A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures
暂无分享,去创建一个
Béla Genge | Piroska Haller | István Kiss | I. Kiss | B. Genge | P. Haller
[1] Béla Genge,et al. Analysis of the effects of distributed denial-of-service attacks on MPLS networks , 2013, Int. J. Crit. Infrastructure Prot..
[2] Siddharth Sridhar,et al. Model-Based Attack Detection and Mitigation for Automatic Generation Control , 2014, IEEE Transactions on Smart Grid.
[3] Alvaro A. Cárdenas,et al. Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.
[4] Jim Duggan,et al. The Ford Method : A Sensitivity Analysis Approach , 2009 .
[5] E. F. Vogel,et al. A plant-wide industrial process control problem , 1993 .
[6] Dieter Gollmann,et al. Vulnerabilities of cyber-physical systems to stale data - Determining the optimal time to launch attacks , 2014, Int. J. Crit. Infrastructure Prot..
[7] Jose M. Yusta,et al. Using interconnected risk maps to assess the threats faced by electricity infrastructures , 2013, Int. J. Crit. Infrastructure Prot..
[8] Andrés Silva,et al. A modeling framework for the resilience analysis of networked systems-of-systems based on functional dependencies , 2014, Reliab. Eng. Syst. Saf..
[9] Béla Genge,et al. Physical process resilience-aware network design for SCADA systems , 2014, Comput. Electr. Eng..
[10] Russell Bent,et al. Phasor measurement unit selection for unobservable electric power data integrity attack detection , 2014, Int. J. Crit. Infrastructure Prot..
[11] Federico Milano,et al. Impact of Time Delays on Power System Stability , 2012, IEEE Transactions on Circuits and Systems I: Regular Papers.
[12] Anna Scaglione,et al. Generating Statistically Correct Random Topologies for Testing Smart Grid Communication and Control Networks , 2010, IEEE Transactions on Smart Grid.
[13] Gerhard P Hancke,et al. Introduction to Industrial Control Networks , 2013, IEEE Communications Surveys & Tutorials.
[14] Anna Scaglione,et al. Electrical centrality measures for electric power grid vulnerability analysis , 2010, 49th IEEE Conference on Decision and Control (CDC).
[15] Karen A. Scarfone,et al. Guide to Industrial Control Systems (ICS) Security , 2015 .
[16] Thomas M. Chen,et al. Lessons from Stuxnet , 2011, Computer.
[17] F. Milano,et al. An open source power system analysis toolbox , 2005, 2006 IEEE Power Engineering Society General Meeting.
[18] Seth Blumsack,et al. Comparing the Topological and Electrical Structure of the North American Electric Power Infrastructure , 2011, IEEE Systems Journal.
[19] N. Lawrence Ricker,et al. Decentralized control of the Tennessee Eastman Challenge Process , 1996 .
[20] Mark Hagerott,et al. Stuxnet and the vital role of critical infrastructure operators and engineers , 2014, Int. J. Crit. Infrastructure Prot..
[21] Wolfgang Kröger,et al. Performance of Electric Power Systems Under Physical Malicious Attacks , 2013, IEEE Systems Journal.
[22] P. Hines,et al. Do topological models provide good information about electricity infrastructure vulnerability? , 2010, Chaos.
[23] J. Forrester. Counterintuitive behavior of social systems , 1971 .
[24] Deepa Kundur,et al. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[25] Dimitris P. Labridis,et al. Cyber attack impact on critical Smart Grid infrastructures , 2014, ISGT 2014.
[26] David N. Ford. A behavioral approach to feedback loop dominance analysis , 1999 .