2006 IEEE PES Power Systems Conference and Exposition 2006
DOI: 10.1109/psce.2006.296283
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Assessment of Cyber Security in Power Industry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…This flow chart explains an overview of how the smart grid security system will communicate, detect and handle any attack that is detected while the power supply remains safe and uninterrupted [5].…”
Section: Figure 3: Flow Chartmentioning
confidence: 99%
“…This flow chart explains an overview of how the smart grid security system will communicate, detect and handle any attack that is detected while the power supply remains safe and uninterrupted [5].…”
Section: Figure 3: Flow Chartmentioning
confidence: 99%
“…It has put forward a series of complete safety principles such as good structure transformation, into implementation [3], etc, and based on the establishment of security strategy. A the effectiveness of the security strategy, meet the system safety, this is a kind of information safety risk assessment process, usually through the model of the information security, affecting the assets of the user, and analyzes its vulnerability, threat and risk factors [4,5]. They mainly USES the economic indicators to measure loss [6], do not provide feedback existing security measures and their effectiveness report, lack of comprehensive consideration of the characteristics of the influence and effect of the security strategy.…”
Section: Introductionmentioning
confidence: 99%
“…Vulnerability analysis for electric power utilities has begun to aid in answering these questions (Dagle, 2001;Depoy et al, 2005;Jiaxi et al, 2006). However, before such evaluation can have practical significance, it is necessary to quantitatively study the potential severity of physical impacts of cyber attacks.…”
Section: Introductionmentioning
confidence: 99%