ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
54
views
0
references
Top references
cited by
13
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,474
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees
proceedings-article
Author(s):
Chee-Wooi Ten
,
Chen-Ching Liu
,
Manimaran Govindarasu
Publication date
(Print):
June 2007
Conference name:
2007 IEEE Power Engineering Society General Meeting
Conference date:
July 24, 2007 - July 28, 2007
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Socioecological systems
Author and article information
Conference
Publication date:
June 2007
Publication date (Print):
June 2007
Pages
: 1-8
Article
DOI:
10.1109/PES.2007.385876
SO-VID:
8c3c3e39-d67c-4b69-8f8e-8bf93939a4bd
Copyright ©
© 2007
Conference name:
2007 IEEE Power Engineering Society General Meeting
Conference location:
Tampa, FL, USA
Conference date:
July 24, 2007 - July 28, 2007
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
3,474
Wind turbine condition monitoring based on SCADA data using normal behavior models
Authors:
Influence of Wake Model Superposition and Secondary Steering on Model-Based Wake Steering Control with SCADA Data Assimilation
Authors:
Michael Howland
,
John Dabiri
,
DONNA F. HOWLAND
Fusion estimation for a class of multi-rate power systems with randomly occurring SCADA measurement delays
Authors:
Bogang Qu
,
Zidong Wang
,
Bo Shen
See all similar
Cited by
13
Vulnerability Assessment of Cybersecurity for SCADA Systems
Authors:
Chee-Wooi Ten
,
Chen-Ching Liu
,
Govindarasu Manimaran
A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet
Authors:
Arash Nourian
,
Stuart Madnick
Cyber-Physical Power System (CPPS): A Review on Modeling, Simulation, and Analysis With Cyber Security Applications
Authors:
Rajaa Vikhram Yohanandhan
,
Rajvikram Madurai Elavarasan
,
Premkumar Manoharan
…
See all cited by