Building an Effective Security Program for Distributed Energy Resources and Systems

All services necessary for the operation of a transmission or distribution system. It comprises compensation for energy losses, frequency control (automated, local fast control, and coordinated slow control), voltage and flow control (reactive power, active power, and regulation devices), and restoration of supply (black start, temporary island operation). These services are required to provide system reliability and power quality. They are provided by generators and system operators.

[1]  Subrata K. Sarker,et al.  A survey on control issues in renewable energy integration and microgrid , 2019, Protection and Control of Modern Power Systems.

[2]  Edyta Ropuszyńska-Surma,et al.  The Virtual Power Plant – A Review Of Business Models , 2019, E3S Web of Conferences.

[3]  Mason Rice,et al.  Incentivizing Cyber Security Investment in the Power Sector Using An Extended Cyber Insurance Framework , 2019 .

[4]  Jason F. Clemente,et al.  Cyber Security for Critical Energy Infrastructure , 2018 .

[5]  Karla Straker,et al.  The typologies of power: Energy utility business models in an increasingly renewable sector , 2018, Journal of Cleaner Production.

[6]  Ying Liu,et al.  Applications of Graph Connectivity to Network Security , 2018 .

[7]  Jin Wei,et al.  Hybrid Communication Architectures for Distributed Smart Grid Applications , 2018 .

[8]  Sneha A. Dalvi,et al.  Internet of Things for Smart Cities , 2017 .

[9]  Thierry Van Cutsem,et al.  Contribution to Bulk System Control and Stability by Distributed Energy Resources connected at Distribution Network , 2017 .

[10]  Dmitry Baimel,et al.  Smart Grid Communication Technologies , 2016 .

[11]  Andrzej Bialas,et al.  Risk Management in Critical Infrastructure—Foundation for Its Sustainable Work , 2016 .

[12]  Daryl Haegley Governance and Assessment Strategies for Industrial Control Systems , 2016 .

[13]  Lambros Sarakis,et al.  Communication challenges in Smart Grid , 2016 .

[14]  Monica T. Whitty Mass-Marketing Fraud: A Growing Concern , 2015, IEEE Security & Privacy.

[15]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[16]  Lamine Mili,et al.  On the Definition of Cyber-Physical Resilience in Power Systems , 2015, ArXiv.

[17]  Alagan Anpalagan,et al.  Network Challenges for Cyber Physical Systems with Tiny Wireless Devices: A Case Study on Reliable Pipeline Condition Monitoring , 2015, Sensors.

[18]  Edward A. Lee The Past, Present and Future of Cyber-Physical Systems: A Focus on Models , 2015, Sensors.

[19]  Lyman Chapin,et al.  THE INTERNET OF THINGS : AN OVERVIEW Understanding the Issues and Challenges of a More Connected World , 2015 .

[20]  Advisor,et al.  Breaches on the Rise in Control Systems : A SANS Survey , 2015 .

[21]  Craig G. Rieger,et al.  Resilient control systems Practical metrics basis for defining mission impact , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).

[22]  Andrea Prati,et al.  Integrating Consumer Smart Cameras into Camera Networks: Opportunities and Obstacles , 2014, Computer.

[23]  Andrea Cavallaro,et al.  Self-Reconfigurable Smart Camera Networks , 2014, Computer.

[24]  Rama Chellappa,et al.  Camera Networks for Healthcare, Teleimmersion, and Surveillance , 2014, Computer.

[25]  Adam Sedgewick,et al.  Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0 , 2014 .

[26]  Dan Craigen,et al.  Defining Cybersecurity , 2014 .

[27]  Quang-Dung Ho,et al.  Wireless Communications Technologies for the SGCN , 2014 .

[28]  Marimuthu Palaniswami,et al.  Control and communication techniques for the smart grid: an energy efficiency perspective , 2014 .

