2018
DOI: 10.1049/iet-cps.2017.0118
|View full text |Cite
|
Sign up to set email alerts
|

ARCADES: analysis of risk from cyberattack against defensive strategies for the power grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Identity theft manifests in the form of tax and credit card frauds, business/personal loan theft, miscellaneous actions, and access to government benefits [18]. Firewall strives to prevent such crimes by alerting users that a different person might be accessing their information at a different location [19].…”
Section: Related Workmentioning
confidence: 99%
“…Identity theft manifests in the form of tax and credit card frauds, business/personal loan theft, miscellaneous actions, and access to government benefits [18]. Firewall strives to prevent such crimes by alerting users that a different person might be accessing their information at a different location [19].…”
Section: Related Workmentioning
confidence: 99%
“…As such, an attack on more utilized SCADA controlled devices can create more physical damage. Damage is defined as [20]:…”
Section: Host Scanning and Criticality Calculationmentioning
confidence: 99%
“…Such structured attacks can lead to cascading failures in the system. Therefore, the tight cyber-physical coupling is necessary to extend power system security into both cyber and physical attacks [175][176][177][178]. Integration of big data analytics provides an excellent opportunity to timely identify such malicious attacks and prevent the system from huge damages.…”
Section: Applications To Cyber-physical Systemsmentioning
confidence: 99%