Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications

RV Yohanandhan, RM Elavarasan, P Manoharan… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber-Physical System (CPS) is a new kind of digital technology that increases its attention
across academia, government, and industry sectors and covers a wide range of applications …

A review of attack graph and attack tree visual syntax in cyber security

HS Lallie, K Debattista, J Bal - Computer Science Review, 2020 - Elsevier
Perceiving and understanding cyber-attacks can be a difficult task, and more effective
techniques are needed to aid cyber-attack perception. Attack modelling techniques (AMTs) …

Model-based attack detection and mitigation for automatic generation control

S Sridhar, M Govindarasu - IEEE Transactions on Smart Grid, 2014 - ieeexplore.ieee.org
Cyber systems play a critical role in improving the efficiency and reliability of power system
operation and ensuring the system remains within safe operating margins. An adversary can …

A survey of cyber security management in industrial control systems

W Knowles, D Prince, D Hutchison, JFP Disso… - International journal of …, 2015 - Elsevier
Contemporary industrial control systems no longer operate in isolation, but use other
networks (eg, corporate networks and the Internet) to facilitate and improve business …

工业控制系统信息安全研究进展

彭勇, 江常青, 谢丰, 戴忠华, 熊琦, 高洋 - 清华大学学报: 自然科学版, 2012 - cqvip.com
工业控制系统(ICS) 广泛用于电力, 石油石化, 核能, 航空, 铁路, 公路, 水处理, 地铁等行业,
是这些国家关键基础设施运行的" 大脑" 和" 中枢", 2010 年" 震网病毒" 事件更进一步敲响了工业 …

Assessing and augmenting SCADA cyber security: A survey of techniques

S Nazir, S Patel, D Patel - Computers & Security, 2017 - Elsevier
SCADA systems monitor and control critical infrastructures of national importance such as
power generation and distribution, water supply, transportation networks, and manufacturing …

DAG-based attack and defense modeling: Don't miss the forest for the attack trees

B Kordy, L Piètre-Cambacédès, P Schweitzer - Computer science review, 2014 - Elsevier
This paper presents the current state of the art on attack and defense modeling approaches
that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical …

[HTML][HTML] A review of cyber-ranges and test-beds: Current and future trends

E Ukwandu, MAB Farah, H Hindy, D Brosset… - Sensors, 2020 - mdpi.com
Cyber situational awareness has been proven to be of value in forming a comprehensive
understanding of threats and vulnerabilities within organisations, as the degree of exposure …

Cybersecurity for critical infrastructures: Attack and defense modeling

CW Ten, G Manimaran, CC Liu - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Disruption of electric power operations can be catastrophic on national security and the
economy. Due to the complexity of widely dispersed assets and the interdependences …

OpenFlow: A security analysis

R Klöti, V Kotronis, P Smith - 2013 21st IEEE International …, 2013 - ieeexplore.ieee.org
Software Defined Networking (SDN) has been proposed as a drastic shift in the networking
paradigm, by decoupling network control from the data plane and making the switching …