[29]  Xiaodong Wang,et al.  Privacy-Preserving Energy Scheduling in Microgrid Systems , 2013, IEEE Transactions on Smart Grid.

[30]  Renke Huang,et al.  Advanced Distribution Management System , 2013, IEEE Transactions on Smart Grid.

[31]  Fangxing Li,et al.  $S^{3}A$ : A Secure Data Sharing Mechanism for Situational Awareness in The Power Grid , 2013, IEEE Transactions on Smart Grid.

[32]  Rossouw von Solms,et al.  From information security to cyber security , 2013, Comput. Secur..

[33]  M. Salim Beg,et al.  Vulnerability Analysis of Wide Area Measurement System in the Smart Grid , 2013 .

[34]  Yuan Zhang,et al.  Distributed energy management under smart grid plug-and-play operations , 2013, 2013 IEEE Power & Energy Society General Meeting.

[35]  Faisal Tariq,et al.  Smart Grid Communication and Networking Technologies: Recent Developments and Future Challenges , 2013 .

[36]  Wilfried Elmenreich,et al.  Smart Microgrids: Overview and Outlook , 2013, ArXiv.

[37]  Sandro Bologna,et al.  Critical Information Infrastructure Protection and Resilience in the ICT Sector , 2013 .

[38]  Mohammad Shahidehpour,et al.  Background of Power System Stability , 2013 .

[39]  Barack Obama,et al.  Executive Order 13636: Improving Critical Infrastructure Cybersecurity , 2013 .

[40]  B. Obama Presidential Policy Directive 21: Critical Infrastructure Security and Resilience , 2013 .

[41]  Chris W. Johnson The Telecoms Inclusion Principle: The Missing Link between Critical Infrastructure Protection and Critical Information Infrastructure Protection , 2013 .

[42]  Mathias Uslar Introduction and Smart Grid Basics , 2013 .

[43]  Eric Luiijf Next Generation Information-Based Infrastructures: New Dependencies and Threats , 2013 .

[44]  Eric Ouellet,et al.  Magic Quadrant for Endpoint Protection Platforms , 2013 .

[45]  Giovanna Dondossola,et al.  Cyber Risks in Energy Grid ICT Infrastructures , 2013 .

[46]  Hamid Sharif,et al.  A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.

[47]  William H. Sanders,et al.  SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures , 2012, IEEE Transactions on Smart Grid.

[48]  Nada Golmie,et al.  Wireless Networks for Smart Grid Applications | NIST , 2012 .

[49]  Elias Kyriakides,et al.  On the complexities of interdependent infrastructures for wide area monitoring systems , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.

[50]  Min Ouyang,et al.  A three-stage resilience analysis framework for urban infrastructure systems , 2012 .

[51]  M. Wolsink The research agenda on social acceptance of distributed generation in smart grids: Renewable as common pool resources , 2012 .

[52]  Elias Kyriakides,et al.  Electrical Power Systems Protection and Interdependencies with ICT , 2012, Telecommunication Economics.

[53]  J. Hull,et al.  Staying in control: Cybersecurity and the modern electric grid , 2012, IEEE Power and Energy Magazine.

[54]  D. E. Nordell Terms of Protection: The Many Faces of Smart Grid Security , 2012, IEEE Power and Energy Magazine.

[55]  Erkki Antila,et al.  Reliability and Availability Investigation for Next-Generation Substation Function Based on IEC 61850 , 2012 .

[56]  Bruno Sinopoli,et al.  A Cyber–Physical Systems Approach to Data Center Modeling and Control for Energy Efficiency , 2012, Proceedings of the IEEE.

[57]  Aiko Pras,et al.  Topics in network and service management , 2012, IEEE Commun. Mag..

[58]  M. Rihan,et al.  Developing smart grid in India: Background and progress , 2011, 2011 IEEE PES Conference on Innovative Smart Grid Technologies - Middle East.

[59]  Nasser Modiri,et al.  Information Security Management , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.

