
Understanding the physical and economic consequences of attacks on control systems
-
Huang Y-H, Cardenas AA et al (2009) Understanding the physical and economic consequences of attacks on control systems. Int J Critical Infrastructure Protection 2(3):72-83
-
(2009)
Int J Critical Infrastructure Protection
, vol.2
, Issue.3
, pp. 72-83
-
-
Huang, Y.-H.1
Cardenas, A.A.2
-
25
-
-
85008053873
-
Keep the lights on and the information flowing
-
Kirschen D, Bouffard F (2009) Keep the lights on and the information flowing. IEEE Power Energ Mag 7(1):55-60
-
(2009)
IEEE Power Energ Mag
, vol.7
, Issue.1
, pp. 55-60
-
-
Kirschen, D.1
Bouffard, F.2
-
27
-
-
67650661171
-
Advanced key-management architecture for secure SCADA communications
-
Choi D, Kim H, Won D, Kim S (2009) Advanced key-management architecture for secure SCADA communications. IEEE Trans Power Deliv 24(3):1154-1163
-
(2009)
IEEE Trans Power Deliv
, vol.24
, Issue.3
, pp. 1154-1163
-
-
Choi, D.1
Kim, H.2
Won, D.3
Kim, S.4
-
29
-
-
0003652825
-
-
Wiley, New York
-
Ajmone Marsan M, Balbo G, Conte G, Donatelli S, Franceschinis G (1995) Modeling with generalized stochastic petri nets, 1st edn. Wiley, New York
-
(1995)
Modeling with generalized stochastic petri nets, 1st edn
-
-
Ajmone Marsan, M.1
Balbo, G.2
Conte, G.3
Donatelli, S.4
Franceschinis, G.5
|