12.07.2015 Views

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

Introduction to Cyber-Warfare - Proiect SEMPER FIDELIS

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

222 12. CYBER ATTACKS AGAINST POWER GRID INFRASTRUCTUREPolicy <strong>to</strong> Advance Democracy, Security, and Trade.” Available at: http://www.internationalrelations.house.gov/111/wor031010.pdf; March 10, 2010 [accessed March 26, 2012]. See also: Markoff J, Barboza D. AcademicPaper in China Sets Off Alarms in U.S. New York Times; March 20, 2010.4. Joskow PL. Creating a smarter U.S. electricity grid. J Econ Perspect 2012;26(1):29–48.5. Wei D, Yan L, Jafari M, Skare PM, Rohde K. Protecting smart grid au<strong>to</strong>mation systems against cyberattacks, IEEETrans Smart Grid 2011;2(4):782–95. http://ieeexplore.ieee.org/xpl/login.jsp?tp¼&arnumber¼6003813&url¼http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6003813 [accessed April 6, 2012].6. Meserve J. Sources: staged cyber attack reveals vulnerability in power grid, CNN September 26, 2007;http://articles.cnn.com/2007-09-26/us/power.at.risk_1_genera<strong>to</strong>r-cyber-attack-electric-infrastructure?_s¼PM:US[accessed March 15, 2012].7. Bernabeu EE, Katiraei F. Aurora vulnerability issues & solutions hardware mitigation devices (HMDs), In: IEEE2011 power and engineering society general meeting; 2011. http://www.ieee-pes.org/images/pdf/pesgm2011/supersessions/mon/Aurora_Vulnerability-Issues_Solutions_PES-GM-V2.pdf [accessed March 15, 2012].8. Zeller M. Myth or reality—does the Aurora vulnerability pose a risk <strong>to</strong> my genera<strong>to</strong>r?, In: IEEE 64th annualconference for protective relay engineers; 2011. http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber¼6035612[accessed March 15, 2012].9. Emanuel E, Katiraei F. Aurora vulnerability issues & solutions hardware mitigation devices (HMDs), In: IEEE2011 power and engineering society general meeting; 2011. http://www.ieee-pes.org/images/pdf/pesgm2011/supersessions/mon/Aurora_Vulnerability-Issues_Solutions_PES-GM-V2.pdf [accessed March 15, 2012].10. Zeller M. Common questions and answers addressing the aurora vulnerability. Schweitzer Engineering Labora<strong>to</strong>riesTechnical Report. http://www.selinc.com/WorkArea/DownloadAsset.aspx?id¼9487; 2010 [accessed March 15,2012].11. Ibid., Zeller 2011.12. Ibid., Bernbeau and Katiraei 2011.13. Ibid., Zeller 2011.14. Salmon D, Zeller M, Guzman A, Mynam V, Donolo M. Mitigating the aurora vulnerability with existing technology.Schweitzer Engineering Labora<strong>to</strong>ries Technical Report. http://www.selinc.com/WorkArea/DownloadAsset.aspx?id¼6379; 2009 [accessed March 15, 2012].15. See Zeller 2011, Bernbeau and Katiraei 2011, Salmon et al. 2009 or Zeller 2010.16. Ibid., Bernbeau and Katiraei 2011.17. Wortzel LM. China’s approach <strong>to</strong> cyber operations: implications for the United States, testimony before thecommittee on foreign affairs. House of representatives, hearing on “The Google Predicament: TransformingU.S. <strong>Cyber</strong>space Policy <strong>to</strong> Advance Democracy, Security, and Trade”, March 10, 2010. http://www.internationalrelations.house.gov/111/wor031010.pdf [accessed March 26, 2012].18. Markoff J, Barboza D. Academic paper in china sets off alarms in U.S. NY Times 2010.19. Buldyrev SV, Parshani R, Paul G, Stanley HE, Havlin S. Catastrophic cascade of failures in interdependent networks.Nature 2010;464:1025–8.20. Albert R, Albert I, Nakarado GL. Structural vulnerability of the North American power grid. Phys Rev E2004;69:025103.21. Motter AE, Lai Y-C. Cascade-based attacks on complex networks. Phys Rev E 2002;66:065102R.22. Ibid., Buldyrev.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!