The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a...
The evolved smart grid has become a cyber physical energy system that could be exposed to a massive ...
Power system state estimation is an important component of the status and healthiness of the underly...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
Transient simulation is a critical task of validating the dynamic model of the power grid. We propos...
This paper analyses the impacts of credible contingency and an event of cyber attack on the dynamic ...
© 2010-2012 IEEE. The first-ever Ukraine cyberattack on power grid has proven its devastation by hac...
In this paper, a methodology is proposed for the evaluation of the impact of cyber attacks on the po...
Cyber-physical attacks on critical industrial control systems are on the rise. These attacks may tar...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
Smart Grids (SGs) are Critical Infrastructures (CI), which are responsible for controlling and main...
During the evolution of today's power grid to a Smart Grid it is expected that IP-based communicatio...
The current development in cyber-physical systems technology, from a static to a more dynamically di...
The N-1 contingency analysis of bulk power systems is a widely accepted pre-screening criterion to e...
The digital transformation of power systems has introduced a new challenge for robustness: cyber sec...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
The evolved smart grid has become a cyber physical energy system that could be exposed to a massive ...
Power system state estimation is an important component of the status and healthiness of the underly...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
Transient simulation is a critical task of validating the dynamic model of the power grid. We propos...
This paper analyses the impacts of credible contingency and an event of cyber attack on the dynamic ...
© 2010-2012 IEEE. The first-ever Ukraine cyberattack on power grid has proven its devastation by hac...
In this paper, a methodology is proposed for the evaluation of the impact of cyber attacks on the po...
Cyber-physical attacks on critical industrial control systems are on the rise. These attacks may tar...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...
Smart Grids (SGs) are Critical Infrastructures (CI), which are responsible for controlling and main...
During the evolution of today's power grid to a Smart Grid it is expected that IP-based communicatio...
The current development in cyber-physical systems technology, from a static to a more dynamically di...
The N-1 contingency analysis of bulk power systems is a widely accepted pre-screening criterion to e...
The digital transformation of power systems has introduced a new challenge for robustness: cyber sec...
Cyber-attacks on SCADA (supervisory control and data acquisition) systems used by industrial control...
The evolved smart grid has become a cyber physical energy system that could be exposed to a massive ...
Power system state estimation is an important component of the status and healthiness of the underly...
The Smart Grid (SG) is vulnerable to cyber-attacks due to its integration with a variety of informat...