2020 12th IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC) 2020
DOI: 10.1109/appeec48164.2020.9220574
|View full text |Cite
|
Sign up to set email alerts
|

Method to Evaluate the Impact of Cyberattacks Against Charging Piles on Distribution Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…As such, the attack model is represented by a combination of actions compromising confidentiality, integrity, and availability. For example, [271] adopted a spatialtemporal forecast model based on analysis of three types of EVs to maximize attack benefits.…”
Section: B Impact Of Ev Attacks On the Adnsmentioning
confidence: 99%
“…As such, the attack model is represented by a combination of actions compromising confidentiality, integrity, and availability. For example, [271] adopted a spatialtemporal forecast model based on analysis of three types of EVs to maximize attack benefits.…”
Section: B Impact Of Ev Attacks On the Adnsmentioning
confidence: 99%
“…Highly computerized and interconnected facilities open up digital access to equipment, and the benefits of information accessibility come at a price in terms of a higher risk of cyberattack, which poses an increasingly significant threat to industrial networks, e.g., in the energy, robotics, and automotive industries [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ]. While there are obvious methods to protect against attacks, including the isolation of information technology (IT) and operational technology (OT) networks and the precise definition of network privileges [ 9 ], unauthorized access to critical elements of such networks constantly remains a real threat [ 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…Cyber-attacks pose an increasingly significant threat to industrial networks. This applies to industries such as energy, robotics, and automotive [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 ]. On the one hand, relatively obvious protection methods against such attacks exist, i.e., isolation of information technology (IT) and operational technology (OT) networks, as well as the precise definition of permissions for individual human and hardware elements of the network based on whitelisting [ 9 ].…”
Section: Introductionmentioning
confidence: 99%