2015
DOI: 10.1109/tsg.2015.2424155
|View full text |Cite
|
Sign up to set email alerts
|

A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
81
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 128 publications
(82 citation statements)
references
References 20 publications
0
81
0
1
Order By: Relevance
“…The models for cyber security (malicious attacks initiated on the cyber infrastructure) are presented in [17]. The most common analytical method applied to cyber security threat models is the concept of the attack tree [18]. Attack trees work backwards from a goal that the attacker wishes to achieve, by identifying steps that lead to that goal.…”
Section: B Cyberattack Modelingmentioning
confidence: 99%
See 1 more Smart Citation
“…The models for cyber security (malicious attacks initiated on the cyber infrastructure) are presented in [17]. The most common analytical method applied to cyber security threat models is the concept of the attack tree [18]. Attack trees work backwards from a goal that the attacker wishes to achieve, by identifying steps that lead to that goal.…”
Section: B Cyberattack Modelingmentioning
confidence: 99%
“…The emerging CPPS is much more complex than traditional power systems, and traditional methods for assessing its reliability needs to be reviewed [3].…”
Section: Introductionmentioning
confidence: 99%
“…To better represent the characteristics of cyber networks, a benchmark testbed with technical details on substation configuration, switch topology, and control scheme is needed. 10 To the best of our knowledge, such a testbed is not available. This creates the burden of developing a small and customized testbed whenever a new methodology is proposed.…”
Section: Introductionmentioning
confidence: 99%
“…The vulnerability of the networked control system has been widely studied and discussed by both academia and industry, mainly including: information management vulnerability [9], operating system and database vulnerability [10,11], embedded control device vulnerability [11][12][13], and industrial communication protocol vulnerability [14][15][16]. As the major communication carrier for different industrial control devices, the industrial communication protocols are always utilized by malicious hackers as a breakout to perform various attacks.…”
Section: Introductionmentioning
confidence: 99%