Analysis of statistical indicators of variance, asymmetry and excess in determining information security violations of cyberphysical systems of wind turbines
Abstract
Keywords
Full Text:
PDF (Українська)References
Zabetian-Hosseini, A., Mehrizi-Sani, A., Liu, C. Cyberattack to Cyber-Physical Model of Wind Farm SCADA. IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society, 2018, pp. 4929-4934. DOI: 10.1109/IECON.2018.8591200.
Medvedskaya, N. Statistika po kiberbezopasnosti za 2020 god [Cybersecurity statistics for 2020]. Available at: https://10guards.com/ru/articles/2020-cybersecurity-statistics/. (аccessed 14.06.2021).
Kostrov, D. «Umnye seti elektrosnabzheniya» (smart grid) i problemy s kiberbezopasnost'yu ["Smart power supply networks" (smart grid) and cybersecurity problems]. Information security, 2014, no. 3, pp. 45-47.
What is DDoS attack? Available at: https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/. (accessed 24.08.2021).
ESET Entsyklopediya zahroz. Troyan [ESET Encyclopedia of threats. Trojan]. Available at: https://www.eset.com/ua/support/information/entsiklopediya-ugroz/troyan/. (accessed 24.08.2021).
Ramirez-Agudelo, O. H., Köpke, C., Sill Torres, F. Bayesian Network Model for Accessing Safety and Security of Offshore Wind Farm. Proceedings of the 30th European Safety and Reliability Conference and the 15th Probabilistic Safety Assessment and Management Conference, Research Publishing, Singapore, 2020, pp. 1756-1763. DOI: 10.3850/978-981-14-8593-0_5799-cd.
Wu, H., Liu, J., Cui, M., Liu, X., Gao, H. Power Grid Reliability Evaluation Considering Wind Farm Cyber Security and Ramping Events. Appl. Sci. 2019, vol. 9, iss. 15, article id: 3003, DOI: 10.3390/app9153003.
Kim, D., Ryu, K., Back, J. Zero-Dynamics Attack on Wind Turbines and Countermeasures Using Generalized Hold and Generalized Sampler. Appl. Sci. 2021, vol. 11, iss. 3, article id: 1257. DOI: 10.3390/app11031257.
Datta, A., Ashiqur Rahman, M., Cyber Threat Analysis Framework for the Wind Energy Based Power System. CPS-SPC’17, Dallas, TX, USA, Nov. 3, 2017, pp. 81-92. DOI: 10.1145/3140241.3140247.
Tetskii, A. G. Primenenie derev'ev atak dlya otsenivaniya veroyatnosti uspeshnoi ataki Web-prilozheniya [Using attack trees to estimate the probability of a successful attack on a Web application], Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2018, no. 3(87), pp. 74‒79. DOI: 10.32620/reks.2018.3.08.
Shelekhov, I., Barchenko, N., Kal'chenko, V., Obodyak, V. Nechitka iyerarkhichna otsinka yakosti kompleksnykh system zakhystu informatsiyi [Fuzzy hierarchical assessment of the quality of integrated information security systems]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, no. 4(96), pp. 106-115. DOI: 10.32620/reks.2020.4.10.
Adeyanju, A., Boucher, D. Theoretical Analysis of the Bladeless Wind Turbine Performance. Journal of Scientific Research and Reports, 2020, vol. 26, iss. 10, pp. 93-106. DOI: 10.9734/jsrr/2020/v26i1030325.
Erisen, B. Wind Turbine Scada Dataset. 2018 Scada Data of a Wind Turbine in Turkey. Available at: https://www.kaggle.com/berkerisen/wind-turbine-scada-dataset. (accessed 03.03.2021).
Wagner, H.-J. Introduction to wind energy systems. Ruhr-University Bochum, Energy Systems and Energy Economics, 5th course of the MRS-EMRS “Materials for Energy and Sustainability” and 3rd course of the “EPS-SIF International School on Energy”, 2017, vol. 148, article Id: 00011. 16 p. DOI: 10.1051/epjconf/201714800011.
DOI: https://doi.org/10.32620/reks.2021.4.11
Refbacks
- There are currently no refbacks.
