• No results found

[PDF] Top 20 Petri net modeling of cyber-physical attacks on smart grid

Has 10000 "Petri net modeling of cyber-physical attacks on smart grid" found on our website. Below are the top 20 most common "Petri net modeling of cyber-physical attacks on smart grid".

Petri net modeling of cyber-physical attacks on smart grid

Petri net modeling of cyber-physical attacks on smart grid

... of Petri nets for mod- eling coordinated cyber-physical attacks on the smart ...grid. Petri nets offer more flexibility and expressiveness than traditional attack trees to ... See full document

11

CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid

CPSA: A Cyber-Physical Security Assessment Tool for Situational Awareness in Smart Grid

... Cyber-physical attacks typically compromise the cyber layer by incapacitating communications devices and/or making communica- tions resources unavailable ...these attacks transcends the ... See full document

11

On the use of watermark-based schemes to detect cyber-physical attacks

On the use of watermark-based schemes to detect cyber-physical attacks

... on cyber-physical systems has progressed substantially resulting in a large number of experimental testbeds developed and established in the ...of attacks. Siaterlis et al. [38] define a ... See full document

25

Cyber-Physical Systems Security for Smart Grid

Cyber-Physical Systems Security for Smart Grid

... by cyber attack is a promising ...of attacks like data integrity or false data injection [19], characterizing unobservable cyber attacks [20] using PMU’s to mitigate data injection ... See full document

48

Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks

Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks

... multistep cyber attacks in critical information ...Bayesian net- works are difficult to define and expand linearly with the number of loops in which they are ...structive cyber-physical ... See full document

198

Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment

... the cyber layer involves defining of the cyber network topology in terms of the existing SCADA security measures such as firewall and password models at various ...tic Petri Nets (GSPN) can be used to ... See full document

9

Design and Implementation of Resource-Centric Web Services in Smart Grid Cyber-Physical Systems

Design and Implementation of Resource-Centric Web Services in Smart Grid Cyber-Physical Systems

... ”smart grid” appears in [8]. Smart grid transfers electricity from electric stations (suppliers) to elec- tricity personal and industrial consumers using modernized informatics and ... See full document

6

Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control

Wireless Sensor Network Based Smart Grid Communications: Cyber Attacks, Intrusion Detection System and Topology Control

... Bluetooth is a short distance wireless communication technology based on IEEE 802.15.1 standard. It uses short wavelength wireless transmission in the unlicensed ISM band from 2400 to 2480 MHz. It uses frequency hopping ... See full document

15

How To Improve Smart Grid Cyber Security

How To Improve Smart Grid Cyber Security

... five smart grid market ...with smart grid technology can enable strategies like dynamic line rating, which can potentially reduce the amount of power that must be ...distribution grid ... See full document

16

End-to-End Cyber Security for the Smart Grid

End-to-End Cyber Security for the Smart Grid

... Energy Automation - Multifunctional Project Leader Schneider Electric Energy Automation, Cyber Security Marketing Manager Schneider Electric Sales Engineer Schneider Electric Chief[r] ... See full document

8

The use of the Petri net method in the simulation modeling of mitochondrial swelling

The use of the Petri net method in the simulation modeling of mitochondrial swelling

... functional Petri nets [14]. Petri net is a directed bipartite graph with two types of nodes (Table 1): places and tran­ sitions, which are connected by arcs, reflecting the structure of the ... See full document

9

Intrusion Detection for Cyber-Physical Attacks in Cyber-Manufacturing System

Intrusion Detection for Cyber-Physical Attacks in Cyber-Manufacturing System

... the cyber-physical attack is the future risk of manufacturing system: “future trigger events or new attack tactics may lead to damage to physical infrastructure—and potentially human lives… ... See full document

220

Key Establishment Algorithm for Secure Cyber Physical System to Prevent Cyber Attacks

Key Establishment Algorithm for Secure Cyber Physical System to Prevent Cyber Attacks

... of physical systems with the help of computational ...different physical processes of the ...errors. Smart appliances, smart car these are the examples of ...develop smart home to ... See full document

6

Ensemble Feature Learning-Based Event Classification for Cyber-Physical Security of the Smart Grid

Ensemble Feature Learning-Based Event Classification for Cyber-Physical Security of the Smart Grid

... known attacks and rule-based technique to detect any suspicious and un- known ...interwoven cyber-physical smart grids, such data stream are posing challenges to an effective attack ... See full document

87

Malware Detection for Cyber Security Enhancement in Smart Grid

Malware Detection for Cyber Security Enhancement in Smart Grid

... In general, the results show that the lookup table LUT count grows with increasing number of functions and function calls in applications. For the sample experiment, the LUT counts show a near linear increase with rising ... See full document

7

Spatiotemporal graphical modeling for cyber-physical systems

Spatiotemporal graphical modeling for cyber-physical systems

... In this work, we consider the fact that the traffic sensors in the same freeway and direction form a sensor network in the information space. Therefore, under nominal conditions, the data collected by these sensors ... See full document

67

Modeling and Minimization of Cyber Attacks through Optimization Technique

Modeling and Minimization of Cyber Attacks through Optimization Technique

... The above steps are represented through UML activity diagram and shown in the figure 1. It consists of six major activities which are controlled by one condition. The Hungarian method is applied after creation of NxN ... See full document

5

Destructive Attacks Detection and Response System for Physical Devices in Cyber Physical Systems

Destructive Attacks Detection and Response System for Physical Devices in Cyber Physical Systems

... in cyber physical systems security, clarify that, the most of research follow the same common security solutions as in traditional IT networks ...diverse attacks on CPSs ...CPS attacks and ... See full document

7

SMART GRID CYBER SECURITY POTENTIAL THREATS, VULNERABILITIES AND RISKS

SMART GRID CYBER SECURITY POTENTIAL THREATS, VULNERABILITIES AND RISKS

... Attacker modifies configuration data in the DRAS, such as DR program data, customer list and shed event information, affecting the DR program behavior. Attacker issues false or malicious DR events in DRAS, causing ... See full document

93

FUNSOFT Nets: a petri-net based software process modeling language

FUNSOFT Nets: a petri-net based software process modeling language

... We want to thank the project group MELMAC for implementing essential parts of the above mentioned environment, W. Deiters for contributing basic ideas to it, Prof. W. Schafer and Dr. B. Holtkamp for giving helpful ... See full document

23

Show all 10000 documents...