-
3
-
-
84155167232
-
Cyber Physical Security of a Smart Grid Infrastructure
-
M. Yilin, T. H. J. Kim, K. Brancik, D. Dickinson, L. Heejo, A. Perrig, et al., "Cyber Physical Security of a Smart Grid Infrastructure," Proceedings of the IEEE, vol. 100, pp. 195-209, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, pp. 195-209
-
-
Yilin, M.1
Kim, T.H.J.2
Brancik, K.3
Dickinson, D.4
Heejo, L.5
Perrig, A.6
-
5
-
-
84893158758
-
Impact of cyber attacks on transient stability of smart grids with voltage support devices
-
Vancouver, Canada
-
B. Chen, S. Mashayekh, K. L. Butler-Purry, and D. Kundur, "Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices," in Proc. 2013 IEEE/PES General Meeting, Vancouver, Canada, 2013.
-
(2013)
Proc. 2013 IEEE/PES General Meeting
-
-
Chen, B.1
Mashayekh, S.2
Butler-Purry, K.L.3
Kundur, D.4
-
6
-
-
82155175605
-
Integrity data attacks in power market operations
-
X. Le, M. Yilin, and B. Sinopoli, "Integrity Data Attacks in Power Market Operations," IEEE Transactions on Smart Grid, vol. 2, pp. 659-666, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, pp. 659-666
-
-
Le, X.1
Yilin, M.2
Sinopoli, B.3
-
7
-
-
82155164993
-
Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid
-
Gaithersburg
-
D. Kundur, F. Xianyong, L. Shan, T. Zourntos, and K. L. Butler-Purry, "Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid," in Proc. 1st IEEE International Conference on Smart Grid Communications, Gaithersburg, pp. 244-249.
-
Proc. 1st IEEE International Conference on Smart Grid Communications
, pp. 244-249
-
-
Kundur, D.1
Xianyong, F.2
Shan, L.3
Zourntos, T.4
Butler-Purry, K.L.5
-
8
-
-
67349092535
-
Vulnerability assessment of cybersecurity for scada systems
-
T. Chee-Wooi, L. Chen-Ching, and G. Manimaran, "Vulnerability Assessment of Cybersecurity for SCADA Systems," IEEE Transactions on Power Systems, vol. 23, pp. 1836-1846, 2008.
-
(2008)
IEEE Transactions on Power Systems
, vol.23
, pp. 1836-1846
-
-
Chee-Wooi, T.1
Chen-Ching, L.2
Manimaran, G.3
-
9
-
-
84155167085
-
Cyber physical system security for the electric power grid
-
S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber Physical System Security for the Electric Power Grid," Proceedings of the IEEE, vol. 100, pp. 210-224, 2012.
-
(2012)
Proceedings of the IEEE
, vol.100
, pp. 210-224
-
-
Sridhar, S.1
Hahn, A.2
Govindarasu, M.3
-
10
-
-
82155162476
-
Malicious data attacks on the smart grid
-
O. Kosut, J. Liyan, R. J. Thomas, and T. Lang, "Malicious Data Attacks on the Smart Grid," IEEE Transactions on Smart Grid, vol. 2, pp. 645-658, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, pp. 645-658
-
-
Kosut, O.1
Liyan, J.2
Thomas, R.J.3
Lang, T.4
-
11
-
-
85027945316
-
Strategic protection against data injection attacks on power grids
-
T. T. Kim and H. V. Poor, "Strategic Protection Against Data Injection Attacks on Power Grids," IEEE Transactions on Smart Grid, vol. 2, pp. 326-333, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, pp. 326-333
-
-
Kim, T.T.1
Poor, H.V.2
-
12
-
-
84872095646
-
SCPSE: Security-oriented cyber-physical state estimation for power grid critical infrastructures
-
S. Zonouz, K. M. Rogers, R. Berthier, R. B. Bobba, W. H. Sanders, and T. J. Overbye, "SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures," IEEE Transactions on Smart Grid, vol. 3, pp. 1790-1799, 2012.
-
(2012)
IEEE Transactions on Smart Grid
, vol.3
, pp. 1790-1799
-
-
Zonouz, S.1
Rogers, K.M.2
Berthier, R.3
Bobba, R.B.4
Sanders, W.H.5
Overbye, T.J.6
-
13
-
-
82155196414
-
Cyber attack exposure evaluation framework for the smart grid
-
A. Hahn and M. Govindarasu, "Cyber Attack Exposure Evaluation Framework for the Smart Grid," IEEE Transactions on Smart Grid, vol. 2, pp. 835-843, 2011.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, pp. 835-843
-
-
Hahn, A.1
Govindarasu, M.2
-
14
-
-
48449088699
-
SCADA cyber security testbed development
-
C. M. Davis, J. E. Tate, H. Okhravi, C. Grier, T. J. Overbye, and D. Nicol, "SCADA Cyber Security Testbed Development," in Proc. 38th North American Power Symposium, 2006, pp. 483-488.
