2021 18th International Conference on Privacy, Security and Trust (PST) 2021
DOI: 10.1109/pst52912.2021.9647848
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Trust Model In Detecting Final-Phase Attacks in Substations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 20 publications
0
7
0
Order By: Relevance
“…In our preceding research, we underscored that computing trust involves two core constituents: familiarity (F i ) and consequence (C i ) [13,14]. Familiarity encapsulates three fundamental factors: frequency (E f ), intensity (E i ), and similarity (E s ).…”
Section: Trust Formulation For Substation Devicesmentioning
confidence: 97%
See 3 more Smart Citations
“…In our preceding research, we underscored that computing trust involves two core constituents: familiarity (F i ) and consequence (C i ) [13,14]. Familiarity encapsulates three fundamental factors: frequency (E f ), intensity (E i ), and similarity (E s ).…”
Section: Trust Formulation For Substation Devicesmentioning
confidence: 97%
“…The trust (T ij ) that an agent (a i ) places in a subject (a j ) within a given time period (t) can be mathematically formulated as a tuple, as shown in Equation (1) [13]. In this equation, r ij represents the perceived risk associated with agent a i trusting subject a j , α ij denotes the nature of the transaction or communication between the two entities, k t ij signifies the knowledge acquired during the interaction between a i and a j within t, and T ′ ij denotes the previous trust value established between the two entities.…”
Section: Trustmentioning
confidence: 99%
See 2 more Smart Citations
“…But in the event that this protocol is used for the EVCS, physical access can be granted to the individuals responsible for these charging stations and fewer safety protocols are adopted. In this type of situations the attacker may have the possibility to access the network easily through social engineering methods [25], [26].…”
Section: Third Scenariomentioning
confidence: 99%