메뉴 건너뛰기




Volumn , Issue , 2016, Pages 319-324

Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios

Author keywords

cybersecurity; NESCOR; Smart grid

Indexed keywords

ELECTRIC POWER TRANSMISSION NETWORKS; OUTAGES; RISK ASSESSMENT; RISK PERCEPTION;

EID: 84964318272     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PRDC.2015.37     Document Type: Conference Paper
Times cited : (43)

References (22)
  • 2
    • 84901359528 scopus 로고    scopus 로고
    • A risk assessment framework for the smart grid
    • Aug.
    • R. Habash, V. Groza, D. Krewski, and G. Paoli, "A risk assessment framework for the smart grid," in IEEE EPEC, Aug. 2013.
    • (2013) IEEE EPEC
    • Habash, R.1    Groza, V.2    Krewski, D.3    Paoli, G.4
  • 4
    • 84947789275 scopus 로고    scopus 로고
    • Electric sector failure scenarios and impact analyses
    • Jun.
    • National Electric Sector Cybersecurity Organization Resource, "Electric sector failure scenarios and impact analyses," Electric Power Research Institute, Tech. Rep. 2.0, Jun. 2014.
    • (2014) Electric Power Research Institute, Tech. Rep. 2.0
  • 5
    • 84919497472 scopus 로고    scopus 로고
    • CyberSAGE: A tool for automatic security assessment of cyber physical systems
    • Sep.
    • A. H. Vu, N. O. Tippenhauer, B. Chen, D. M. Nicol, and Z. Kalbarczyk, "CyberSAGE: A tool for automatic security assessment of cyber physical systems," in QEST, Sep. 2014.
    • (2014) QEST
    • Vu, A.H.1    Tippenhauer, N.O.2    Chen, B.3    Nicol, D.M.4    Kalbarczyk, Z.5
  • 7
    • 80755174164 scopus 로고    scopus 로고
    • Mal-activity diagrams for capturing attacks on business processes
    • Jun.
    • G. Sindre, "Mal-activity diagrams for capturing attacks on business processes," in REFSQ, Jun. 2007.
    • (2007) REFSQ
    • Sindre, G.1
  • 8
    • 84964332173 scopus 로고    scopus 로고
    • Electric sector failure scenarios common vulnerabilities and mitigations mapping
    • Jun.
    • National Electric Sector Cybersecurity Organization Resource, "Electric sector failure scenarios common vulnerabilities and mitigations mapping," Electric Power Research Institute, Tech. Rep., Jun. 2014.
    • (2014) Electric Power Research Institute, Tech. Rep.
  • 9
    • 85019842253 scopus 로고    scopus 로고
    • Integrating electricity subsector failure scenarios into a risk assessment methodology
    • Dec.
    • A. Lee, "Integrating electricity subsector failure scenarios into a risk assessment methodology," Electric Power Research Institute, Tech. Rep., Dec. 2013.
    • (2013) Electric Power Research Institute, Tech. Rep.
    • Lee, A.1
  • 10
    • 84902299886 scopus 로고    scopus 로고
    • Security analysis of selected ami failure scenarios using agent based game theoretic simulation
    • Jan.
    • R. Abercrombie, B. Schlicher, and F. Sheldon, "Security analysis of selected ami failure scenarios using agent based game theoretic simulation," in HICSS, Jan. 2014.
    • (2014) HICSS
    • Abercrombie, R.1    Schlicher, B.2    Sheldon, F.3
  • 11
    • 84922428632 scopus 로고    scopus 로고
    • Monitoring advanced metering infrastructures with amilyzer
    • Nov.
    • R. Berthier and W. H. Sanders., "Monitoring advanced metering infrastructures with amilyzer," in C&ESAR, Nov. 2013.
    • (2013) C&ESAR
    • Berthier, R.1    Sanders, W.H.2
  • 12
    • 84922470712 scopus 로고    scopus 로고
    • Cybersecurity and the smarter grid
    • C. Hawk and A. Kaushiva, "Cybersecurity and the smarter grid," The Electricity Journal, Vol. 27, no. 8, pp. 84-95, 2014.
    • (2014) The Electricity Journal , vol.27 , Issue.8 , pp. 84-95
    • Hawk, C.1    Kaushiva, A.2
  • 13
    • 84880572592 scopus 로고    scopus 로고
    • The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures
    • IEEE Sep.
    • T. Sommestad, M. Ekstedt, and H. Holm, "The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures," Systems Journal, IEEE, Vol. 7, no. 3, Sep. 2013.
    • (2013) Systems Journal , vol.7 , Issue.3
    • Sommestad, T.1    Ekstedt, M.2    Holm, H.3
  • 14
    • 80055043688 scopus 로고    scopus 로고
    • Modelbased security metrics using ADversary VIew security evaluation (ADVISE)
    • Sep.
    • E. LeMay, M. Ford, K. Keefe, W. Sanders, and C. Muehrke, "Modelbased security metrics using ADversary VIew Security Evaluation (ADVISE)," in QEST, Sep. 2011.
    • (2011) QEST
    • LeMay, E.1    Ford, M.2    Keefe, K.3    Sanders, W.4    Muehrke, C.5
  • 15
    • 84964335505 scopus 로고    scopus 로고
    • DAG-based attack and defense modeling: Don't miss the forest for the attack trees
    • Vol. abs/1303.7397
    • B. Kordy, L. Pietre-Cambacedes, and P. Schweitzer, "DAG-based attack and defense modeling: Don't miss the forest for the attack trees," CoRR, Vol. abs/1303.7397, 2013.
    • (2013) CoRR
    • Kordy, B.1    Pietre-Cambacedes, L.2    Schweitzer, P.3
  • 21
    • 85082162726 scopus 로고    scopus 로고
    • Tech. Rep.
    • "CyberSAGE NESCOR Tech Report," https://www.illinois.adsc.com.sg/papers/CyberSAGE-NESCOR-TechReport.pdf, Tech. Rep.
    • CyberSAGE NESCOR Tech Report
  • 22
    • 85082154737 scopus 로고    scopus 로고
    • "CyberSAGE," https://www.illinois.adsc.com.sg/cybersage/.
    • CyberSAGE


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.