NOVEL RISK ASSESSMENT FRAMEWORK FOR SMART GRID
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
http://www.bridgetoindia.com/blog/how-much-power-will-india-need-in- 2035 dated on 24.08.2016
http://powermin.nic.in/en/content/overviewdatedon24.08.2016
http://www.indiasmartgrid.org/pilot.php dated on 24.08.2016
http://blog.ucsusa.org/mike-jacobs/2003-northeast-blackout-and-13-of-the-Largest-power-outages-in-history-199, date on 25.08.2016
www.cercind.gov.in/2012/orders/Final_Report_Grid_Disturbance.pdf
http://www.ibtimes.com/aging-us-power-grid-blacks-out-more-any- other- developed-nation-1631086, date on 25.08.2016
Rouse WB (2003) Engineering complex systems: implications for research in systems engineering. System Cybern Part C Appl Rev IEEE Trans 3(2):154–156
Ottino JM (2004) Engineering complex systems. Nature 427(6973):399
Kro¨ger W (2008) Critical infrastructures at risk: a need for a new conceptual approach and extended analytical tools reliab Eng Syst Saf 93(12):1781–1787
Gheorghe AV, Schlapfer M (2006) Ubiquity of digitalization and risks of interdependent critical infrastructures. In: Systems, Man and Cybernetics, 2006.
SMC’06. IEEE International Conference on, 1: 580–584
Rinaldi SA, Peerenboom JP, Kelly TK (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25
Chou CC, Tseng SM (2010) Collection and analysis of critical infrastructure interdependency relationships. J Comput Civil Eng 24(6):539–547
D’Agostino G, Bologna S, Fioriti V, Casalicchio E, Brasca L Ciapessoni E, Buschi S (2010) Methodologies for inter- dependency assessment. Critical Infrastructure (CRIS), 2010 5th International Conference on, pp 1–7
Granic I, Lamey AV (2000) The self-organization of the Internet and changing modes of thought. New Ideas Psychol 18(1):93–107
Billinton, R., G. Tollefson, and G. Wacker. Assessment of Electric service reliability worth. in Probabilistic Methods Applied to Electric Power Systems, 1991., Third International Conference on.1991.
Lockstep Consulting, Privacy Impact Assessment Report – Advanced Metering Infrastructure (AMI), Victoria, Australia (2011).
NRECA, Guide to Developing a Cyber Security and Risk Mitigation Plan, National RuralElectric Cooperative Association/Cooperative Research Network,
Miller, B., & Rowe, D. (2012, October). A survey SCADA of and critical infrastructure incidents.In Proceedings of the 1st Annual conference on Research in information technology (pp.51-56). ACM.
Tudor, Z., & Fabro, M. (2010). What went wrong. In A study of actual industrial cyber security incidents. Industrial Control Systems Joint Working Group (ICSJWG) spring conference.
Henrie, M. (2013). Cyber security risk management in the SCADA critical infrastructure environment. Engineering Management Journal, 25(2), 38-45.
Kaplan, S., & Garrick, B. J. (1981). On the quantitative definition of risk. Risk analysis, 1(1), 11-27.
Chittester, C. G., & Haimes, Y. Y. (2004). Risks of terrorism to information technology and to critical interdependent infrastructures. Journal of Homeland Security and Emergency Management, 1(4).
Guan, Y., & Kezunovic, M. (2011). Grid monitoring and market risk management. IEEE Intelligent Systems, 26(2), 18-21.
Yesudas, R., & Clarke, R. (2013, September). A framework for risk analysis in smart grid. In International Workshop on Critical Information Infrastructures Security (pp. 84-95). Springer,
Cham.Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. computers & security, 56, 1-27. Arlington, VA (2011)