-
2
-
-
84901359528
-
A risk assessment framework for the smart grid
-
Aug.
-
R. Habash, V. Groza, D. Krewski, and G. Paoli, "A risk assessment framework for the smart grid," in IEEE EPEC, Aug. 2013.
-
(2013)
IEEE EPEC
-
-
Habash, R.1
Groza, V.2
Krewski, D.3
Paoli, G.4
-
4
-
-
84947789275
-
Electric sector failure scenarios and impact analyses
-
Jun.
-
National Electric Sector Cybersecurity Organization Resource, "Electric sector failure scenarios and impact analyses," Electric Power Research Institute, Tech. Rep. 2.0, Jun. 2014.
-
(2014)
Electric Power Research Institute, Tech. Rep. 2.0
-
-
-
5
-
-
84919497472
-
CyberSAGE: A tool for automatic security assessment of cyber physical systems
-
Sep.
-
A. H. Vu, N. O. Tippenhauer, B. Chen, D. M. Nicol, and Z. Kalbarczyk, "CyberSAGE: A tool for automatic security assessment of cyber physical systems," in QEST, Sep. 2014.
-
(2014)
QEST
-
-
Vu, A.H.1
Tippenhauer, N.O.2
Chen, B.3
Nicol, D.M.4
Kalbarczyk, Z.5
-
6
-
-
84919473767
-
Automatic generation of security argument graphs
-
Nov.
-
N. O. Tippenhauer, W. G. Temple, A. H. Vu, B. Chen, D. M. Nicol, Z. Kalbarczyk, and W. Sanders, "Automatic generation of security argument graphs," in PRDC, Nov. 2014.
-
(2014)
PRDC
-
-
Tippenhauer, N.O.1
Temple, W.G.2
Vu, A.H.3
Chen, B.4
Nicol, D.M.5
Kalbarczyk, Z.6
Sanders, W.7
-
7
-
-
80755174164
-
Mal-activity diagrams for capturing attacks on business processes
-
Jun.
-
G. Sindre, "Mal-activity diagrams for capturing attacks on business processes," in REFSQ, Jun. 2007.
-
(2007)
REFSQ
-
-
Sindre, G.1
-
8
-
-
84964332173
-
Electric sector failure scenarios common vulnerabilities and mitigations mapping
-
Jun.
-
National Electric Sector Cybersecurity Organization Resource, "Electric sector failure scenarios common vulnerabilities and mitigations mapping," Electric Power Research Institute, Tech. Rep., Jun. 2014.
-
(2014)
Electric Power Research Institute, Tech. Rep.
-
-
-
9
-
-
85019842253
-
Integrating electricity subsector failure scenarios into a risk assessment methodology
-
Dec.
-
A. Lee, "Integrating electricity subsector failure scenarios into a risk assessment methodology," Electric Power Research Institute, Tech. Rep., Dec. 2013.
-
(2013)
Electric Power Research Institute, Tech. Rep.
-
-
Lee, A.1
-
10
-
-
84902299886
-
Security analysis of selected ami failure scenarios using agent based game theoretic simulation
-
Jan.
-
R. Abercrombie, B. Schlicher, and F. Sheldon, "Security analysis of selected ami failure scenarios using agent based game theoretic simulation," in HICSS, Jan. 2014.
-
(2014)
HICSS
-
-
Abercrombie, R.1
Schlicher, B.2
Sheldon, F.3
-
11
-
-
84922428632
-
Monitoring advanced metering infrastructures with amilyzer
-
Nov.
-
R. Berthier and W. H. Sanders., "Monitoring advanced metering infrastructures with amilyzer," in C&ESAR, Nov. 2013.
-
(2013)
C&ESAR
-
-
Berthier, R.1
Sanders, W.H.2
-
12
-
-
84922470712
-
Cybersecurity and the smarter grid
-
C. Hawk and A. Kaushiva, "Cybersecurity and the smarter grid," The Electricity Journal, Vol. 27, no. 8, pp. 84-95, 2014.
-
(2014)
The Electricity Journal
, vol.27
, Issue.8
, pp. 84-95
-
-
Hawk, C.1
Kaushiva, A.2
-
13
-
-
84880572592
-
The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures
-
IEEE Sep.
-
T. Sommestad, M. Ekstedt, and H. Holm, "The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures," Systems Journal, IEEE, Vol. 7, no. 3, Sep. 2013.
-
(2013)
Systems Journal
, vol.7
, Issue.3
-
-
Sommestad, T.1
Ekstedt, M.2
Holm, H.3
-
14
-
-
80055043688
-
Modelbased security metrics using ADversary VIew security evaluation (ADVISE)
-
Sep.
-
E. LeMay, M. Ford, K. Keefe, W. Sanders, and C. Muehrke, "Modelbased security metrics using ADversary VIew Security Evaluation (ADVISE)," in QEST, Sep. 2011.
-
(2011)
QEST
-
-
LeMay, E.1
Ford, M.2
Keefe, K.3
Sanders, W.4
Muehrke, C.5
-
15
-
-
84964335505
-
DAG-based attack and defense modeling: Don't miss the forest for the attack trees
-
Vol. abs/1303.7397
-
B. Kordy, L. Pietre-Cambacedes, and P. Schweitzer, "DAG-based attack and defense modeling: Don't miss the forest for the attack trees," CoRR, Vol. abs/1303.7397, 2013.
-
(2013)
CoRR
-
-
Kordy, B.1
Pietre-Cambacedes, L.2
Schweitzer, P.3
-
16
-
-
84919473849
-
Go with the flow: Toward workflow-oriented security assessment
-
B. Chen, Z. Kalbarczyk, D. M. Nicol, W. H. Sanders, R. Tan, W. G. Temple, N. O. Tippenhauer, A. H. Vu, and D. K. Yau, "Go with the flow: Toward workflow-oriented security assessment," in NSPW, 2013.
-
(2013)
NSPW
-
-
Chen, B.1
Kalbarczyk, Z.2
Nicol, D.M.3
Sanders, W.H.4
Tan, R.5
Temple, W.G.6
Tippenhauer, N.O.7
Vu, A.H.8
Yau, D.K.9
-
21
-
-
85082162726
-
-
Tech. Rep.
-
"CyberSAGE NESCOR Tech Report," https://www.illinois.adsc.com.sg/papers/CyberSAGE-NESCOR-TechReport.pdf, Tech. Rep.
-
CyberSAGE NESCOR Tech Report
-
-
-
22
-
-
85082154737
-
-
"CyberSAGE," https://www.illinois.adsc.com.sg/cybersage/.
-
CyberSAGE
-
-
|