Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,003 Hits in 5.4 sec

Cyber-physical Systems (CPS) Security: State of the Art and Research Opportunities for Information Systems Academics

Chetan Kumar, California State University San Marcos, Sean Marston, Ravi Sen, Western Kentucky University, Texas A&M University
2020 Communications of the Association for Information Systems  
Attacks on cyber-physical systems (CPS) continue to grow in frequency.  ...  Thus, we require more focused research on cybersecurity based on the cyber-physical relationship between various CPS components.  ...  They proposed a risk-assessment framework using a Bayesian network to assess cyberattacks on CPS.  ... 
doi:10.17705/1cais.04731 fatcat:pyn7uyvwvrhglbktfvlsqc3zeu

Issues of Cybersecurity in Electric Power Systems

N.I. Voropai, I.N. Kolosok, E.S. Korkina, A.B. Osak
2020 Energy Systems Research  
The study deals with the cybersecurity concept of cyber-physical electric power systems (EPSs) as a strategic issue of national importance, which affects all strata of society.  ...  Data on the number of cyberattacks on control systems of industrial enterprises, power plants, and substations for several years are provided.  ...  for modeling scenarios of emergencies in electric power infrastructure as caused by cyber threats, and a technique for assessing cyber-security risks in electric power infrastructure.  ... 
doi:10.38028/esr.2020.02.0003 fatcat:h27yg7qy25bqxonsdpxz3flnse

Modeling an Attack-Mitigation Dynamic Game-Theoretic Scheme for Security Vulnerability Analysis in a Cyber-Physical Power System

Boyu Gao, Libao Shi
2020 IEEE Access  
between cyber systems and power systems, and at the same time, the CPPSs have to confront some newly emerged risks owing to cyber system unreliability or cyberattacks.  ...  In this paper, regarding the cyber and physical attacks in a CPPS, the operation risks and vulnerabilities of transmission lines are discussed in detail by building relevant game-theoretic models.  ...  Recently, the threat of cyberattacks against power system cyber networks is increasing dramatically.  ... 
doi:10.1109/access.2020.2973030 fatcat:4h5ym5jvefesbemnj2dqhncubq

Cyber-physical risk modeling with imperfect cyber-attackers [article]

Efthymios Karangelos, Louis Wehenkel
2021 arXiv   pre-print
cyber-physical risk management.  ...  We model the risk posed by a malicious cyber-attacker seeking to induce grid insecurity by means of a load redistribution attack, while explicitly acknowledging that such an actor would plausibly base  ...  Metrics related to cyber-physical risk assessment Cyber-physical risk assessment serves to quantify the threat posed by a malicious cyber-attacker.  ... 
arXiv:2110.00301v1 fatcat:hcmasfgzpvc6bae7ha2yfulgai

SAFEGUARDING STABILITY: STRATEGIES FOR ADDRESSING DYNAMIC SYSTEM VARIATIONS IN POWER GRID CYBERSECURITY

Guzman Erick, Fatehi Navid
2023 EPH-international journal of science and engineering  
This paper investigates methods to safeguard the stability ofthe power grid against cyber intrusions and system variations.  ...  The power grid stands as a critical infrastructure supporting modern society, yet it remains susceptible to cyber threatsthat could compromise its stability and functionality.  ...  Risk Assessment and Management: AI and ML models can assess risks in various scenarios, including cybersecurity threats, financial risks, or environmental hazards.  ... 
doi:10.53555/ephijse.v9i3.215 fatcat:teno4qr4vfcnnb6k4j2od72pki

Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey [article]

Mengxiang Liu, Fei Teng, Zhenyong Zhang, Pudong Ge, Ruilong Deng, Mingyang Sun, Jiming Chen
2023 arXiv   pre-print
In this survey, we aim to provide a systematical and comprehensive review regarding the cyber-resiliency enhancement (CRE) of DER-based smart grid.  ...  Firstly, an integrated threat modeling method is tailored for the hierarchical DER-based smart grid with special emphasis on vulnerability identification and impact analysis.  ...  method is tailored for the hierarchical DER-based smart grid to clarify the adversary model, asset/vulnerability model and attack model, after which a risk matrix is developed to assess the risk of threats  ... 
arXiv:2305.05338v2 fatcat:gkrdbp4o6zdb3bgzqo4q2xmpga

A Case Study of an Industrial Power Plant under Cyberattack: Simulation and Analysis

Marilena Stănculescu, Sorin Deleanu, Paul Cristian Andrei, Horia Andrei
2021 Energies  
By considering the two malfunction events, the resilience assessment of the system was analyzed.  ...  At the national level, most critical infrastructures are connected, and, therefore, achieving a level of security and resilience is based on identifying a multitude of risks.  ...  Any power system is impossible to protect against all physical threats, given its size and the remote location of some of its components assessed as potential targets for cyberattacks, at least at certain  ... 
doi:10.3390/en14092568 fatcat:othrzdyco5gjboq27vs27ygyni

Operational and Economy-Wide Impacts of Compound Cyberattacks and Extreme Weather Events on Electric Power Networks [article]

Charalampos Avraam and Luis Ceferino and Yury Dvorkin
2022 arXiv   pre-print
In this paper, we initiate the study of Compound Cyber-Physical Threats and develop a two-stage framework for the analysis of operational disruptions in electric power networks and economy-wide impacts  ...  The growing frequencies of extreme weather events and cyberattacks give rise to a novel threat where a malicious cyber actor aims to disrupt stressed components of critical infrastructure systems immediately  ...  The assessment of the operational disruption of a Compound Cyber-Physical Threat requires integrating an electric power network model capturing the physical and economic principles of the electric power  ... 
arXiv:2209.04927v1 fatcat:b4im52o4svb3td4lt5zn5wkkh4

Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network

Abel Yeboah-Ofori, Shareeful Islam, Allan Brimicombe
2019 2019 International Conference on Cyber Security and Internet of Things (ICSIoT)  
Identifying cyberattack vectors on cyber supply chains (CSC) in the event of cyberattacks are very important in mitigating cybercrimes effectively on Cyber Physical Systems CPS.  ...  Although cybercrime phenomenon, risks, and treats contain a lot of unpredictability's, uncertainties and fuzziness, cyberattack detection should be practical, methodical and reasonable to be implemented  ...  Cyberattacks are the physical actions malware, XSS, RAT, session high jacking against the supply chain infrastructure and system resources.  ... 
doi:10.1109/icsiot47925.2019.00014 fatcat:loqcrr3jmrbz3jlxmt2j4mv5ym

Comprehensive Survey and Taxonomies of False Injection Attacks in Smart Grid: Attack Models, Targets, and Impacts [article]

Haftu Tasew Reda, Adnan Anwar, Abdun Mahmood
2021 arXiv   pre-print
Smart Grid has rapidly transformed the centrally controlled power system into a massively interconnected cyber-physical system that benefits from the revolutions happening in the communications (e.g. 5G  ...  While the convergence of a significant number of cyber-physical elements has enabled the Smart Grid to be far more efficient and competitive in addressing the growing global energy challenges, it has also  ...  Index Terms-Smart Grid, cybersecurity, power system reliability, cyber-physical system, cyberattack, false data injection. I.  ... 
arXiv:2103.10594v1 fatcat:ovgq6m43nbd4nk32gwdtpuzjve

Risk Assessment of Cyber Attacks on Power Grids Considering the Characteristics of Attack Behaviors

Biyun Chen, Zhihao Yang, Yiyi Zhang, Yanni Chen, Junhui Zhao
2020 IEEE Access  
In this study, a behavior model is proposed to investigate the risk of cyber attacks on power grids, where the utility value is determined by subjective attack attitude and characteristics of candidate  ...  INDEX TERMS Attack behaviors, probability response model, risk assessment, utility attenuation model, utility value.  ...  There has been a number of studies on risk assessment for cyberattacks on power systems with different models of implementation process, intention and strategies of cyberattacks.  ... 
doi:10.1109/access.2020.3014785 fatcat:ck6phwrww5hl7k46frcdcngnum

Review, Meta-Taxonomy, and Use Cases of Cyberattack Taxonomies of Manufacturing Cybersecurity Threat Attributes and Countermeasures [article]

Md Habibor Rahman
2023 arXiv   pre-print
Finally, the paper introduces potential use cases for attack taxonomies in smart manufacturing systems for assessing security threats and their associated risks, devising risk mitigation strategies, and  ...  A thorough and systematic understanding of different elements of cyberattacks is essential for developing the necessary tools to prevent, detect, diagnose, and mitigate cyberattacks in manufacturing systems  ...  Weinberg Distinguished Staff Fellow, Embedded Systems Security Group, Oak Ridge National Laboratory.  ... 
arXiv:2301.07303v1 fatcat:6fsvklwqt5dpbpowylm7yc55du

Expert-Guided Security Risk Assessment of Evolving Power Grids

Seppo Borenius, Pavithra Gopalakrishnan, Lina Bertling Tjernberg, Raimo Kantola
2022 Energies  
This study presents a qualitative assessment of power grid cybersecurity through expert interviews across countries in Europe and the U.S. to gain understanding of the latest developments and trends in  ...  the cybersecurity of future electric energy systems.  ...  Physical Power Grid Layer-Risk Assessment of Generation Systems Vulnerability Physical Threats Cyber Threats Controls • Hackers disrupting • Physical security multiple generators perimeter • • • Lack of  ... 
doi:10.3390/en15093237 fatcat:p7hwlib4ujhp5px4x2qmpxh6da

Analysis of Cybersecurity Issues in the Maritime Industry

Boyan Mednikarov, Yuliyan Tsonev, Andon Lazarov
2020 Information & Security An International Journal  
systems-is a substantial and plausible target of cyberattacks.  ...  vulnerability assessment of on-board information and communication systems, as well as technological measures for cyber defence.  ...  Main Steps of the Ship's Cyber Risk Assessment Process A cybersecurity risk assessment determines the information-communication systems that could be influenced and by cyberattacks and then identifies  ... 
doi:10.11610/isij.4702 fatcat:4hoinhh7jbb6vmqbvybqbh5yd4

Method for Effectiveness Assessment of Electronic Warfare Systems in Cyberspace

Seungcheol Choi, Oh-Jin Kwon, Haengrok Oh, Dongkyoo Shin
2020 Symmetry  
The scenario explicates an example of assessing the effectiveness of EW systems under cyberattacks.  ...  A scenario with an integrated EW system incorporating two or more different types of EW equipment is appropriately provided to confirm the effectiveness of the proposed framework in cyber electromagnetic  ...  The framework assesses risks based on NIST's guide for conducting risk assessments [11] and provides an assessment of cyber battle damage and cyber strength to assess cyber warfare.  ... 
doi:10.3390/sym12122107 fatcat:nwdhidyr3vhefoamvc5zcyqecm
« Previous Showing results 1 — 15 out of 3,003 results