Cybersecurity for Critical Infrastructures: Attack and Defense Modeling

@article{Ten2010CybersecurityFC,
  title={Cybersecurity for Critical Infrastructures: Attack and Defense Modeling},
  author={Chee-Wooi Ten and G. Manimaran and Chen-Ching Liu},
  journal={IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans},
  year={2010},
  volume={40},
  pages={853-865}
}
Disruption of electric power operations can be catastrophic on national security and the economy. Due to the complexity of widely dispersed assets and the interdependences among computer, communication, and power infrastructures, the requirement to meet security and quality compliance on operations is a challenging issue. In recent years, the North American Electric Reliability Corporation (NERC) established a cybersecurity standard that requires utilities' compliance on cybersecurity of… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 170 CITATIONS

Anomaly Detection for Cybersecurity of the Substations

  • IEEE Transactions on Smart Grid
  • 2011
VIEW 14 EXCERPTS
CITES BACKGROUND

Towards Secure Architecture-Based Adaptations

  • 2019 IEEE/ACM 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)
  • 2019
VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Risk Assessment and Risk-Driven Testing

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection -- An Immunologically-inspired Conceptual Model for Security on the Power Grid

  • 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
  • 2012
VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

A Collaborative Intrusion Detection Approach Using Blockchain for Multimicrogrid Systems

  • IEEE Transactions on Systems, Man, and Cybernetics: Systems
  • 2019
VIEW 1 EXCERPT
CITES METHODS

A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network

  • IEEE Transactions on Information Forensics and Security
  • 2019
VIEW 1 EXCERPT
CITES METHODS

A Systematic Approach Toward Description and Classification of Cybercrime Incidents

  • IEEE Transactions on Systems, Man, and Cybernetics: Systems
  • 2019
VIEW 1 EXCERPT
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2011
2019

CITATION STATISTICS

  • 4 Highly Influenced Citations

  • Averaged 23 Citations per year from 2017 through 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 77 REFERENCES

Application of Support Vector Machine Classification to Enhanced Protection Relay Logic in Electric Power Grids

  • 2007 Large Engineering Systems Conference on Power Engineering
  • 2007
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

A Formal Virtual Enterprise Access Control Model

  • IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
  • 2008
VIEW 1 EXCERPT

2007 CSI computer crime and security survey

R. Richardson
  • Proc. 12th Annu. Comput. Crime Security Survey, 2007, pp. 1–28.
  • 2007
VIEW 1 EXCERPT

Context informationbased cybersecurity defense of protection system

S. Su, W.-L. Chan, K.-K. Li, X. Duan, X. Zeng
  • IEEE Trans. Power Del., vol. 22, no. 3, pp. 1477–1481, Jul. 2007. TEN et al.: CYBERSECURITY FOR CRITICAL INFRASTRUCTURES 865
  • 2007
VIEW 2 EXCERPTS

Covariance-Matrix Modeling and Detecting Various Flooding Attacks

  • IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
  • 2007
VIEW 1 EXCERPT