[HTML][HTML] Two decades of cyberattack simulations: A systematic literature review
V Engström, R Lagerström - Computers & Security, 2022 - Elsevier
Cyberattack simulations appear across multiple computer security domains and are
interpreted in many different but equally viable ways. However, this makes the topic appear …
interpreted in many different but equally viable ways. However, this makes the topic appear …
A cybersecurity assessment framework for virtual operational technology in power system automation
Assessment of cybersecurity in power system automation (PSA) requires a framework to
study and analyze the complex relationships between the cyber-based control systems and …
study and analyze the complex relationships between the cyber-based control systems and …
A review: Monitoring situational awareness of smart grid cyber‐physical systems and critical asset identification
Abstract Cyber‐Physical Systems (CPSs) are becoming more automated and aimed to be as
efficient as possible by enabling integration between their operations and Information …
efficient as possible by enabling integration between their operations and Information …
False data injection cyber range of modernized substation system
The extensive deployment of information and communication technologies in modern power
grid makes the grid more vulnerable to cyber attacks, resulting in threats to the economy …
grid makes the grid more vulnerable to cyber attacks, resulting in threats to the economy …
A Study on Cybersecurity Standards for Power Systems
S Sarkar - Power Systems Cybersecurity: Methods, Concepts, and …, 2023 - Springer
In order to have explicit cybersecurity measures and best cybersecurity practices in power
systems, a number of cybersecurity standards containing generic sets of rules/guidelines for …
systems, a number of cybersecurity standards containing generic sets of rules/guidelines for …