2013
DOI: 10.1016/j.cose.2013.07.003
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(21 citation statements)
references
References 26 publications
0
19
0
Order By: Relevance
“…Yan et al 8 Qin et al 9 Zonouz and Haghani 10 Wang et al 11 Yan and Haimes 12 Li et al 13 This study each above place has only two colors; thus, the element in (P i , c i ) in the pre-condition or postcondition represents the object has two states. Besides, the relationship among these objects can be modeled as a tree, 30 which can be divided into two types, ''AND'' and ''OR,'' as shown in Figure 9.…”
Section: Approachmentioning
confidence: 95%
“…Yan et al 8 Qin et al 9 Zonouz and Haghani 10 Wang et al 11 Yan and Haimes 12 Li et al 13 This study each above place has only two colors; thus, the element in (P i , c i ) in the pre-condition or postcondition represents the object has two states. Besides, the relationship among these objects can be modeled as a tree, 30 which can be divided into two types, ''AND'' and ''OR,'' as shown in Figure 9.…”
Section: Approachmentioning
confidence: 95%
“…Some papers investigated the performance of their proposed techniques using the frequency of a load shedding or by using statistical tests such as the Wilcoxon signed‐rank test 115 . Other researchers employed special‐purpose tools to evaluate their proposed techniques: Cyber Security Argument Graph Evaluation (CyberSAGE) tool, 87 Smart Grid Information Security (SGIS) Toolbox, 116 and network application tool (NetAPT) 117 . Some authors used manual risk assessment 118,119 and compared their results generated through computer‐aided tools.…”
Section: Findings Of Our Reviewmentioning
confidence: 99%
“…Description Zonouz and Haghani [176] introduce a framework called EliMet with the aim of estimating whether the security requirements in a system are effectively met.…”
Section: Zonouz and Haghani [176]mentioning
confidence: 99%
“…In this direction, GAs [153] and ACO [145] were utilized by leveraging single and multi-objective optimization cost functions for providing optimal sets of countermeasures. The works presented in [161,176,191] make use of Bellman's optimization on top of MDPs to identify the optimal defense strategies, while integer optimization and Tabu Seach [115] were respectively used in [160,163]. In addition, multicriteria decision-making techniques like SAW, PW and TOPSIS has been recruited…”
Section: Summary and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation