2015 IEEE Rural Electric Power Conference 2015
DOI: 10.1109/repc.2015.23
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security and Rural Electric Power Systems

Abstract: Cyber security is a topic of increasing importance and interest to small utility operators like REA's. The requirement for cyber security is based upon reasons ranging from national security to individual business operations to regulatory compliance.Several fundamental concepts can guide an operator when implementing a cyber security plan. Operators must consider the competing requirements of confidentiality, integrity, availability, and cost. They must consider the potential levels of impact for an incident. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…According to Figure 2, the most commonly used techniques are Model‐based techniques used in 32 articles, followed by intrusion detection in 19 papers and matrix‐based techniques in nine articles. The techniques are traceable to various theoretical foundations such as the use of models 64 (such as trees, 35 dependency graphs, 65 and flow charts 35 ), game theory, 66 and on standards 67 . Furthermore, fuzzy logic‐based approaches 20 have also been proposed over the years to identify the security risks more accurately within IoT/CPS.…”
Section: Findings Of Our Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…According to Figure 2, the most commonly used techniques are Model‐based techniques used in 32 articles, followed by intrusion detection in 19 papers and matrix‐based techniques in nine articles. The techniques are traceable to various theoretical foundations such as the use of models 64 (such as trees, 35 dependency graphs, 65 and flow charts 35 ), game theory, 66 and on standards 67 . Furthermore, fuzzy logic‐based approaches 20 have also been proposed over the years to identify the security risks more accurately within IoT/CPS.…”
Section: Findings Of Our Reviewmentioning
confidence: 99%
“…In the case of smart grid stations, the main focus was to test the effect of the proposed technique in risk identification, assessment, mitigation of the known risks on communication, and load distribution systems (e.g.,Habash et al 70 ). The utility applications used as subject applications consisted of electricity billing software (e.g., Kaster & Sen 67 ). The SCADA systems used consisted of smart grid stations, avionics, and other safety‐critical systems (e.g., Banerje et al 100 ).…”
Section: Findings Of Our Reviewmentioning
confidence: 99%