[60]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[61]  Stamatis Karnouskos,et al.  Cyber-Physical Systems in the SmartGrid , 2011, 2011 9th IEEE International Conference on Industrial Informatics.

[62]  Dongho Won,et al.  Advanced Information Security Management Evaluation System , 2011, KSII Trans. Internet Inf. Syst..

[63]  Jennifer L. Bayuk Systems Security Engineering , 2011, IEEE Security & Privacy.

[64]  C. Rieger,et al.  Critical National Need Idea Critical National Need Title : Smart is Not Enough : Resilience and Securing the Power Grid , 2011 .

[65]  Mariana Hentea,et al.  Smart power grid security: A unified risk management approach , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.

[66]  Reza Dashti,et al.  Energy efficiency based asset management infrastructures in electrical distribution system , 2010, 2010 IEEE International Conference on Power and Energy.

[67]  Sebastiaan H. von Solms,et al.  The 5 Waves of Information Security - From Kristian Beckman to the Present , 2010, SEC.

[68]  Khosrow Moslehi,et al.  A Reliability Perspective of the Smart Grid , 2010, IEEE Transactions on Smart Grid.

[69]  Shi-Chung Chang,et al.  Communication infrastructure of smart grid , 2010, 2010 4th International Symposium on Communications, Control and Signal Processing (ISCCSP).

[70]  Jonathan Dipl.-Ing. Brix,et al.  Electrical energy storage , 2010 .

[71]  William W. Agresti The Four Forces Shaping Cybersecurity , 2010, Computer.

[72]  J. K. Kok,et al.  Intelligence in Electricity Networks for Embedding Renewables and Distributed Generation , 2010 .

[73]  John D Moteff Critical Infrastructures: Background, Policy, and Implementation , 2009 .

[74]  Daniele Catteddu,et al.  Cloud Computing: Benefits, Risks and Recommendations for Information Security , 2009 .

[75]  Simon S. Y. Shim,et al.  The Web as the Ubiquitous Computer , 2009, Computer.

[76]  David Schneider Is this the moment for broadband over power lines? , 2009, IEEE Spectrum.

[77]  Arindam Maitra,et al.  Intelligent Universal Transformer design and applications , 2009 .

[78]  Fred B. Schneider,et al.  IT Monoculture Security Risks and Defenses , 2009, IEEE Secur. Priv..

[79]  Carl A. Gunter,et al.  Addressing Safety and Security Contradictions in Cyber-Physical Systems , 2009 .

[80]  R.Y.K. Fung,et al.  Knowledge-Centric Information Security , 2008, 2008 International Conference on Security Technology.

[81]  Miguel Correia,et al.  The Crutial Way of Critical Infrastructure Protection , 2008, IEEE Security & Privacy Magazine.

[82]  Charles C. Palmer,et al.  Process Control System Security: Bootstrapping a Legacy , 2008, IEEE Security & Privacy Magazine.

[83]  Martin Naedele,et al.  Security for Process Control Systems: An Overview , 2008, IEEE Security & Privacy Magazine.

[84]  Susan Landau Security and Privacy Landscape in Emerging Technologies , 2008, IEEE Security & Privacy.

[85]  M. Amin,et al.  The Electric Power Grid: Today and Tomorrow , 2008 .

[86]  Dawn M. Cappelli,et al.  Insider Threat Study: Illicit Cyber Activity in the Information Technology and Telecommunications Sector , 2008 .

[87]  Brendan Jennings,et al.  Towards autonomic management of communications networks , 2007, IEEE Communications Magazine.

[88]  Mark Burgess,et al.  Key research challenges in network management , 2007, IEEE Communications Magazine.

[89]  Jangbok Kim,et al.  Spam Filtering With Dynamically Updated URL Statistics , 2007, IEEE Security & Privacy.

[90]  M. Eric Johnson,et al.  Embedding Information Security into the Organization , 2007, IEEE Security & Privacy.

