Modelling of cyber attacks for assessing smart grid security
@inproceedings{Ekstedt2011ModellingOC, title={Modelling of cyber attacks for assessing smart grid security}, author={M. Ekstedt and G. Dondossola and L. Pi{\`e}tre-Cambac{\'e}d{\`e}s and J. McDonald and {\AA}ge Torkilseng}, year={2011} }
Smart grid developments will enable numerous new services with new traffic patterns. These developments will change radically both network accesses and core architectures and technologies. A smart grid is likely to be topological complex, to contain vast numbers of heterogeneous endpoints, participants, interfaces, communication channels, operational modes and will require operational policies encompassing different domains requiring the know-how and expertise of IT personal. These changes… Expand
9 Citations
Impact of DER integration on the cyber security of SCADA systems — The Medium Voltage regulation case study
- Engineering
- 2012
- 6
- PDF
Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments
- Computer Science
- 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)
- 2012
- 53
Evaluating practitioner cyber-security attack graph configuration preferences
- Computer Science
- Comput. Secur.
- 2018
- 5
- PDF
References
SHOWING 1-10 OF 28 REFERENCES
Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees
- Engineering
- 2007 IEEE Power Engineering Society General Meeting
- 2007
- 184
- PDF
Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams
- Engineering
- IEEE Transactions on Power Delivery
- 2009
- 42
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements
- Engineering, Computer Science
- Int. J. Inf. Manag.
- 2008
- 66
PENET: A practical method and tool for integrated modeling of security attacks and countermeasures
- Computer Science
- Comput. Secur.
- 2009
- 36
A large scale distributed intrusion detection framework based on attack strategy analysis
- Computer Science
- Comput. Networks
- 1999
- 142
- PDF
Risk-based Systems Security Engineering: Stopping Attacks with Intention
- Computer Science
- IEEE Secur. Priv.
- 2004
- 72