2006
DOI: 10.1109/tpwrs.2006.873129
|View full text |Cite
|
Sign up to set email alerts
|

EPOCHS: A Platform for Agent-Based Electric Power and Communication Simulation Built From Commercial Off-the-Shelf Components

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
174
0
1

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 311 publications
(187 citation statements)
references
References 15 publications
0
174
0
1
Order By: Relevance
“…Furthermore, it might also need a detailed knowledge on the malware dynamics, that is not always available. In the same category we find the work of Hopkinson, et al [11], in which power system simulators were coupled together with the NS-2 simulator. This approach suffers from the same disadvantages as the solution proposed by Chabukswar, et al, that we overcome in the proposed framework by employing real components in the cyber layer.…”
Section: Related Workmentioning
confidence: 82%
See 3 more Smart Citations
“…Furthermore, it might also need a detailed knowledge on the malware dynamics, that is not always available. In the same category we find the work of Hopkinson, et al [11], in which power system simulators were coupled together with the NS-2 simulator. This approach suffers from the same disadvantages as the solution proposed by Chabukswar, et al, that we overcome in the proposed framework by employing real components in the cyber layer.…”
Section: Related Workmentioning
confidence: 82%
“…In this sense, we identified three categories of cyber layer and two categories of physical layer implementations. For cyber layer implementations the following approaches were found: only real components (Nai Fovino [8] [11]). In McDonald's approach we found that the physical layer includes both real and simulated components.…”
Section: Qualitative Comparison To Related Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…[2] and underlines how a given topological network asset may improve network resilience in response to an accidental failure but may also expose the network to high vulnerabilities in the presence of malicious attacks. A simulative analysis in which a federation of multiple domain-specific simulators, [3] or the development of specific tools for the simulation of interdependent infrastructures, [4] is proposed. A service oriented risk analysis in which the problem is simplified, considering that CIs support and fulfill services [5,6,7].…”
Section: Introductionmentioning
confidence: 99%