메뉴 건너뛰기




Volumn 417, Issue , 2013, Pages 125-138

Factors impacting attacker decision-making in power grid cyber attacks

Author keywords

Attacker decision making; Cyber attacks; Industrial control systems

Indexed keywords

BUDGET CONTROL; CRITICAL INFRASTRUCTURES; DECISION MAKING; ELECTRIC POWER TRANSMISSION NETWORKS; NETWORK SECURITY; PERSONAL COMPUTING; PUBLIC WORKS; RISK ASSESSMENT; SECURITY SYSTEMS; SURVEYS;

EID: 84921060738     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-45330-4_9     Document Type: Conference Paper
Times cited : (4)

References (30)
  • 3
    • 84887087707 scopus 로고    scopus 로고
    • Panetta warns of dire threat of cyberattack on U.S
    • E. Bumiller and T. Shanker, Panetta warns of dire threat of cyberattack on U.S., New York Times, October 11, 2010.
    • (2010) New York Times
    • Bumiller, E.1    Shanker, T.2
  • 4
    • 84894174148 scopus 로고    scopus 로고
    • Situational crime prevention
    • Environmental Criminology and Crime Analysis, R. Wortley and L. Mazerolle (Eds.), Portland, Oregon
    • R. Clarke, Situational crime prevention, in Environmental Criminology and Crime Analysis, R. Wortley and L. Mazerolle (Eds.), Willan Publishing, Portland, Oregon, pp. 178–194, 2008.
    • (2008) Willan Publishing , pp. 178-194
    • Clarke, R.1
  • 5
    • 0000204509 scopus 로고
    • Social change and crime rate trends: A routine activity approach
    • L. Cohen and M. Felson, Social change and crime rate trends: A routine activity approach, American Sociological Review, vol. 44(4), pp. 588–609, 1979.
    • (1979) American Sociological Review , vol.44 , Issue.4 , pp. 588-609
    • Cohen, L.1    Felson, M.2
  • 7
    • 84880609979 scopus 로고    scopus 로고
    • Best practices in exploratory factory analysis: Four recommendations for getting the most from your analysis, Practical Assessment
    • A. Costello and J. Osborne, Best practices in exploratory factory analysis: Four recommendations for getting the most from your analysis, Practical Assessment, Research and Evaluation, vol. 10(7), pp. 173–178, 2005.
    • (2005) Research and Evaluation , vol.10 , Issue.7 , pp. 173-178
    • Costello, A.1    Osborne, J.2
  • 11
    • 84925417756 scopus 로고    scopus 로고
    • Exploratory factor analysis
    • N. Salkind (Ed.), Sage Publications, Thousand Oaks, California
    • N. Grant and L. Fabrigar, Exploratory factor analysis, in Encyclopedia of Measurement and Statistics, N. Salkind (Ed.), Sage Publications, Thousand Oaks, California, pp. 332–335, 2007.
    • (2007) Encyclopedia of Measurement and Statistics , pp. 332-335
    • Grant, N.1    Fabrigar, L.2
  • 13
    • 77954238840 scopus 로고
    • Mixing qualitative and quantitative methods: Triangulation in action
    • T. Jick, Mixing qualitative and quantitative methods: Triangulation in action, Administrative Science Quarterly, vol. 24(4), pp. 602–611, 1979.
    • (1979) Administrative Science Quarterly , vol.24 , Issue.4 , pp. 602-611
    • Jick, T.1
  • 21
    • 85025152289 scopus 로고    scopus 로고
    • 2005, Special Report NCJ 221943, Bureau of Justice Statistics, U.S. Department of Justice, Washington, DC
    • R. Rantala, Cybercrimes Against Businesses, 2005, Special Report NCJ 221943, Bureau of Justice Statistics, U.S. Department of Justice, Washington, DC, 2008.
    • Cybercrimes against Businesses , vol.2008
    • Rantala, R.1
  • 22
    • 75249091463 scopus 로고    scopus 로고
    • Cybercrimes against critical infrastructures: A study of online criminal organizations and techniques
    • A. Rege, Cybercrimes against critical infrastructures: A study of online criminal organizations and techniques, Criminal Justice Studies, vol. 22(3), pp. 261–271, 2009.
    • (2009) Criminal Justice Studies , vol.22 , Issue.3 , pp. 261-271
    • Rege, A.1
  • 28
    • 84879911354 scopus 로고    scopus 로고
    • Common Cybersecurity Vulnerabilities in Industrial Control Systems, Washington, DC
    • U.S. Department of Homeland Security, Common Cybersecurity Vulnerabilities in Industrial Control Systems, Washington, DC, 2011.
    • (2011) U.S. Department of Homeland Security


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.