A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cyber-physical Systems (CPS) Security: State of the Art and Research Opportunities for Information Systems Academics
2020
Communications of the Association for Information Systems
Attacks on cyber-physical systems (CPS) continue to grow in frequency. ...
Thus, we require more focused research on cybersecurity based on the cyber-physical relationship between various CPS components. ...
They proposed a risk-assessment framework using a Bayesian network to assess cyberattacks on CPS. ...
doi:10.17705/1cais.04731
fatcat:pyn7uyvwvrhglbktfvlsqc3zeu
Issues of Cybersecurity in Electric Power Systems
2020
Energy Systems Research
The study deals with the cybersecurity concept of cyber-physical electric power systems (EPSs) as a strategic issue of national importance, which affects all strata of society. ...
Data on the number of cyberattacks on control systems of industrial enterprises, power plants, and substations for several years are provided. ...
for modeling scenarios of emergencies in electric power infrastructure as caused by cyber threats, and a technique for assessing cyber-security risks in electric power infrastructure. ...
doi:10.38028/esr.2020.02.0003
fatcat:h27yg7qy25bqxonsdpxz3flnse
Modeling an Attack-Mitigation Dynamic Game-Theoretic Scheme for Security Vulnerability Analysis in a Cyber-Physical Power System
2020
IEEE Access
between cyber systems and power systems, and at the same time, the CPPSs have to confront some newly emerged risks owing to cyber system unreliability or cyberattacks. ...
In this paper, regarding the cyber and physical attacks in a CPPS, the operation risks and vulnerabilities of transmission lines are discussed in detail by building relevant game-theoretic models. ...
Recently, the threat of cyberattacks against power system cyber networks is increasing dramatically. ...
doi:10.1109/access.2020.2973030
fatcat:4h5ym5jvefesbemnj2dqhncubq
Cyber-physical risk modeling with imperfect cyber-attackers
[article]
2021
arXiv
pre-print
cyber-physical risk management. ...
We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base ...
Metrics related to cyber-physical risk assessment Cyber-physical risk assessment serves to quantify the threat posed by a malicious cyber-attacker. ...
arXiv:2110.00301v1
fatcat:hcmasfgzpvc6bae7ha2yfulgai
SAFEGUARDING STABILITY: STRATEGIES FOR ADDRESSING DYNAMIC SYSTEM VARIATIONS IN POWER GRID CYBERSECURITY
2023
EPH-international journal of science and engineering
This paper investigates methods to safeguard the stability ofthe power grid against cyber intrusions and system variations. ...
The power grid stands as a critical infrastructure supporting modern society, yet it remains susceptible to cyber threatsthat could compromise its stability and functionality. ...
Risk Assessment and Management: AI and ML models can assess risks in various scenarios, including cybersecurity threats, financial risks, or environmental hazards. ...
doi:10.53555/ephijse.v9i3.215
fatcat:teno4qr4vfcnnb6k4j2od72pki
Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey
[article]
2023
arXiv
pre-print
In this survey, we aim to provide a systematical and comprehensive review regarding the cyber-resiliency enhancement (CRE) of DER-based smart grid. ...
Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis. ...
method is tailored for the hierarchical DER-based smart grid to clarify the adversary model, asset/vulnerability model and attack model, after which a risk matrix is developed to assess the risk of threats ...
arXiv:2305.05338v2
fatcat:gkrdbp4o6zdb3bgzqo4q2xmpga
A Case Study of an Industrial Power Plant under Cyberattack: Simulation and Analysis
2021
Energies
By considering the two malfunction events, the resilience assessment of the system was analyzed. ...
At the national level, most critical infrastructures are connected, and, therefore, achieving a level of security and resilience is based on identifying a multitude of risks. ...
Any power system is impossible to protect against all physical threats, given its size and the remote location of some of its components assessed as potential targets for cyberattacks, at least at certain ...
doi:10.3390/en14092568
fatcat:othrzdyco5gjboq27vs27ygyni
Operational and Economy-Wide Impacts of Compound Cyberattacks and Extreme Weather Events on Electric Power Networks
[article]
2022
arXiv
pre-print
In this paper, we initiate the study of Compound Cyber-Physical Threats and develop a two-stage framework for the analysis of operational disruptions in electric power networks and economy-wide impacts ...
The growing frequencies of extreme weather events and cyberattacks give rise to a novel threat where a malicious cyber actor aims to disrupt stressed components of critical infrastructure systems immediately ...