-
(2006)
Proc. 38th North American Power Symposium
, pp. 483-488
-
-
Davis, C.M.1
Tate, J.E.2
Okhravi, H.3
Grier, C.4
Overbye, T.J.5
Nicol, D.6
-
15
-
-
78751680564
-
Cyber security analysis testbed: Combining real, emulation, and simulation
-
B. van Leeuwen, V. Urias, J. Eldridge, C. Villamarin, and R. Olsberg, "Cyber security analysis testbed: Combining real, emulation, and simulation," in Proc. 2010 IEEE International Carnahan Conference on Security Technology (ICCST), 2010, pp. 121-126.
-
(2010)
Proc. 2010 IEEE International Carnahan Conference on Security Technology (ICCST)
, pp. 121-126
-
-
Van Leeuwen, B.1
Urias, V.2
Eldridge, J.3
Villamarin, C.4
Olsberg, R.5
-
16
-
-
79957979992
-
A testbed for analyzing security of SCADA control systems (TASSCS)
-
M. Mallouhi, Y. Al-Nashif, D. Cox, T. Chadaga, and S. Hariri, "A testbed for analyzing security of SCADA control systems (TASSCS)," in Proc. 2011 IEEE PES Innovative Smart Grid Technologies (ISGT), 2011, pp. 1-7.
-
(2011)
Proc. 2011 IEEE PES Innovative Smart Grid Technologies (ISGT)
, pp. 1-7
-
-
Mallouhi, M.1
Al-Nashif, Y.2
Cox, D.3
Chadaga, T.4
Hariri, S.5
-
17
-
-
84870599553
-
Development of power system test bed for data mining of synchrophasors data, cyber-attack and relay testing in RTDS
-
U. Adhikari, T. H. Morris, N. Dahal, S. Pan, R. L. King, N. H. Younan, et al., "Development of power system test bed for data mining of synchrophasors data, cyber-attack and relay testing in RTDS," in Proc. 2012 IEEE Power and Energy Society General Meeting, 2012, pp. 1-7.
-
(2012)
Proc. 2012 IEEE Power and Energy Society General Meeting
, pp. 1-7
-
-
Adhikari, U.1
Morris, T.H.2
Dahal, N.3
Pan, S.4
King, R.L.5
Younan, N.H.6
-
18
-
-
84878309013
-
Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid
-
A. Hahn, A. Ashok, S. Sridhar, and M. Govindarasu, "Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid," IEEE Trans. on Smart Grid, vol. 4, pp. 847-855, 2013.
-
(2013)
IEEE Trans. on Smart Grid
, vol.4
, pp. 847-855
-
-
Hahn, A.1
Ashok, A.2
Sridhar, S.3
Govindarasu, M.4
-
19
-
-
66149111186
-
-
U. S. Department of Energy (DOE) National Energy Technology Laboratory (NETL)
-
NETL, "A systems view of the modern grid," U. S. Department of Energy (DOE) National Energy Technology Laboratory (NETL)2007.
-
(2007)
A Systems View of the Modern Grid
-
-
Netl1
-
21
-
-
84930988926
-
Network Delay Caused by Cyber Attacks on SVC and its Impact on Transient Stability of Smart Grids
-
B. Chen, K. L. Butler-Purry, S. Nuthalapati, and D. Kundur, "Network Delay Caused by Cyber Attacks on SVC and its Impact on Transient Stability of Smart Grids," in Proc. 2014 IEEE Power and Energy Society General Meeting (PES), 2014, pp. 1-5.
-
(2014)
Proc. 2014 IEEE Power and Energy Society General Meeting (PES)
, pp. 1-5
-
-
Chen, B.1
Butler-Purry, K.L.2
Nuthalapati, S.3
Kundur, D.4
-
22
-
-
84918514749
-
-
NI PXI
-
NI PXI website. Available: http://www. ni. com/pxi/
-
-
-
-
23
-
-
84918560728
-
-
RTDS Technologies
-
RTDS Technologies. Available: http://www. rtds. com/
-
-
-
-
24
-
-
84918497976
-
-
Network Simulation (OPNET Modeler Suite)
-
Network Simulation (OPNET Modeler Suite). Available: http://www. riverbed. com/products-solutions/products/networkplanning-simulation/Network-Simulation. html
-
-
-
-
25
-
-
84918547343
-
-
WinPcap official website
-
WinPcap official website. Available: http://www. winpcap. org/
-
-
-
-
26
-
-
84918574129
-
-
IEC. IEC 61850-5 communication networks and systems in substations-Part 5: communication requirements for functions and device models
-
IEC. IEC 61850-5 communication networks and systems in substations-Part 5: communication requirements for functions and device models. Available: http://www. iec. ch
-
-
-
-
27
-
-
84889055603
-
Modeling cyber attacks on a critical infrastructure scenario
-
E. Ciancamerla, M. Minichino, and S. Palmieri, "Modeling cyber attacks on a critical infrastructure scenario," in Proc. 2013 Fourth International Conference on Information, Intelligence, Systems and Applications (IISA), 2013, pp. 1-6.
-
(2013)
Proc. 2013 Fourth International Conference on Information, Intelligence, Systems and Applications (IISA)
, pp. 1-6
-
-
Ciancamerla, E.1
Minichino, M.2
Palmieri, S.3
|