Cyber Risks in Energy Grid ICT Infrastructures
暂无分享,去创建一个
[1] Giannis Stamatellos,et al. Computer Ethics and Neoplatonic Virtue: A Reconsideration of Cyberethics in the Light of Plotinus' Ethical Theory , 2011, Int. J. Cyber Ethics Educ..
[2] Giovanna Dondossola,et al. Performance evaluation of standard power grid communications experiencing cyber anomalies , 2011, 2011 50th FITCE Congress - "ICT: Bridging an Ever Shifting Digital Divide".
[3] Sejung Marina Choi,et al. Classifying Web Users: A Cultural Value-Based Approach , 2007 .
[4] Kip Morison,et al. REVIEW OF ON-LINE DYNAMIC SECURITY ASSESSMENT TOOLS AND TECHNIQUES , 2007 .
[5] Judit Bar-Ilan. Collaborative Information Behavior: User Engagement and Communication Sharing , 2011 .
[6] Giovanna Dondossola,et al. Assessment of power control systems communications through testbed experiments , 2009 .
[7] Anne E. Cook,et al. Attention Versus Learning of Online Content: Preliminary Findings from an Eye-Tracking Study , 2011, Int. J. Cyber Behav. Psychol. Learn..
[8] M. Amin,et al. Toward self-healing energy infrastructure systems , 2001 .
[9] Geert Deconinck,et al. Experiences with integrating recovery strategies into a primary substation automation system , 2003 .
[10] Zheng Yan,et al. A Pilot Study of Comparing Social Network Behaviors between Onlies and Others , 2015, Int. J. Cyber Behav. Psychol. Learn..
[11] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[12] Steven M. Rinaldi,et al. Modeling and simulating critical infrastructures and their interdependencies , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[13] Rüdiger Klein. Information Modelling and Simulation in Large Dependent Critical Infrastructures - An Overview on the European Integrated Project IRRIIS , 2008, CRITIS.
[14] G. Di Lembo,et al. Integration of DSO control systems and TSO automatic load shedding system to improve the security of the national grid , 2009 .
[15] G. Manimaran,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems , 2008, IEEE Transactions on Power Systems.
[16] Sean P. Goggins,et al. Collaborative Information Behavior in Completely Online Groups , 2010 .
[17] Mathias Ekstedt,et al. Modelling of cyber attacks for assessing smart grid security , 2011 .
[18] Geert Deconinck,et al. ICT resilience of power control systems: experimental results from the CRUTIAL testbeds , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[19] Tuomo Kakkonen,et al. Encyclopedia of Cyber Behavior Students ’ Cyber-Plagiarism , 2011 .
[20] Silvano Chiaradonna,et al. Quantification of dependencies between electrical and information infrastructures , 2012, Int. J. Crit. Infrastructure Prot..
[21] Kirk St. Amant,et al. Linguistic and Cultural Online Communication Issues in the Global Age , 2007 .
[22] Mark Adamiak,et al. IEC 61850 Communication Networks and Systems In Substations: An Overview for Users , 1988 .
[23] Tony Li,et al. Cisco Hot Standby Router Protocol (HSRP) , 1998, RFC.