Cyber-Physical Security Testbed for Substations in a Power Grid
暂无分享,去创建一个
Ying Chen | Chen-Ching Liu | Manimaran Govindarasu | Junho Hong | Chen-Ching Liu | Junho Hong | M. Govindarasu | Ying Chen
[1] Jianhui Wang,et al. Smart Transmission Grid: Vision and Framework , 2010, IEEE Transactions on Smart Grid.
[2] Barbara Kordy,et al. DAG-based attack and defense modeling: Don't miss the forest for the attack trees , 2013, Comput. Sci. Rev..
[3] Carol M. Jantzen,et al. DURABILITY TESTING OF FLUIDIZED BED STEAM REFORMER (FBSR) WASTE FORMS , 2006 .
[4] Deon Reynders. 19 – Wireless technologies , 2004 .
[5] Chen-Ching Liu,et al. An intrusion and defense testbed in a cyber-power system environment , 2011, 2011 IEEE Power and Energy Society General Meeting.
[6] R.E. Mackiewicz,et al. Overview of IEC 61850 and Benefits , 2006, 2005/2006 IEEE/PES Transmission and Distribution Conference and Exhibition.
[7] Chen-Ching Liu,et al. Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees , 2007, 2007 IEEE Power Engineering Society General Meeting.
[8] Chen-Ching Liu,et al. Anomaly Detection for Cybersecurity of the Substations , 2011, IEEE Transactions on Smart Grid.
[9] Chen-Ching Liu,et al. Cyber-physical security in a substation , 2012, 2012 IEEE Power and Energy Society General Meeting.
[10] G.N. Ericsson,et al. Management of information security for an electric power Utility-on security domains and use of ISO/IEC17799 standard , 2005, IEEE Transactions on Power Delivery.
[11] Federico Milano,et al. Voltage stability constrained OPF market models considering N−1 contingency criteria , 2005 .
[12] Geert Deconinck,et al. ICT resilience of power control systems: experimental results from the CRUTIAL testbeds , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[13] Mulukutla S. Sarma,et al. Power System Analysis and Design , 1993 .
[14] Roberto Setola,et al. Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers , 2009, Critical Information Infrastructures Security.
[15] G. Manimaran,et al. Detection of cyber intrusions using network-based multicast messages for substation automation , 2014, ISGT 2014.
[16] Richard J. Campbell,et al. Weather-Related Power Outages and Electric System Resiliency , 2012 .
[17] Valeriy Vyatkin,et al. Towards intelligent Smart Grid devices with IEC 61850 Interoperability and IEC 61499 open control architecture , 2010, IEEE PES T&D 2010.
[18] Aditya Ashok,et al. Cyber-Physical Security Testbeds: Architecture, Application, and Evaluation for Smart Grid , 2013, IEEE Transactions on Smart Grid.
[19] Michael G. Bailey,et al. The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems , 2004, CITC5 '04.
[20] D. Kushner,et al. The real story of stuxnet , 2013, IEEE Spectrum.
[21] Siddhartha Kumar Khaitan,et al. Design Techniques and Applications of Cyberphysical Systems: A Survey , 2015, IEEE Systems Journal.
[22] Zahir Tari,et al. SCADASim—A Framework for Building SCADA Simulations , 2011, IEEE Transactions on Smart Grid.
[23] Jagath Samarabandu,et al. An Intrusion Detection System for IEC61850 Automated Substations , 2010, IEEE Transactions on Power Delivery.
[24] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[25] Chen-Ching Liu,et al. Intruders in the Grid , 2012, IEEE Power and Energy Magazine.
[26] G. Manimaran,et al. Integrated Anomaly Detection for Cyber Security of the Substations , 2014, IEEE Transactions on Smart Grid.
[27] R. E. Mackiewicz. Overview of IEC 61850 and Benefits , 2006 .
[28] Siddhartha Kumar Khaitan,et al. Cyber physical system approach for design of power grids: A survey , 2013, 2013 IEEE Power & Energy Society General Meeting.
[29] Salim Hariri,et al. A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.
[30] Vinay M. Igure,et al. Security issues in SCADA networks , 2006, Comput. Secur..
[31] Kalyan Pavurapu,et al. A retrofit network transaction data logger and intrusion detection system for transmission and distribution substations , 2010, 2010 IEEE International Conference on Power and Energy.
[32] Jennifer L. Bayuk,et al. Cyber Security Policy Guidebook , 2012 .
[33] Geert Deconinck,et al. Testbeds for Assessing Critical Scenarios in Power Control Systems , 2008, CRITIS.
[34] Andreas Junghanns,et al. Functional Mockup Interface 2.0: The Standard for Tool independent Exchange of Simulation Models , 2012 .
[35] David M. Nicol,et al. The Virtual Power System Testbed and Inter-Testbed Integration , 2009, CSET.
[36] Joseph Weiss,et al. Cyber Security Policy Guidebook: Bayuk/Cyber Security Policy , 2012 .