The assessment of the operational disruption of a Compound Cyber-Physical Threat requires integrating an electric power network model capturing the physical and economic principles of the electric power ...
arXiv:2209.04927v1
fatcat:b4im52o4svb3td4lt5zn5wkkh4
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network
2019
2019 International Conference on Cyber Security and Internet of Things (ICSIoT)
Identifying cyberattack vectors on cyber supply chains (CSC) in the event of cyberattacks are very important in mitigating cybercrimes effectively on Cyber Physical Systems CPS. ...
Although cybercrime phenomenon, risks, and treats contain a lot of unpredictability's, uncertainties and fuzziness, cyberattack detection should be practical, methodical and reasonable to be implemented ...
Cyberattacks are the physical actions malware, XSS, RAT, session high jacking against the supply chain infrastructure and system resources. ...
doi:10.1109/icsiot47925.2019.00014
fatcat:loqcrr3jmrbz3jlxmt2j4mv5ym
Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts
[article]
2021
arXiv
pre-print
Smart Grid has rapidly transformed the centrally controlled power system into a massively interconnected cyber-physical system that benefits from the revolutions happening in the communications (e.g. 5G ...
While the convergence of a significant number of cyber-physical elements has enabled the Smart Grid to be far more efficient and competitive in addressing the growing global energy challenges, it has also ...
Index Terms-Smart Grid, cybersecurity, power system reliability, cyber-physical system, cyberattack, false data injection.
I. ...
arXiv:2103.10594v1
fatcat:ovgq6m43nbd4nk32gwdtpuzjve
Risk Assessment of Cyber Attacks on Power Grids Considering the Characteristics of Attack Behaviors
2020
IEEE Access
In this study, a behavior model is proposed to investigate the risk of cyber attacks on power grids, where the utility value is determined by subjective attack attitude and characteristics of candidate ...
INDEX TERMS Attack behaviors, probability response model, risk assessment, utility attenuation model, utility value. ...
There has been a number of studies on risk assessment for cyberattacks on power systems with different models of implementation process, intention and strategies of cyberattacks. ...
doi:10.1109/access.2020.3014785
fatcat:ck6phwrww5hl7k46frcdcngnum
Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures
[article]
2023
arXiv
pre-print
Finally, the paper introduces potential use cases for attack taxonomies in smart manufacturing systems for assessing security threats and their associated risks, devising risk mitigation strategies, and ...
A thorough and systematic understanding of different elements of cyberattacks is essential for developing the necessary tools to prevent, detect, diagnose, and mitigate cyberattacks in manufacturing systems ...
Weinberg Distinguished Staff Fellow, Embedded Systems Security Group, Oak Ridge National Laboratory. ...
arXiv:2301.07303v1
fatcat:6fsvklwqt5dpbpowylm7yc55du
Expert-Guided Security Risk Assessment of Evolving Power Grids
2022
Energies
This study presents a qualitative assessment of power grid cybersecurity through expert interviews across countries in Europe and the U.S. to gain understanding of the latest developments and trends in ...
the cybersecurity of future electric energy systems. ...
Physical Power Grid Layer-Risk Assessment of Generation Systems Vulnerability Physical Threats Cyber Threats Controls • Hackers disrupting • Physical security multiple generators perimeter • • • Lack of ...
doi:10.3390/en15093237
fatcat:p7hwlib4ujhp5px4x2qmpxh6da
Analysis of Cybersecurity Issues in the Maritime Industry
2020
Information & Security An International Journal
systems-is a substantial and plausible target of cyberattacks. ...
vulnerability assessment of on-board information and communication systems, as well as technological measures for cyber defence. ...
Main Steps of the Ship's Cyber Risk Assessment Process A cybersecurity risk assessment determines the information-communication systems that could be influenced and by cyberattacks and then identifies ...
doi:10.11610/isij.4702
fatcat:4hoinhh7jbb6vmqbvybqbh5yd4
Method for Effectiveness Assessment of Electronic Warfare Systems in Cyberspace
2020
Symmetry
The scenario explicates an example of assessing the effectiveness of EW systems under cyberattacks. ...
A scenario with an integrated EW system incorporating two or more different types of EW equipment is appropriately provided to confirm the effectiveness of the proposed framework in cyber electromagnetic ...
The framework assesses risks based on NIST's guide for conducting risk assessments [11] and provides an assessment of cyber battle damage and cyber strength to assess cyber warfare. ...
doi:10.3390/sym12122107
fatcat:nwdhidyr3vhefoamvc5zcyqecm
« Previous
Showing results 1 — 15 out of 3,003 results