메뉴 건너뛰기




Volumn , Issue , 2012, Pages 161-164

Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid

Author keywords

Hybrid Attack Graph; Security; Smart Grid

Indexed keywords

ATTACK GRAPH; KEYPOINTS; POTENTIAL ATTACK; SECURITY; SMART GRID;

EID: 84868544559     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISRCS.2012.6309311     Document Type: Conference Paper
Times cited : (41)

References (22)
  • 9
    • 67650697088 scopus 로고    scopus 로고
    • The application-view model of the international standard iec 61850
    • July
    • C.R. Ozansoy, A. Zayegh, A. Kalam, "The Application-View Model of the International Standard IEC 61850," IEEE Transactions on Power Delivery, vol. 24, no. 3, pp. 1132-1139, July 2009.
    • (2009) IEEE Transactions on Power Delivery , vol.24 , Issue.3 , pp. 1132-1139
    • Ozansoy, C.R.1    Zayegh, A.2    Kalam, A.3
  • 10
    • 34249737048 scopus 로고    scopus 로고
    • Toward effective substation automation
    • May-June
    • M. Ingram, R. Ehlers, "Toward Effective Substation Automation," IEEE Power and Energy Magazine, vol. 5, is. 3, pp. 67-73, May-June 2007.
    • (2007) IEEE Power and Energy Magazine , vol.5 , Issue.3 , pp. 67-73
    • Ingram, M.1    Ehlers, R.2
  • 13
    • 0029701554 scopus 로고    scopus 로고
    • The theory of hybrid automata
    • New Brunswick, New Jersey, July 27-30. IEEE Computer Society Press
    • T.A. Henzinger. The Theory of Hybrid Automata. In 11th Annual IEEE Symposium on Logic in Computer Science: Proceedings, pages 278-292, New Brunswick, New Jersey, July 27-30 1996. IEEE Computer Society Press.
    • (1996) 11th Annual IEEE Symposium on Logic in Computer Science: Proceedings , pp. 278-292
    • Henzinger, T.A.1
  • 18
    • 33646524687 scopus 로고    scopus 로고
    • Threat-driven modeling and verification of secure software using aspect-oriented Petri nets
    • April
    • D. Xu and K.E. Nygard, "Threat-driven modeling and verification of secure software using aspect-oriented Petri nets", IEEE Transactions on Software Engineering, vol. 32, no. 4, April, 2006.
    • (2006) IEEE Transactions on Software Engineering , vol.32 , Issue.4
    • Xu, D.1    Nygard, K.E.2
  • 20
    • 70449638991 scopus 로고    scopus 로고
    • Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations
    • May
    • M.H.Henry, R.M. Layer, K.Z. Snow, and D.R. Zaret, "Evaluating the risk of cyber attacks on SCADA systems via Petri net analysis with application to hazardous liquid loading operations", IEEE Conference on Technologies for Homeland Security, May, 2009.
    • (2009) IEEE Conference on Technologies for Homeland Security
    • Henry, M.H.1    Layer, R.M.2    Snow, K.Z.3    Zaret, D.R.4
  • 21


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.