While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or …
The scope, scale, and intensity of real, as well as potential attacks, on the Smart Grid have been increasing and thus gaining more attention. An important component of Smart Grid …
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of …
MMS Khan, JA Giraldo… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper develops a novel intrusion detection system for power distribution systems that utilizes a cyber-physical real-time reference model to accurately replicate the complex …
Identifying the anomaly location and type (fault or attack) is of paramount importance for enhancing cyber-physical situational awareness, and taking informed and effective …
Network security has developed as a critical research subject as a result of the Rapid advancements in the development of Internet and communication technologies over the …
Monitoring the “physics” of control systems to detect attacks is a growing area of research. In its basic form a security monitor creates time-series models of sensor readings for an …
MMS Khan, J Giraldo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Identifying the locations of cyber attacks in power distribution systems is critical to take immediate and effective mitigation actions. This article introduces a novel real-time attack …