Synchrophasor Broadcast Over Internet Protocol for Distributed Generator Synchronization, IEEE Transactions on, vol.25, issue.4, pp.2835-2841, 2010. ,
Combating advanced persistent threats: From network event correlation to incident detection, Computers & Security, vol.48, pp.35-57, 2015. ,
DOI : 10.1016/j.cose.2014.09.006
PE (Cyber-to-Physical or Process Effects) case study paper ? German Steel Mill Cyber Attack, SANS ICS, 2014. ,
Network resilience: a systematic approach, IEEE Communications Magazine, vol.49, issue.7, pp.4988-97, 2011. ,
DOI : 10.1109/MCOM.2011.5936160
Model-Based Attack Detection and Mitigation for Automatic Generation Control. Smart Grid, IEEE Transactions on, vol.5, issue.2, pp.580-591, 2014. ,
DOI : 10.1109/tsg.2014.2298195
Cybersecurity for Critical Infrastructures: Attack and Defense Modeling. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, vol.40, issue.4, pp.853-865, 2010. ,
Networklayer Protection Schemes Against Stealth Attacks on State Estimators in Power Systems, Smart Grid Communications (SmartGridComm), 2011 IEEE International Conference on, pp.184-189, 2011. ,
Extended Distributed State Estimation: A Detection Method against Tolerable False Data Injection Attacks in Smart Grids, Energies, vol.7, issue.3, pp.1517-1538, 2014. ,
DOI : 10.3390/en7031517
An Integrated Security System of Protecting Smart Grid Against Cyber Attacks, Innovative Smart Grid Technologies (ISGT), pp.1-7, 2010. ,
Power Generation, Operation, and Control, 2012. ,
SCADA-specific Intrusion Detection/Prevention Systems: A Survey and Taxonomy, Proceedings of the 1st Workshop on Secure Control Systems (SCS), 2010. ,