2011
DOI: 10.1080/00396338.2011.555586
|View full text |Cite
|
Sign up to set email alerts
|

Stuxnet and the Future of Cyber War

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
234
0
2

Year Published

2013
2013
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 630 publications
(255 citation statements)
references
References 1 publication
0
234
0
2
Order By: Relevance
“…In other words, for every choice of the network matrices, there exist nonzero u 1 and u 2 that are not detectable through the measurements. 4 We now consider a numerical realization of this system. Let the input matrices be B for some arbitrary nonzero signalŪ (s).…”
Section: Illustrative Examplesmentioning
confidence: 99%
See 1 more Smart Citation
“…In other words, for every choice of the network matrices, there exist nonzero u 1 and u 2 that are not detectable through the measurements. 4 We now consider a numerical realization of this system. Let the input matrices be B for some arbitrary nonzero signalŪ (s).…”
Section: Illustrative Examplesmentioning
confidence: 99%
“…5) modeled as a descriptor system as in Section II. Following [9], let the measurements y = Cx be given by the real power injections at all buses, of the real power flows of all branches, and one generator rotor angle (or one bus 4 When these ouput-nulling inputs u1, u2 are regarded as additional loads, then they are entirely sustained by the second and third generator. the measurements data is always detectable by our dynamic detection procedure.…”
Section: Illustrative Examplesmentioning
confidence: 99%
“…Two data-driven observations support this claim (see Figure 1). First, cybersecurity research output sees an almost exponential (Farwell & Rohozinski, 2011;Langner, 2011). Beyond the question whether there is an objective increase in willingness and skill for cyberattacks among political actors, the focus of research on SCADA-systems (as targeted by Stuxnet) and on the infrastructure considered the most "critical" for society (electricity) is intertwined with political interests and sensibilities.…”
Section: Dominant View: Cybersecurity As "Fixing Broken Objects"mentioning
confidence: 99%
“…Some examples of these include: i) Russia-Estonia distributed denial of service (DDoS) attacks [22]. ii) The use of botnets during the Russia-Georgia war of 2008; Iran Stuxnet worm attack in 2010 [23]. iii) Night dragon targeted attacks on energy companies resulting in the theft of sensitive intellectual property [24].…”
Section: Cyber-warfare and National Readinessmentioning
confidence: 99%