2012
DOI: 10.1016/j.ijcip.2012.01.003
|View full text |Cite
|
Sign up to set email alerts
|

Quantification of dependencies between electrical and information infrastructures

Abstract: Electrical power system ICT threatsCritical infrastructure dependencies A B S T R A C TIn this paper we present an approach to model and quantify (inter)dependencies between the Electrical Infrastructure (EI) and the Information Infrastructure (II) that implements the EI control and monitoring system. The quantification is achieved through the integration of two models: one that concentrates more on the structure of the power grid and its physical quantities and one that concentrates on the behavior of the con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
25
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 51 publications
(25 citation statements)
references
References 35 publications
0
25
0
Order By: Relevance
“…Considering the effect of attacks to the ICT on failure propagation in the EPS, the scenario is complementary with respect to the IRRIIS ones. The work in this chapter extends the studies in (Beccuti, Chiaradonna, Di Giandomenico, Franceschinis, Donatelli & Dondossola, 2012) in two directions: i) by proposing novel models for the attacks affecting the control infrastructure, and ii) by embedding in the developed models more faithful parameters characterizing the attacks behaviour, as determined by experimental studies documented in Chapter "Cyber Risks in Energy Grid ICT Infrastructures" of this book.…”
Section: Introductionmentioning
confidence: 93%
See 2 more Smart Citations
“…Considering the effect of attacks to the ICT on failure propagation in the EPS, the scenario is complementary with respect to the IRRIIS ones. The work in this chapter extends the studies in (Beccuti, Chiaradonna, Di Giandomenico, Franceschinis, Donatelli & Dondossola, 2012) in two directions: i) by proposing novel models for the attacks affecting the control infrastructure, and ii) by embedding in the developed models more faithful parameters characterizing the attacks behaviour, as determined by experimental studies documented in Chapter "Cyber Risks in Energy Grid ICT Infrastructures" of this book.…”
Section: Introductionmentioning
confidence: 93%
“…A model-based approach is chosen, due to its high flexibility in exploring a wide range of alternatives at a limited cost and in representing at different abstraction levels the various layers of the EPS hierarchy (e.g. transmission versus distribution, local versus regional and multiregional as proposed for example in (Beccuti, Chiaradonna, Di Giandomenico, Donatelli, Dondossola & Franceschinis, 2012), (Chiaradonna, Lollini & Di Giandomenico, 2007) and (Chiaradonna, Giandomenico & Nostro, 2011).…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, [11][12][13] presents methods based on Petri nets, stochastic activity networks and Bayesian networks.…”
Section: Research Of Existing Solutions Of the Problemmentioning
confidence: 99%
“…Network-based approaches generally assume that each CIS consists of a set of components (usually represented as nodes) forming a network, and any existing interdependency is represented as a type of relationship between nodes belonging to different networks [11,12]. There are also several other approaches: a few are based on various probabilistic methodologies (e.g., petri nets, stochastic activity networks and Bayesian networks) [13][14][15], some others are considering multi-layer modeling approaches, where infrastructures are seen at different layers and interactions between them are considered at different levels of granularity [16], and also some empirical approaches that analyze CI interdependencies according to historical accident or disaster data and expert experience [17].…”
Section: Introductionmentioning
confidence: 99%