1 |
ICS-CERT. Assessments. CEST Cyber Security Evalutaion Tool. https://ics-certus-cert.gov/Assessments
|
2 |
ICS-CERT. Downloading and Installing CSET. CEST Cyber Security Evalutaion Tool. https://ics-cert.us-cert.gov/Downloading-and-Installing-CSET.
|
3 |
WIKIPEDIA. SCADA. https://en.wikipedia.org/wiki/SCADA
|
4 |
NCS. (2004). Supervisory Control and Data Acquisition (SCADA) Systems.
|
5 |
C. K. Lee. (2004). Design of an Integrated I&C System Daejeon : KAERI.
|
6 |
Y. R. Choi. (2009). Development of IT-based Cyber Security Technology for Nuclear Power Plant. Daejeon: KAERI.
|
7 |
Y. J. Kim, J. H. Lee & J. I. Lim. (2009). A Study on the Secure Plan of Security in SCADA Systems. Journal of the Korea Institute of Information Security & Cryptology, 19(6), 145-152.
|
8 |
D. J. Kang, J. J. Lee, Y. Lee, I. S. Lee & H. K. Kim. (2013). Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry. Journal of the Korea Institute of Information Security & Cryptology, 23(3), 445-457.
DOI
|
9 |
H. Kim. (2009). Analysis of Overseas System based Evaluation Cases and Technology. Naju: KISA.
|
10 |
T. H. Woo. (2013). Systems thinking safety analysis: nuclear security assessment of physical protection system in nuclear power plants. Science and Technology of Nuclear Installations, 2013.
|
11 |
Y. Zhang, L. Wang, Y. Xiang & C. W. Ten. (2015). Power system reliability evaluation with SCADA cybersecurity considerations. IEEE Transactions on Smart Grid, 6(4), 1707-1721.
DOI
|
12 |
G. N. Ericsson. (2010). Cyber security and power system communication-essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501-1507.
DOI
|
13 |
M. Negrete-Pincetic, F. Yoshida & G. Gross. (2009, July). Towards quantifying the impacts of cyber attacks in the competitive electricity market environment. In IEEE Power Tech Conference (pp. 1332-1336).
|
14 |
Korea Electrotechnology Research Institute. (2008). A Study to investigate Industrial Customer Interruption Cost for Power System Planning. Seoul : Korea Electrotechnology Research Institute.
|
15 |
HelloT. (2010). Control system publication and security issues. HelloT(Online). http://magazine.hellot.net/magz/article/articleDetail.do?flag=all&showType=showType1&articleId=ARTI_000000000035281&articleAllListSortType=sort_1&page=1&selectYearMonth=201009&subCtgId
|