Abstract—Disruption of electric power operations can be catastrophic on national security and the economy. Due to the complexity of widely dispersed assets and the interdependences among computer, communication, and power infrastructures, the requirement to meet security and quality compliance on opera-tions is a challenging issue. In recent years, the North American Electric Reliability Corporation (NERC) established a cybersecu-rity standard that requires utilities ’ compliance on cybersecurity of control systems. This standard identifies several cyber-related vulnerabilities that exist in control systems and recommends several remedial actions (e.g., best practices). In this paper, a comprehensive survey on cybersecurity of critical infr...
Graduation date: 2017Access restricted to the OSU Community, at author's request, from September 12,...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
This paper examines the ranking of critical assets within an electrical grid under threat of cyber a...
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. Thes...
Increasing volatilities within power transmission and distribution force power grid operators to amp...
Cyber threats pose an increasing threat to energy objects. It is essential to ensure the cybersecuri...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
Critical infrastructure (CIs) such as power grids link a plethora of physical components from many d...
In this study, the authors introduce ARCADES (Analysis of Risk from Cyberattack against DEfensive St...
Many automation and power control systems are integrated into the 'Smart Grid' concept for efficient...
As information and communication networks are highly interconnected with the power grid, cyber secur...
The United States power grid is a logical target for a major cyber attack because it connects all of...
Abstract–Obsolescent control systems for power systems are evolving into intelligent systems and con...
information and communication devices are an unavoidable concern of modern infrastructures. There is...
Graduation date: 2017Access restricted to the OSU Community, at author's request, from September 12,...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
This paper examines the ranking of critical assets within an electrical grid under threat of cyber a...
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. Thes...
Increasing volatilities within power transmission and distribution force power grid operators to amp...
Cyber threats pose an increasing threat to energy objects. It is essential to ensure the cybersecuri...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
Critical infrastructure (CIs) such as power grids link a plethora of physical components from many d...
In this study, the authors introduce ARCADES (Analysis of Risk from Cyberattack against DEfensive St...
Many automation and power control systems are integrated into the 'Smart Grid' concept for efficient...
As information and communication networks are highly interconnected with the power grid, cyber secur...
The United States power grid is a logical target for a major cyber attack because it connects all of...
Abstract–Obsolescent control systems for power systems are evolving into intelligent systems and con...
information and communication devices are an unavoidable concern of modern infrastructures. There is...
Graduation date: 2017Access restricted to the OSU Community, at author's request, from September 12,...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...