메뉴 건너뛰기




Volumn 5, Issue 4, 2014, Pages 481-489

Cyber-physical security of wide-area monitoring, protection and control in a smart grid environment

Author keywords

Cyber security; Cyber physical security; Smart grid; WAMPAC

Indexed keywords


EID: 84901693774     PISSN: 20901232     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jare.2013.12.005     Document Type: Article
Times cited : (99)

References (20)
  • 1
    • 52349119748 scopus 로고    scopus 로고
    • Cyber security issues for advanced metering infrastructure (AMI)
    • Proceedings of power and energy society general meeting - conversion and delivery of electrical energy in the 21st century
    • Cleveland F. Cyber security issues for advanced metering infrastructure (AMI). In: Proceedings of power and energy society general meeting - conversion and delivery of electrical energy in the 21st century; 2008.
    • (2008)
    • Cleveland, F.1
  • 2
    • 77952128387 scopus 로고    scopus 로고
    • Exploring a tiered architecture for naspinet
    • Proceedings of innovative smart grid technologies (ISGT)
    • Bobba R, Heine E, Khurana H, Yardley T. Exploring a tiered architecture for naspinet. In: Proceedings of innovative smart grid technologies (ISGT); 2010.
    • (2010)
    • Bobba, R.1    Heine, E.2    Khurana, H.3    Yardley, T.4
  • 3
    • 80052266554 scopus 로고    scopus 로고
    • Wide-area monitoring, protection, and control of future electric power networks
    • Terzija V., Valverde G., Cai D., Regulski P., Madani V., Fitch J., et al. Wide-area monitoring, protection, and control of future electric power networks. Proc IEEE 2011, 99(1):80-93.
    • (2011) Proc IEEE , vol.99 , Issue.1 , pp. 80-93
    • Terzija, V.1    Valverde, G.2    Cai, D.3    Regulski, P.4    Madani, V.5    Fitch, J.6
  • 5
    • 84901692745 scopus 로고    scopus 로고
    • North American Synchrophasor Initiative (NASPI). Phasor Data Applications Table [Internet];. Available from:
    • North American Synchrophasor Initiative (NASPI). Phasor Data Applications Table [Internet]; 2009. Available from: https://www.naspi.org/File.aspx?fileID=537.
    • (2009)
  • 6
    • 84901694095 scopus 로고    scopus 로고
    • Western Electricity Coordinating Council. WECC Remedial Action Scheme Design Guide [Internet];.Available from:
    • Western Electricity Coordinating Council. WECC Remedial Action Scheme Design Guide [Internet]; 2006. Available from: http://www.wecc.biz/committees/StandingCommittees/OC/TOS/RWG/Lists/Calendar/Attachments/13/06a-RAS_Guide_5.02.pdf.
    • (2006)
  • 7
    • 84875971820 scopus 로고    scopus 로고
    • High-impact, low frequency event risk to the North American bulk power system
    • Jointly-commissioned summary, Report, US Department of Energy, North American Electric Reliability Corporation.
    • North American Electric Reliability Corporation. High-impact, low frequency event risk to the North American bulk power system. In: Jointly-commissioned summary, Report, US Department of Energy; 2009.
    • (2009)
  • 8
    • 74049113264 scopus 로고    scopus 로고
    • False data injection attacks against state estimation in electric power grids
    • Proceedings of the 16th ACM conference on computer and communications security, CCS '09, ACM, New York, USA
    • Liu Y, Ning P, Reiter MK. False data injection attacks against state estimation in electric power grids. In: Proceedings of the 16th ACM conference on computer and communications security, CCS '09, ACM, New York, USA; 2009.
    • (2009)
    • Liu, Y.1    Ning, P.2    Reiter, M.K.3
  • 9
    • 78649620658 scopus 로고    scopus 로고
    • Data integrity attacks and their impacts on SCADA control system
    • Proceedings of power and energy society general meeting
    • Sridhar S, Manimaran G. Data integrity attacks and their impacts on SCADA control system. In: Proceedings of power and energy society general meeting; 2010.
    • (2010)
    • Sridhar, S.1    Manimaran, G.2
  • 10
    • 84878309013 scopus 로고    scopus 로고
    • Cyber-physical security testbeds: architecture, application, and evaluation for smart grid
