Power System Reliability Analysis With Intrusion Tolerance in SCADA Systems
暂无分享,去创建一个
[1] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[2] Wenbing Zhao,et al. Byzantine Fault Tolerance for Electric Power Grid Monitoring and Control , 2008, 2008 International Conference on Embedded Software and Systems.
[3] Miles A. McQueen,et al. Time-to-Compromise Model for Cyber Risk Reduction Estimation , 2006, Quality of Protection.
[4] N.I. Voropai,et al. Blackouts in North America and Europe: Analysis and generalization , 2005, 2005 IEEE Russia Power Tech.
[5] Wenyuan Li,et al. Reliability Assessment of Electric Power Systems Using Monte Carlo Methods , 1994 .
[6] Briam Johnson,et al. National SCADA Test Bed Substation Automation Evaluation Report , 2009 .
[7] Chen-Ching Liu,et al. Intruders in the Grid , 2012, IEEE Power and Energy Magazine.
[8] M. Amin,et al. Security challenges for the electricity infrastructure , 2002 .
[9] Nikolaos Limnios. Dependability analysis of semi-Markov systems , 1997 .
[10] Frank Chan,et al. A fully integrated substation LAN network for protection, control and data acquisition , 2009, 2009 IEEE Power & Energy Society General Meeting.
[11] F. Bouffard,et al. Keeping the lights on and the information flowing , 2009, IEEE Power and Energy Magazine.
[12] William Nzoukou,et al. A Unified Framework for Measuring a Network's Mean Time-to-Compromise , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.
[13] G. Dondossola,et al. Cyber risk assessment of power control systems — A metrics weighed by attack experiments , 2011, 2011 IEEE Power and Energy Society General Meeting.
[14] Bharat B. Madan,et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.
[15] Daniel S. Kirschen,et al. Assessing the effect of failures in the information and communication infrastructure on power system reliability , 2011, 2011 IEEE/PES Power Systems Conference and Exposition.
[16] William H. Sanders,et al. Probabilistic validation of an intrusion-tolerant replication system , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[17] Ian Dobson,et al. Cascading dynamics and mitigation assessment in power system disturbances via a hidden failure model , 2005 .
[18] David John Leversage,et al. Estimating a System's Mean Time-to-Compromise , 2008, IEEE Security & Privacy.
[19] R. Pyke. Markov renewal processes: Definitions and preliminary properties , 1961 .
[20] Farrokh Aminifar,et al. Impact of WAMS Malfunction on Power System Reliability Assessment , 2012, IEEE Transactions on Smart Grid.
[21] Probability Subcommittee,et al. IEEE Reliability Test System , 1979, IEEE Transactions on Power Apparatus and Systems.
[22] Edgar Toshiro Yano,et al. Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks , 2014, 2014 IEEE 8th International Symposium on Service Oriented System Engineering.
[23] S. Dharmaraja,et al. Semi-Markov modeling of dependability of VoIP network in the presence of resource degradation and security attacks , 2011, Reliab. Eng. Syst. Saf..
[24] Miles A. McQueen,et al. Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[25] Dong Wei,et al. Survivable SCADA Via Intrusion-Tolerant Replication , 2014, IEEE Transactions on Smart Grid.
[26] Fazirulhisyam Hashim,et al. An intrusion tolerant system for improving availability in smart grid control centers , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[27] T. G. Lewis,et al. A general defender-attacker risk model for networks , 2008 .
[28] Bingyang Li,et al. Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing , 2008, 2008 International Conference on Security Technology.
[29] Siddharth Sridhar,et al. Cyber–Physical System Security for the Electric Power Grid , 2012, Proceedings of the IEEE.
[30] William H. Sanders,et al. Model-based validation of an intrusion-tolerant information system , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..
[31] M. Fotuhi-Firuzabad,et al. Optimal PMU Placement Based on Probabilistic Cost/Benefit Analysis , 2013, IEEE Transactions on Power Systems.