Optimal defense resources allocation for power system based on bounded rationality game theory analysis

CW Shao, YF Li - IEEE Transactions on Power Systems, 2021 - ieeexplore.ieee.org
Power utility allocates defense resources to prevent unscheduled load shedding due to
transmission line failure caused by the malicious physical attacks. Game theory explains the …

A minimum defense cost calculation method for attack defense trees

B Xu, Z Zhong, G He - Security and Communication Networks, 2020 - Wiley Online Library
The cyberphysical system (CPS) is becoming the infrastructure of society. Unfortunately, the
CPS is vulnerable to cyberattacks, which may cause environmental pollution, property …

Risk-Sharing Mechanism Design in Non-Cooperative Multi-Defender Stackelberg Defense Resources Allocation Game

CW Shao, YF Li, CY Shen, SZ Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Government bodies, companies, and social agencies typically act as defenders and apply
the game theory method to protect their assets targeted by malicious attackers. However, for …

Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure

Y Baseri, V Chouhan, A Ghorbani - arXiv preprint arXiv:2404.10659, 2024 - arxiv.org
The emergence of quantum computing presents a double-edged sword for cybersecurity.
While its immense power holds promise for advancements in various fields, it also threatens …

Identification of False Data Injection and Man in the Middle Cyber-Attacks Impact on Smart Grid

AM Vidya, DD Sai, G Sarveshwaran… - … on Secure Cyber …, 2023 - ieeexplore.ieee.org
There are numerous difficulties concerning cyber security in the smart grid, and a majority of
such challenges faced across devices connected to the grid are in the form of nefarious …

SCLEX-lang: A threat modeling language for substation automation systems

L Sun - 2020 - diva-portal.org
Power systems in the industry today are adopting automated substations because of a
growing trend of digitization. Substation automation has greatly reduced intervention from …

[HTML][HTML] Задача выбора вычислительных процессов, обеспечивающих защиту информации, для серверов распределенной системы и алгоритмы ее решения

АЮ Быков, ИА Крыгин… - Вопросы …, 2020 - cyberleninka.ru
Цель статьи: обеспечение информационной безопасности на серверах различного
назначения автоматизированной системы на основе формулировки оптимизационной …

Security Vulnerability Assessment of Power IoT based on Business Security

J Fei, K Chen, Q Yao, Q Guo, X Wang - Proceedings of the 2020 1st …, 2020 - dl.acm.org
Power Internet of Things is the application of IoT in smart power grid. Once attacked, it will
cause huge losses. Therefore, it is necessary to conduct a security assessment to take …

Providing a Model for a Cyber-Attack to a Special Protection Scheme Based on Timed Petri Net

MA Hojjati Kermani, M Aliakbar Golkar… - Journal of Energy …, 2019 - jemat.org
In order to enhance the reliability of the power transmission grid, planning and employing
regional protection along with traditional local protection is necessary. Both regional and …