Reliability Analysis of Electric Power Systems Considering Cyber Security

[1]  Valerie C. Coffey,et al.  High-Energy Lasers: New Advances in Defense Applications , 2014 .

[2]  Sakir Sezer,et al.  Rule-Based Intrusion Detection System for SCADA Networks , 2013 .

[3]  Mohamed E. El-Hawary,et al.  The Smart Grid—State-of-the-art and future trends , 2014, 2016 Eighteenth International Middle East Power Systems Conference (MEPCON).

[4]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[5]  Guillermo A. Francia,et al.  Security Best Practices and Risk Assessment of SCADA and Industrial Control Systems , 2012 .

[6]  Khosrow Moslehi,et al.  Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.

[7]  E. Eugene Schultz A framework for understanding and predicting insider attacks , 2002, Comput. Secur..

[8]  William Nzoukou,et al.  A Unified Framework for Measuring a Network's Mean Time-to-Compromise , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.

[9]  I. Kamwa,et al.  Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance , 2005, IEEE Transactions on Power Systems.

[10]  Y. B. Yuan,et al.  Stateful intrusion detection for IEC 60870-5-104 SCADA security , 2014, 2014 IEEE PES General Meeting | Conference & Exposition.

[11]  Jason Stamp,et al.  Reliability impacts from cyber attack on electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.

[12]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[13]  Arati Baliga,et al.  Lurking in the Shadows: Identifying Systemic Threats to Kernel Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[14]  Taskin Koçak,et al.  Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.

[15]  R. Pyke Markov renewal processes: Definitions and preliminary properties , 1961 .

[16]  M. Milvich,et al.  Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS) , 2008, 2008 IEEE Conference on Technologies for Homeland Security.

[17]  David John Leversage,et al.  Estimating a System's Mean Time-to-Compromise , 2008, IEEE Security & Privacy.

[18]  T. Bayes An essay towards solving a problem in the doctrine of chances , 2003 .

[19]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[20]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[21]  Constantin F. Aliferis,et al.  The max-min hill-climbing Bayesian network structure learning algorithm , 2006, Machine Learning.

[22]  Sara Matzner,et al.  Analysis and Detection of Malicious Insiders , 2005 .

[23]  Chen-Ching Liu,et al.  Cyber-vulnerability of power grid monitoring and control systems , 2008, CSIIRW '08.

[24]  Miles A. McQueen,et al.  Time-to-Compromise Model for Cyber Risk Reduction Estimation , 2006, Quality of Protection.

[25]  H. Jeffreys An invariant form for the prior probability in estimation problems , 1946, Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences.

[26]  Martin P. Loeb,et al.  CSI/FBI Computer Crime and Security Survey , 2004 .

[27]  L. Nordstrom,et al.  Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams , 2009, IEEE Transactions on Power Delivery.

[28]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[29]  Göran N Ericsson,et al.  Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.

[30]  Jianhui Wang,et al.  Cyber-Physical Modeling and Cyber-Contingency Assessment of Hierarchical Control Systems , 2015, IEEE Transactions on Smart Grid.

[31]  Mohammad Shahidehpour,et al.  The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .

[32]  A. G. Bruce Reliability analysis of electric utility SCADA systems , 1997 .

[33]  Hao Liang,et al.  CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.

[34]  Chen-Ching Liu,et al.  Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.

[35]  Laurence R. Phillips,et al.  Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08). , 2009 .

[36]  Danda B. Rawat,et al.  Cyber security for smart grid systems: Status, challenges and perspectives , 2015, SoutheastCon 2015.

[37]  Briam Johnson,et al.  National SCADA Test Bed Substation Automation Evaluation Report , 2009 .

[38]  Wenyuan Li,et al.  Reliability Assessment of Electric Power Systems Using Monte Carlo Methods , 1994 .

[39]  Robert Radvanovsky,et al.  Handbook of SCADA/control systems security , 2013 .

[40]  Sandip C. Patel,et al.  Securing SCADA systems , 2008, Inf. Manag. Comput. Secur..

[41]  Siddharth Sridhar,et al.  Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.

[42]  John A. Major Advanced Techniques for Modeling Terrorism Risk , 2002 .

[43]  Malek Ben Salem,et al.  A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.

[44]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[45]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[46]  Lingfeng Wang,et al.  Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.

[47]  Robert C. Green,et al.  Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .

[48]  Lingyu Wang,et al.  Measuring Network Security Using Bayesian Network-Based Attack Graphs , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.

[49]  N. Limnios,et al.  Semi-Markov Processes and Reliability , 2012 .

[50]  Xavier Litrico,et al.  Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.

[51]  Lawrie Jones SECURING THE SMART CITY , 2016 .