Reliability Analysis of Electric Power Systems Considering Cyber Security
暂无分享,去创建一个
[1] Valerie C. Coffey,et al. High-Energy Lasers: New Advances in Defense Applications , 2014 .
[2] Sakir Sezer,et al. Rule-Based Intrusion Detection System for SCADA Networks , 2013 .
[3] Mohamed E. El-Hawary,et al. The Smart Grid—State-of-the-art and future trends , 2014, 2016 Eighteenth International Middle East Power Systems Conference (MEPCON).
[4] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[5] Guillermo A. Francia,et al. Security Best Practices and Risk Assessment of SCADA and Industrial Control Systems , 2012 .
[6] Khosrow Moslehi,et al. Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.
[7] E. Eugene Schultz. A framework for understanding and predicting insider attacks , 2002, Comput. Secur..
[8] William Nzoukou,et al. A Unified Framework for Measuring a Network's Mean Time-to-Compromise , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.
[9] I. Kamwa,et al. Causes of the 2003 major grid blackouts in North America and Europe, and recommended means to improve system dynamic performance , 2005, IEEE Transactions on Power Systems.
[10] Y. B. Yuan,et al. Stateful intrusion detection for IEC 60870-5-104 SCADA security , 2014, 2014 IEEE PES General Meeting | Conference & Exposition.
[11] Jason Stamp,et al. Reliability impacts from cyber attack on electric power systems , 2009, 2009 IEEE/PES Power Systems Conference and Exposition.
[12] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[13] Arati Baliga,et al. Lurking in the Shadows: Identifying Systemic Threats to Kernel Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[14] Taskin Koçak,et al. Smart Grid Technologies: Communication Technologies and Standards , 2011, IEEE Transactions on Industrial Informatics.
[15] R. Pyke. Markov renewal processes: Definitions and preliminary properties , 1961 .
[16] M. Milvich,et al. Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS) , 2008, 2008 IEEE Conference on Technologies for Homeland Security.
[17] David John Leversage,et al. Estimating a System's Mean Time-to-Compromise , 2008, IEEE Security & Privacy.
[18] T. Bayes. An essay towards solving a problem in the doctrine of chances , 2003 .
[19] André Teixeira,et al. Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.
[20] Naima Kaabouch,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[21] Constantin F. Aliferis,et al. The max-min hill-climbing Bayesian network structure learning algorithm , 2006, Machine Learning.
[22] Sara Matzner,et al. Analysis and Detection of Malicious Insiders , 2005 .
[23] Chen-Ching Liu,et al. Cyber-vulnerability of power grid monitoring and control systems , 2008, CSIIRW '08.
[24] Miles A. McQueen,et al. Time-to-Compromise Model for Cyber Risk Reduction Estimation , 2006, Quality of Protection.
[25] H. Jeffreys. An invariant form for the prior probability in estimation problems , 1946, Proceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences.
[26] Martin P. Loeb,et al. CSI/FBI Computer Crime and Security Survey , 2004 .
[27] L. Nordstrom,et al. Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams , 2009, IEEE Transactions on Power Delivery.
[28] E. Byres,et al. The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .
[29] Göran N Ericsson,et al. Cyber Security and Power System Communication—Essential Parts of a Smart Grid Infrastructure , 2010, IEEE Transactions on Power Delivery.
[30] Jianhui Wang,et al. Cyber-Physical Modeling and Cyber-Contingency Assessment of Hierarchical Control Systems , 2015, IEEE Transactions on Smart Grid.
[31] Mohammad Shahidehpour,et al. The IEEE Reliability Test System-1996. A report prepared by the Reliability Test System Task Force of the Application of Probability Methods Subcommittee , 1999 .
[32] A. G. Bruce. Reliability analysis of electric utility SCADA systems , 1997 .
[33] Hao Liang,et al. CCPA: Coordinated Cyber-Physical Attacks and Countermeasures in Smart Grid , 2017, IEEE Transactions on Smart Grid.
[34] Chen-Ching Liu,et al. Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.
[35] Laurence R. Phillips,et al. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08). , 2009 .
[36] Danda B. Rawat,et al. Cyber security for smart grid systems: Status, challenges and perspectives , 2015, SoutheastCon 2015.
[37] Briam Johnson,et al. National SCADA Test Bed Substation Automation Evaluation Report , 2009 .
[38] Wenyuan Li,et al. Reliability Assessment of Electric Power Systems Using Monte Carlo Methods , 1994 .
[39] Robert Radvanovsky,et al. Handbook of SCADA/control systems security , 2013 .
[40] Sandip C. Patel,et al. Securing SCADA systems , 2008, Inf. Manag. Comput. Secur..
[41] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[42] John A. Major. Advanced Techniques for Modeling Terrorism Risk , 2002 .
[43] Malek Ben Salem,et al. A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.
[44] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[45] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[46] Lingfeng Wang,et al. Power System Reliability Evaluation With SCADA Cybersecurity Considerations , 2015, IEEE Transactions on Smart Grid.
[47] Robert C. Green,et al. Intrusion Detection System in A Multi-Layer Network Architecture of Smart Grids by Yichi , 2015 .
[48] Lingyu Wang,et al. Measuring Network Security Using Bayesian Network-Based Attack Graphs , 2008, 2008 32nd Annual IEEE International Computer Software and Applications Conference.
[49] N. Limnios,et al. Semi-Markov Processes and Reliability , 2012 .
[50] Xavier Litrico,et al. Cyber Security of Water SCADA Systems—Part I: Analysis and Experimentation of Stealthy Deception Attacks , 2013, IEEE Transactions on Control Systems Technology.
[51] Lawrie Jones. SECURING THE SMART CITY , 2016 .