[91]  M. David Allen,et al.  Measuring Data Management Practice Maturity: A Community's Self-Assessment , 2007, Computer.

[92]  Ken Masica,et al.  Recommended Practices Guide for Securing ZigBee Wireless Networks in Process Control System Environments: Draft , 2007 .

[93]  Antonio Lioy,et al.  Dependability in Wireless Networks: Can We Rely on WiFi? , 2007, IEEE Security & Privacy.

[94]  Terry V. Benzel,et al.  Systemic Security Management , 2006, IEEE Security & Privacy.

[95]  F. Sioshansi,et al.  How to Get More Response from Demand Response , 2006 .

[96]  C. Perrow Shrink the Targets , 2006, IEEE Spectrum.

[97]  K. Schwalm National Strategy to Secure Cyberspace , 2006 .

[98]  Gurpreet Dhillon,et al.  Value‐focused assessment of information system security in organizations , 2006, Inf. Syst. J..

[99]  Sebastiaan H. von Solms,et al.  Information Security - The Fourth Wave , 2006, Comput. Secur..

[100]  John Steven Adopting an enterprise software security framework , 2006, IEEE Security & Privacy.

[101]  Staðlaráð Íslands,et al.  Gæðastjórnunarkerfi : grunnatriði og íðorðasafn = Quality Management Systems : fundamentals and vocabulary. , 2006 .

[102]  Jeffrey O. Kephart,et al.  Research challenges of autonomic computing , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[103]  Rana Tassabehji Principles for Managing Information Security , 2005 .

[104]  Rana Tassabehji Information Security Threats , 2005 .

[105]  John Strassner,et al.  Autonomic networking theory and practice , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..

[106]  Peter P. Swire A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security? , 2004, J. Telecommun. High Technol. Law.

[107]  P. Kundur,et al.  Definition and classification of power system stability IEEE/CIGRE joint task force on stability terms and definitions , 2004, IEEE Transactions on Power Systems.

[108]  Philip Koopman Embedded System Security , 2004, Computer.

[109]  Linda Volonino,et al.  Principles and practice of information security : protecting computers from hackers and lawyers , 2004 .

[110]  C. Goose,et al.  Glossary of Terms , 2004, Machine Learning.

[111]  William R. Dunn Designing Safety-Critical Computer Systems , 2003, Computer.

[112]  Stefan Savage,et al.  Inside the Slammer Worm , 2003, IEEE Secur. Priv..

[113]  Jan H. P. Eloff,et al.  A taxonomy for information security technologies , 2003, Comput. Secur..

[114]  James M. Anderson,et al.  Why we need a new definition of information security , 2003, Comput. Secur..

[115]  George W Bush,et al.  The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , 2003 .

[116]  L. Najjar The missing link. , 2003, Dental assistant.

[117]  David Watts Security & Vulnerability in Electric Power Systems , 2003 .

[118]  James P. Peerenboom,et al.  Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .

[119]  Daniel E. Geer,et al.  Information security is information risk management , 2001, NSPW '01.

[120]  M. Amin,et al.  Toward self-healing energy infrastructure systems , 2001 .

[121]  G. Dhillon Challenges in Managing Information Security in the New Millennium , 2001 .

[122]  Sebastiaan H. von Solms,et al.  Information Security - The Third Wave? , 2000, Comput. Secur..

[123]  G. Dhillon,et al.  Technical opinion: Information system security management in the new millennium , 2000, CACM.

[124]  Janie Fouke Threshold of the New Millennium , 2000 .

[125]  John Casazza,et al.  The Evolution of Electric Power Transmission Under Deregulation: Selected Readings , 2000 .

[126]  Neil Barrett THE CRITICAL INFRASTRUCTURE , 1998 .

[127]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[128]  Marie Faerber,et al.  “McGraw-Hill Encyclopedia of Science and Technology” , 1960, Nature.