2013
DOI: 10.1109/tsg.2012.2232318
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
88
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 145 publications
(88 citation statements)
references
References 28 publications
0
88
0
Order By: Relevance
“…Modeling attacks on real systems has great significance [55]. Peter J. Hawrylak, et al, provide a novel method to model cyber-physical attacks in smart grid with hybrid attack graphs [52].…”
Section: Attack Modelingmentioning
confidence: 99%
“…Modeling attacks on real systems has great significance [55]. Peter J. Hawrylak, et al, provide a novel method to model cyber-physical attacks in smart grid with hybrid attack graphs [52].…”
Section: Attack Modelingmentioning
confidence: 99%
“…For example, based on the knowledge of the power system topologies, an intruder may attack the bad data detection algorithms of the current state estimators [44]. Another topology based cyber attack is proposed in [45], where attack on the electric circuit breaker will cause the isolation of the generation units from the power grid. In [46], it has been shown that a cyber attack on confidentiality with proper topological knowledge can lead to an integrity and availability attack.…”
Section: Protection From Topology-wise Cyber Attacksmentioning
confidence: 99%
“…[6,21,25,33,35,37], with execution typically achieved on unauthenticated and unencrypted protocols, widely considered to be an easy task. While engagement with readily available MITM tools [34] can quickly achieve some results, targeted manipulation would require broader contextual knowledge.…”
Section: Introductionmentioning
confidence: 99%