Professional Documents
Culture Documents
1561/3100000026
Cyber–Physical System
Security of Distribution
Systems
Full text available at: http://dx.doi.org/10.1561/3100000026
Chen-Ching Liu
Virginia Tech
Juan C. Bedoya
Virginia Tech
Nitasha Sahani
Virginia Tech
Alexandru Stefanov
Delft University of Technology
Jennifer Appiah-Kubi
Virginia Tech
Chih-Che Sun
Washington State University
Jin Young Lee
Washington State University
Ruoxi Zhu
Virginia Tech
Boston — Delft
Full text available at: http://dx.doi.org/10.1561/3100000026
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,
or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise,
without prior written permission of the publishers.
Photocopying. In the USA: This journal is registered at the Copyright Clearance Center, Inc., 222
Rosewood Drive, Danvers, MA 01923. Authorization to photocopy items for internal or personal
use, or the internal or personal use of specific clients, is granted by now Publishers Inc for users
registered with the Copyright Clearance Center (CCC). The ‘services’ for users can be found on
the internet at: www.copyright.com
For those organizations that have been granted a photocopy license, a separate system of payment
has been arranged. Authorization does not extend to other kinds of copying, such as that for
general distribution, for advertising or promotional purposes, for creating new collective works,
or for resale. In the rest of the world: Permission to photocopy must be obtained from the
copyright owner. Please apply to now Publishers Inc., PO Box 1024, Hanover, MA 02339, USA;
Tel. +1 781 871 0245; www.nowpublishers.com; sales@nowpublishers.com
now Publishers Inc. has an exclusive license to publish this material worldwide. Permission
to use this content must be obtained from the copyright license holder. Please apply to now
Publishers, PO Box 179, 2600 AD Delft, The Netherlands, www.nowpublishers.com; e-mail:
sales@nowpublishers.com
Full text available at: http://dx.doi.org/10.1561/3100000026
Editors
István Erlich
University of Duisburg-Essen
David Hill
University of Hong Kong and University of Sydney
Daniel Kirschen
University of Washington
J. Zico Kolter
Carnegie Mellon University
Chao Lu
Tsinghua University
Steven Low
California Institute of Technology
Ram Rajagopa
Stanford University
Lou van der Sluis
TU Delft
Goran Strbac
Imperial College London
Robert J. Thomas
Cornell University
David Tse
University of California, Berkeley
Le Xie
Texas A&M University
Full text available at: http://dx.doi.org/10.1561/3100000026
Editorial Scope
Topics
Foundations and Trends
R
in Electric Energy Systems publishes survey and
tutorial articles in the following topics:
Contents
1 Introduction 3
10 Conclusion 53
Acknowledgements 54
References 55
Full text available at: http://dx.doi.org/10.1561/3100000026
ABSTRACT
The Information and Communications Technology (ICT)
for control and monitoring of power systems is a layer
on top of the physical power system infrastructure. The
cyber system and physical power system components form
a tightly coupled Cyber–Physical System (CPS). Sources
of vulnerabilities arise from the computing and communi-
cation systems of the cyber–power grid. Cyber intrusions
targeting the power grid are serious threats to the reliabil-
ity of electricity supply that is critical to society and the
economy. In a typical Information Technology environment,
numerous attack scenarios have shown how unauthorized
users can access and manipulate protected information from
a network domain. The need for cyber security has led to
industry standards that power grids must meet to ensure
that the monitoring, operation, and control functions are not
disrupted by cyber intrusions. Cyber security technologies
such as encryption and authentication have been deployed
on the CPS. Intrusion or anomaly detection and mitigation
1
Introduction
3
Full text available at: http://dx.doi.org/10.1561/3100000026
4 Introduction
6 Introduction
References
55
Full text available at: http://dx.doi.org/10.1561/3100000026
56 References
References 57
58 References
References 59
60 References
References 61
62 References
References 63
64 References
References 65