- Y. Xiang, Z. Ding, and L. Wang, “Power system adequacy assessment with load redistribution attacks,” in Innovative Smart Grid Technologies Conference (ISGT), 2015 IEEE Power & Energy Society, Washington, DC, USA, pp. 1-5, 18-20 Feb. 2015.
- V. Bier, S. Oliveros, and L. Samuelson, “Choosing what to protect: Strategic defensive allocation against an unknown attacker,” Journal of Public Economic Theory, vol. 9, pp. 563-587, July 2007.
- G. Dondossola, F. Garrone, and J. Szanto, “Cyber risk assessment of power control systems, A metrics weighed by attack experiments,” in Power and Energy Society General Meeting, 2011 IEEE, Detroit, MI, USA, pp. 1-9, 24-29 July 2011.
- Y. Zhang, L. Wang, Y. Xiang, and C.-W. Ten, “Inclusion of SCADA cyber vulnerability in power system reliability assessment considering optimal resources allocation,” IEEE Transactions on Power Systems, vol. 31, pp. 4379-4394, Jan. 2016.
- T. S. Popik, “Testimony of the Foundation for Resilient Societies,” in Reliability Technical Conference, Federal Energy Regulatory Commission, Docket No. AD16-15-000, pp. 1-15, June 2016.
- K. Stouffer, J. Falco, and K. Kent, “Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security, Recommendations of the National Institute of Standards and Technology,” NIST Standard Special Publication 800-82, Sep. 2006.
- D. U. Case, “Analysis of the cyber attack on the Ukrainian power grid,” Electricity Information Sharing and Analysis Center (E-ISAC), 2016.
- L. L. Wei, A. Sarwat, W. Saad, and S. Biswas, “Stochastic games for power grid protection against coordinated cyber-physical attacks,” IEEE Transactions on Smart Grid, vol. 9, pp. 684 – 694, May 2016.
- Z. Li, M. Shahidehpour, A. Alabdulwahab, and A. Abusorrah, “Bilevel model for analyzing coordinated cyber-physical attacks on power systems,” IEEE Transactions on Smart Grid, vol. 7, pp. 2260-2272, Aug. 2015.
- J. Yue and K. Zhang, “Vulnerability Threat Assessment Based on AHP and Fuzzy Comprehensive Evaluation,” in Computational Intelligence and Design (ISCID), 2014 Seventh International Symposium on, Hangzhou, China, pp. 513-516, 13-14 Dec. 2014.
- S. K. Khaitan, J. D. McCalley, and C. C. Liu, “Cyber physical systems approach to smart electric power grid,” Springer, 2015.
- W. Al Mannai and T. Lewis, “A general defender-attacker risk model for networks,” The Journal of Risk Finance, vol. 9, pp. 244-261, 2008.
- Y. Zhang, L. Wang, and Y. Xiang, “Power system reliability analysis with intrusion tolerance in SCADA systems,” IEEE Transactions on Smart Grid, vol. 7, pp. 669-683, June 2015.
- “Cyber Security for Substation Automation Systems by ABB,” Dec. 2010.
- C.-W. Ten, C.-C. Liu, and G. Manimaran, “Vulnerability assessment of cybersecurity for SCADA systems,” IEEE Transactions on Power Systems, vol. 23, pp. 1836-1846, Oct. 2008.
- A. Creery and E. Byres, “Industrial cybersecurity for power system and SCADA networks, ” in Petroleum and Chemical Industry Conference, Industry Applications Society 52nd Annual, Denver, CO, USA, pp. 303-309, 12-14 Sept. 2005.
- H. Heydari, F. Faghihi, and V. Abbasi, “Optimization of Conductor routs within Metal Enclosure of the Electrical Equipments based on EMC Approach Using Multi criteria Decision Making Case Study: Metal Enclosure of Current Injection System,” Modares Technical And Engineering, no. 38, pp. 1–16, 2010. (In Persian)
- F. Faghihi, H. Heydari and V. Abbasi, “Optimization of Conductor routs within Metal Enclosure of the Electrical Equipments based on EMC Approach Using Multi criteria Decision Making Case Study: Metal Enclosure of Current Injection System,” Journal of Algorithms and Computation, vol. 43, pp. 681–692, 2009. (In Persian)
- V. Abbasi, H. Heydari, and F. Faghihi, “Heuristic mathematical formulations and comprehensive algorithm for optimal decision making for power system cabling,” Scientia Iranica, vol. 19, pp. 707-720, June 2012.
- “High-Impact, Low-Frequency Event Risk (HILF) to the North American Bulk Power System,” Jointly-Commissioned Summary Report of the North American Electric Reliability Corporation and the U.S. Department of Energy, Nov. 2009.
- A. B. Mirghadri, R. Shirbanian, and A. Mirghadri, “A New Lightweight Authentication Scheme for Wireless Sensor Networks,” Journal of Electronical & Cyber Defence, vol. 4, no. 3, pp.1–10, 2016. (In Persian)
- B. Yang, R. Karri, and D. A. McGrew, “A high-speed hardware architecture for universal message authentication code,” IEEE journal on selected areas in communications, vol. 24, pp. 1831-1839, Oct. 2006.
- S. Benedetto, E. Biglieri, and V. Castellani, “Digital Transmission Theory,” Englewood Cliffs, NJ: Prentice Hall, 1988.
- “Get Smart about Electrical Grid Cyber Security,” Hirschmann, A Belden Brand, 2011.
- D.-Y. Chang, “Applications of the extent analysis method on fuzzy AHP,” European journal of operational research, vol. 95, pp. 649-655, Dec. 1996.
- Y.-M. Wang and K.-S. Chin, “Fuzzy analytic hierarchy process: A logarithmic fuzzy preference programming methodology,” International Journal of Approximate Reasoning, vol. 52, pp. 541-553, June 2011.
|