The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical systems are at stake. In this framework, infrastructural systems, including power systems, represent a possible target due to the huge impact they can have on society. Malicious attacks are different in their nature from other more traditional cause of threats to power system, since they embed a strategic interaction between the attacker and the defender (characteristics that cannot be found in natural events or systemic failures). This difference has not been systematically analyzed by the existent literature. In this respect, new approaches and tools are needed. This paper presents a mixed-strategy game-theory model able to capture the str...
Abstract—Information and communication technologies bring significant improvements to power grid and...
Application of cyber technologies improves the quality of monitoring and decision making in smart gr...
In this study, the authors introduce ARCADES (Analysis of Risk from Cyberattack against DEfensive St...
The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical...
International audienceThe protection and safe operations of power systems heavily rely on the identi...
Recently, game theory has been used to design optimized strategies for defending an electric power s...
The impact of coordinated malicious attacks may be dramatically severe and may yield a wide area bla...
© 2016 IEEE. The impact of coordinated malicious attacks may be dramatically severe and may yield a ...
In the analysis of power systems security, recently a new concern related to possible malicious atta...
The widely used intelligent measuring equipment not only makes the operation of AC/DC hybrid transmi...
Abstract – In the analysis of power systems security recently a new concern related to possible mali...
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. Thes...
International audienceThe communication infrastructure is a key element for management and control o...
With the smart grid initiatives in recent years, the electric power grid is rapidly evolving into a ...
Applications of cyber technologies improve the quality of monitoring and decision making in smart gr...
Abstract—Information and communication technologies bring significant improvements to power grid and...
Application of cyber technologies improves the quality of monitoring and decision making in smart gr...
In this study, the authors introduce ARCADES (Analysis of Risk from Cyberattack against DEfensive St...
The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical...
International audienceThe protection and safe operations of power systems heavily rely on the identi...
Recently, game theory has been used to design optimized strategies for defending an electric power s...
The impact of coordinated malicious attacks may be dramatically severe and may yield a wide area bla...
© 2016 IEEE. The impact of coordinated malicious attacks may be dramatically severe and may yield a ...
In the analysis of power systems security, recently a new concern related to possible malicious atta...
The widely used intelligent measuring equipment not only makes the operation of AC/DC hybrid transmi...
Abstract – In the analysis of power systems security recently a new concern related to possible mali...
Power grids rely on Operational Technology (OT) networks, for real-time monitoring and control. Thes...
International audienceThe communication infrastructure is a key element for management and control o...
With the smart grid initiatives in recent years, the electric power grid is rapidly evolving into a ...
Applications of cyber technologies improve the quality of monitoring and decision making in smart gr...
Abstract—Information and communication technologies bring significant improvements to power grid and...
Application of cyber technologies improves the quality of monitoring and decision making in smart gr...
In this study, the authors introduce ARCADES (Analysis of Risk from Cyberattack against DEfensive St...