2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON) 2017
DOI: 10.1109/uemcon.2017.8249049
|View full text |Cite
|
Sign up to set email alerts
|

Minimum cost security measurements for attack tree based threat models in smart grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…(3) NewChildren � {}; (4) i: � 1; (5) repeat (6) child: � i-th node in Children; (7) if child is an intermediate attack node and (8) has defensive child nodes (9) then (10) T1: � new attack node; (11) Child node relationship of T1: � Child (12) node relationship of child; (13) T1's children: � child's children; (14) T2: � new attack node; (15) T2 children's operator: � AND; (16) Add child to T2's children set; (17) Add T1 to T2's children set; (18) call conversToA2DTree (T1); (19) Add T2 to Newchildren; (20) else (21) call ConverseToA2DTree (child); (22) Add child to Newchildren; (23) end if (24) i: � i+1; (25) customer's online banking credentials, including the username (certificate number) and password. Although usernames can be easily retrieved, obtaining the password requires a phishing e-mail or keylogger.…”
Section: Case Studymentioning
confidence: 99%
See 1 more Smart Citation
“…(3) NewChildren � {}; (4) i: � 1; (5) repeat (6) child: � i-th node in Children; (7) if child is an intermediate attack node and (8) has defensive child nodes (9) then (10) T1: � new attack node; (11) Child node relationship of T1: � Child (12) node relationship of child; (13) T1's children: � child's children; (14) T2: � new attack node; (15) T2 children's operator: � AND; (16) Add child to T2's children set; (17) Add T1 to T2's children set; (18) call conversToA2DTree (T1); (19) Add T2 to Newchildren; (20) else (21) call ConverseToA2DTree (child); (22) Add child to Newchildren; (23) end if (24) i: � i+1; (25) customer's online banking credentials, including the username (certificate number) and password. Although usernames can be easily retrieved, obtaining the password requires a phishing e-mail or keylogger.…”
Section: Case Studymentioning
confidence: 99%
“…Namely, the optimal defense devices are chosen based on ROA and ROI. Chakraborty and Kalaimannan [15] modeled the risk of the CPS in a smart grid and assigned a cost factor to each atom attack node. On this basis, the algebraic method is used to analyze the minimum number of attack nodes that should be defended to prevent the attack target from occurring.…”
Section: Introductionmentioning
confidence: 99%