[1]
|
D. Kundar, X. Y. Feng, S. Liu, T. Zourntos and L. B.-P. Karen, “Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid,”.
|
[2]
|
http://psalserver.tamu.edu/main/papers/Towards%20a%20Framework%20for%20Cyber%20Attack%20Impact%20Analsis%20of%20the%20Electric%20Smart%20Grid.pdf
|
[3]
|
L. Carin and G. Cybenko, “Quantitative Evaluation of Risk for Investment Efficient Strategies in Cybersecurity: The QuERIES Methodology,” AFRL/WS-07- 2145, September 2007
|
[4]
|
M. Yuksel, K. Bekris, C. Y. Evrenosoglu, M. H. Gunes, S. Fadali, M. Etezadi-Amoli and F. Harris, “Open Cyber-Architecture for Electrical Energy Markets,” IEEE Transactions on Power Systems, Vol. 23, No. 4, 2008, pp. 1836-1846.doi:10.1109/TPWRS.2008.2002298
|
[5]
|
S. M. Amin, “Cyber and Critical Infrastructure Security – Toward Smarter and More Secure Power and Energy Infrastructures,” Canada-U.S. Workshop on Smart Grid Technologies at Vancouver, Tuesday, March 25, 2010.
|
[6]
|
N.-P. Matias, F. Yoshida and G. Gross, “Towards Quantifying the Impacts of Cyber Attacks in the Competitive Electricity Market Environment, POWERTECH 2009,”.
http://energy.ece.illinois.edu/gross/papers/powertech2009final.pdf
|
[7]
|
E. H. Forman, “Decision by Objective: Analytical Hierarchy Process,” http://www.dept.aoe.vt.edu/~cdhall/courses/aoe4065/AHPslides.pdf
|
[8]
|
Vulnerability Assessment, SANS Institute InfoSec Reading Room, http://www.sans.org/
|
[9]
|
C.-W. Ten and C.-C. Liu, “Vulnerability Assessment of Cybersecurity for SCADA Systems,” IEEE Transactions on Power Systems, Vol. 23, No. 4, 2008, pp. 1836-1846.
|
[10]
|
KERI, Incheon University, “A Study of Interruption Cost Research for Power System Plan at Industrial Customer,” MOTIE, February 2008.
|
[11]
|
KERI, Seoul National University, “A Study on Compensation Amounts and Risk Hedging Methods for Damage or Loss Caused by Power Interruption,” KEMCO, April 2011.
|