    • Hahn A., Ashok A., Sridhar S., Govindarasu M. Cyber-physical security testbeds: architecture, application, and evaluation for smart grid. IEEE Trans Smart Grid 2013.
    • (2013) IEEE Trans Smart Grid
    • Hahn, A.1    Ashok, A.2    Sridhar, S.3    Govindarasu, M.4
  • 11
    • 79952967646 scopus 로고    scopus 로고
    • Synchrophasor standards development - IEEE C37.118 & IEC 61850
    • Proceedings of system sciences (HICSS), 2011 44th Hawaii international conference
    • Martin K. Synchrophasor standards development - IEEE C37.118 & IEC 61850. In: Proceedings of system sciences (HICSS), 2011 44th Hawaii international conference; 2011.
    • (2011)
    • Martin, K.1
  • 12
    • 48249098845 scopus 로고    scopus 로고
    • A low-latency, high-integrity security retrofit for legacy scada systems
    • Jajodia S, Samarati P, Cimato S, editors. Proceedings of the IFIP TC 11 23rd international information security conference, vol. 278. Proceedings of IFIP the international federation for information processing. US: Springer
    • Tsang P, Smith S, Yasir. A low-latency, high-integrity security retrofit for legacy scada systems. In: Jajodia S, Samarati P, Cimato S, editors. Proceedings of the IFIP TC 11 23rd international information security conference, vol. 278. Proceedings of IFIP the international federation for information processing. US: Springer; 2008.
    • (2008)
    • Tsang, P.1    Smith, S.2    Yasir3
  • 13
    • 79958855381 scopus 로고    scopus 로고
    • Key management for substations: symmetric keys, public keys or no keys?
    • Proceedings of power systems conference and exposition (PSCE), IEEE/PES
    • Fuloria S, Anderson R, Alvarez F, McGrath K. Key management for substations: symmetric keys, public keys or no keys?. In: Proceedings of power systems conference and exposition (PSCE), IEEE/PES; 2011.
    • (2011)
    • Fuloria, S.1    Anderson, R.2    Alvarez, F.3    McGrath, K.4
  • 15
    • 84869389656 scopus 로고    scopus 로고
    • A game-theoretic framework for network security vulnerability assessment and mitigation
    • Grossklags J, Walrand J, editors. Decision and game theory for security, vol. 7638 of lecture notes in computer science. Berlin, Heidelberg: Springer
    • Gueye A, Marbukh V. A game-theoretic framework for network security vulnerability assessment and mitigation. In: Grossklags J, Walrand J, editors. Decision and game theory for security, vol. 7638 of lecture notes in computer science. Berlin, Heidelberg: Springer; 2012.
    • (2012)
    • Gueye, A.1    Marbukh, V.2
  • 16
    • 77951729734 scopus 로고    scopus 로고
    • A survey of game theory as applied to network security
    • Proceedings of system sciences (HICSS), 2010 43rd Hawaii international conference
    • Roy S, Ellis C, Shiva S, Dasgupta D, Shandilya V, Wu Q. A survey of game theory as applied to network security. In: Proceedings of system sciences (HICSS), 2010 43rd Hawaii international conference; 2010.
    • (2010)
    • Roy, S.1    Ellis, C.2    Shiva, S.3    Dasgupta, D.4    Shandilya, V.5    Wu, Q.6
  • 17
    • 33947365606 scopus 로고    scopus 로고
    • Evaluating strategies for defending electric power networks against antagonistic attacks
    • Holmgren A., Jenelius E., Westin J. Evaluating strategies for defending electric power networks against antagonistic attacks. IEEE Trans Power Syst 2007.
    • (2007) IEEE Trans Power Syst
    • Holmgren, A.1    Jenelius, E.2    Westin, J.3
  • 19
    • 60649112340 scopus 로고    scopus 로고
    • Stochastic petri nets: an introduction to the theory
    • doi: 10.1145/288197.581194
    • Bause F., Kritzinger P.S. Stochastic petri nets: an introduction to the theory. Sigmetrics Perform Eval Rev 1998, 26(2). doi: 10.1145/288197.581194, .
    • (1998) Sigmetrics Perform Eval Rev , vol.26 , Issue.2
    • Bause, F.1    Kritzinger, P.S.2
  • 20
    • 84901690765 scopus 로고    scopus 로고
    • WECC remedial action scheme catalog summary [Internet];. Available from:
    • WECC remedial action scheme catalog summary [Internet]; 2008. Available from: http://www.wecc.biz/committees/StandingCommittees/OC/TOS/RWG/Lists/Calendar/Attachments/4/WECC-RAS-CATALOG%2010-22-2008%20Master.pdf.
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.