2018 13th International Conference on Malicious and Unwanted Software (MALWARE) 2018
DOI: 10.1109/malware.2018.8659367
|View full text |Cite
|
Sign up to set email alerts
|

METICS: A Holistic Cyber Physical System Model for IEEE 14-bus Power System Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The statistical results obtained on the reported risks in CPS from our studies show that the most reported impact of the identified risks consisted of (1) communication disruptions 57,105 , (2) system or sub‐system being compromised, 106,107 and (3) leading to system's abnormal behavior 108 and thus failure as a result of a malicious attack 109–111 . Another frequently reported impact is related to the physical aspect of the CPS and that is the equipment failure leading to financial losses, for example, Lopez et al 73 …”
Section: Findings Of Our Reviewmentioning
confidence: 76%
“…The statistical results obtained on the reported risks in CPS from our studies show that the most reported impact of the identified risks consisted of (1) communication disruptions 57,105 , (2) system or sub‐system being compromised, 106,107 and (3) leading to system's abnormal behavior 108 and thus failure as a result of a malicious attack 109–111 . Another frequently reported impact is related to the physical aspect of the CPS and that is the equipment failure leading to financial losses, for example, Lopez et al 73 …”
Section: Findings Of Our Reviewmentioning
confidence: 76%
“…The transition is opening previously unavailable or limited networking capabilities to improve operational capabilities and efficiencies for industrial systems and infrastructure such as the power grid [1]. Expanded use of networked communications in turn is increasing the attack vectors for the organizations, especially from outside actors [2]. As a result of the transition and the accompanying change in attack vectors, organizations need engineers skilled in configuring, operating, and maintaining their CPS devices.…”
Section: Introductionmentioning
confidence: 99%