{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:50:59Z","timestamp":1725745859013},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405105"},{"type":"electronic","value":"9783642405112"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40511-2_17","type":"book-chapter","created":{"date-parts":[[2013,8,18]],"date-time":"2013-08-18T21:53:28Z","timestamp":1376862808000},"page":"240-255","source":"Crossref","is-referenced-by-count":2,"title":["Towards Improved Understanding and Holistic Management of the Cyber Security Challenges in Power Transmission Systems"],"prefix":"10.1007","author":[{"given":"Inger Anne","family":"T\u00f8ndel","sequence":"first","affiliation":[]},{"given":"Bodil Aamnes","family":"Mostue","sequence":"additional","affiliation":[]},{"given":"Martin Gilje","family":"Jaatun","sequence":"additional","affiliation":[]},{"given":"Gerd","family":"Kj\u00f8lle","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"17_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MPE.2012.2205318","volume":"10","author":"P. Panciatici","year":"2012","unstructured":"Panciatici, P., Bareux, G., Wehenkel, L.: Operating in the fog: Security management under uncertainty. IEEE Power and Energy Magazine\u00a010(5), 40\u201349 (2012)","journal-title":"IEEE Power and Energy Magazine"},{"issue":"4","key":"17_CR2","doi-asserted-by":"publisher","first-page":"1922","DOI":"10.1109\/TPWRS.2005.857942","volume":"20","author":"G. Andersson","year":"2005","unstructured":"Andersson, G., Donalek, P., Farmer, R., Hatziargyriou, N., Kamwa, I., Kundur, P., Martins, N., Paserba, J., Pourbeik, P., Sanchez-Gasca, J., Schulz, R., Stankovic, A., Taylor, C., Vittal, V.: Causes of the 2003 major grid blackouts in north america and europe, and recommended means to improve system dynamic performance. IEEE Transactions on Power Systems\u00a020(4), 1922\u20131928 (2005)","journal-title":"IEEE Transactions on Power Systems"},{"key":"17_CR3","unstructured":"Union for the Coordination of Transmission of Electricity (UCTE): Final report - system disturbance on November 4 2006 (2007)"},{"key":"17_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-655-9","volume-title":"Vulnerable Systems","author":"W. Kr\u00f6ger","year":"2011","unstructured":"Kr\u00f6ger, W., Zio, E.: Vulnerable Systems, 1st edn. Springer Publishing Company, Incorporated (2011)","edition":"1"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Kj\u00f8lle, G., Gjerde, O.: Risk analysis of electricity supply. In: Hokstad, P., Utne, I.B., Vatn, J. (eds.) Risk and Interdependencies in Critical Infrastructures. Springer Series in Reliability Engineering, pp. 95\u2013108. Springer, London (2012)","DOI":"10.1007\/978-1-4471-4661-2_7"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Ciapessoni, E., Cirio, D., Grillo, S., Massucco, S., Pitto, A., Silvestro, F.: Operational risk assessment and control: A probabilistic approach. In: Innovative Smart Grid Technologies Conference Europe (ISGT Europe), pp. 1\u20138. IEEE PES (2010)","DOI":"10.1109\/ISGTEUROPE.2010.5638975"},{"key":"17_CR7","unstructured":"The GRID consortium: ICT Vulnerabilities of Power Systems: A Roadmap for Future Research (2007)"},{"key":"17_CR8","unstructured":"Hokstad, P., Utne, I.B., Vatn, J. (eds.): Risk and Interdependencies in Critical Infrastructures \u2013 A Guideline for Analysis. Springer Series in Reliability Engineering. Springer"},{"key":"17_CR9","unstructured":"Egozcue, E., Rodr\u00edguez, D.H., Ortiz, J.A., Villar, V.F., Tarrafeta, L.: Smart Grid Security, Anex I. General Concepts and Dependencies with ICT. Technical Report Deliverable - 2012-04-19, ENISA (2012)"},{"issue":"15","key":"17_CR10","doi-asserted-by":"publisher","first-page":"3604","DOI":"10.1016\/j.comnet.2011.07.010","volume":"55","author":"W. Wang","year":"2011","unstructured":"Wang, W., Xu, Y., Khanna, M.: A survey on the communication architectures in smart grid. Computer Networks\u00a055(15), 3604\u20133629 (2011)","journal-title":"Computer Networks"},{"key":"17_CR11","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","volume":"100","author":"S. Sridhar","year":"2012","unstructured":"Sridhar, S., Hahn, A., Govindarasu, M.: Cyber physical system security for the electric power grid. Proceedings of the IEEE\u00a0100, 210\u2013224 (2012)","journal-title":"Proceedings of the IEEE"},{"key":"17_CR12","unstructured":"MIT: The Future of the Electric Grid. An Interdisciplinary MIT Study (December 2011)"},{"issue":"4","key":"17_CR13","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TSG.2011.2159999","volume":"2","author":"M.D. Wei","year":"2011","unstructured":"Wei, M.D., Lu, Y., Jafari, Skare, P.M., Rohde, K.: Protecting smart grid automation systems against cyberattacks. IEEE Transactions on Smart Grid\u00a02(4), 782\u2013795 (2011)","journal-title":"IEEE Transactions on Smart Grid"},{"key":"17_CR14","unstructured":"Mesbah, M., Samitier, C., Einarsson, T., Acacia, M., Alvarez, J., Carmo, U., Castro, F., Cimadevilla, R., Darne, J., Dollerup, S., Freitas, J., Komatsu, C., Leroy, T., Ordunez, M.A., Runesson, A., Spiess, H., Stockton, M., Struecker, A., Valente, M., Vianello, G., Viziteu, I., Wright, J.: Line and system protection using digital circuit and packet communication. Technical Report JWG D2B5.30, CIGRE (2012)"},{"key":"17_CR15","unstructured":"ISO\/IEC 27001:2005 (Information technology - security techniques - information security management systems - requirements)"},{"key":"17_CR16","unstructured":"The Smart Grid Interoperability Panel - Cyber Security Working Group: NISTIR 7628: Guidelines for smart grid cyber security: Vol. 1, smart grid cyber security strategy, architecture and high-level requirements (2010)"},{"issue":"3","key":"17_CR17","doi-asserted-by":"publisher","first-page":"1387","DOI":"10.1109\/TPWRS.2004.825981","volume":"19","author":"P. Kundur","year":"2004","unstructured":"Kundur, P., Paserba, J., Ajjarapu, V., Andersson, G., Bose, A., Canizares, C., Hatziargyriou, N., Hill, D., Stankovic, A., Taylor, C., Cutsem, T.V., Vittal, V.: Definition and classification of power system stability IEEE\/CIGRE joint task force on stability terms and definitions. IEEE Transactions on Power Systems\u00a019(3), 1387\u20131401 (2004)","journal-title":"IEEE Transactions on Power Systems"},{"issue":"1","key":"17_CR18","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A. Avizienis","year":"2004","unstructured":"Avizienis, A., Laprie, J.-C., Randell, B., Landwehr, C.: Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing\u00a01(1), 11\u201333 (2004)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"17_CR19","unstructured":"ISO\/IEC 27005:2008 ( Information technology - Security techniques - Information security risk management)"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Zio, E., Piccinelli, R., Sansavini, G.: An All-Hazard Approach for the Vulnerability Analysis of Critical Infrastructures. In: Proceedings of the European Safety and Reliability Conference 2011, Troyes, France, pp. 2451\u20132458 (September 2011)","DOI":"10.1201\/b11433-349"},{"key":"17_CR21","unstructured":"ISO\/IEC 27002:2005 (Information technology - security techniques - code of practice for information security management)"},{"key":"17_CR22","unstructured":"IEC 61508 (Functional safety of electrical\/electronic\/programmable electronic safety-related systems)"},{"issue":"1","key":"17_CR23","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/TPWRS.2005.857849","volume":"21","author":"G.L. Doorman","year":"2006","unstructured":"Doorman, G.L., Uhlen, K., Kj\u00f8lle, G.H., Huse, E.S.: Vulnerability analysis of the nordic power system. IEEE Transactions on Power Systems\u00a021(1), 402\u2013410 (2006)","journal-title":"IEEE Transactions on Power Systems"},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Gardner, R., Consortium, G.: A survey of ICT vulnerabilities of power systems and relevant defense methodologies. In: Power Engineering Society General Meeting, pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/PES.2007.385713"},{"key":"17_CR25","unstructured":"NERC: Cyber Attack Task Force, Final Report (2012)"},{"key":"17_CR26","first-page":"177","volume-title":"Proceedings of the 5th Conference on Information Technology Education, CITC5 2004","author":"G.L. Orgill","year":"2004","unstructured":"Orgill, G.L., Romney, G.W., Bailey, M.G., Orgill, P.M.: The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. In: Proceedings of the 5th Conference on Information Technology Education, CITC5 2004, pp. 177\u2013181. ACM, New York (2004)"},{"key":"17_CR27","unstructured":"National SCADA Test Bed (NSTB): Common Cyber Security Vulnerabilities Observed in Control System aSsessments by the INL NSTB Program. Technical Report INL\/EXT-08-13979, Idaho National Laboratory (2008)"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Kj\u00f8lle, G.H., Gjerde, O., Hjartsj\u00f8, B.T., Engen, H., Haarla, L., Koivisto, L., Lindblad, P.: Protection system faults \u2013 a comparative review of fault statistics. In: International Conference on Probabilistic Methods Applied to Power Systems, PMAPS 2006, pp. 1\u20137 (2006)","DOI":"10.1109\/PMAPS.2006.360319"},{"issue":"2","key":"17_CR29","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S0951-8320(01)00067-9","volume":"74","author":"K. \u00d8ien","year":"2001","unstructured":"\u00d8ien, K.: Risk indicators as a tool for risk control. Reliability Engineering & System Safety\u00a074(2), 129\u2013145 (2001)","journal-title":"Reliability Engineering & System Safety"},{"issue":"2","key":"17_CR30","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.ssci.2010.05.012","volume":"49","author":"K. \u00d8ien","year":"2011","unstructured":"\u00d8ien, K., Utne, I.B., Herrera, I.A.: Building safety indicators: Part 1 theoretical foundation. Safety Science\u00a049(2), 148\u2013161 (2011)","journal-title":"Safety Science"},{"issue":"2","key":"17_CR31","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1016\/j.jlp.2011.11.001","volume":"25","author":"J.E. Vinnem","year":"2012","unstructured":"Vinnem, J.E., Bye, R., Gran, B.A., Kongsvik, T., Nyheim, O.M., Okstad, E.H., Seljelid, J., Vatn, J.: Risk modelling of maintenance work on major process equipment on offshore petroleum installations. Journal of Loss Prevention in the Process Industries\u00a025(2), 274\u2013292 (2012)","journal-title":"Journal of Loss Prevention in the Process Industries"},{"key":"17_CR32","unstructured":"UK Health and Safety Executive (HSE): Development process safety indicators. a step-by-step guide for chemical and major hazard industries (2003)"},{"key":"17_CR33","unstructured":"Centre for Chemical Process Safety (CCPS): Process safety leading and lagging metrics. you dont improve what you dont measure (2008)"},{"key":"17_CR34","unstructured":"Organisation for Economic Cooperation and Development (OECD): Guidance on developing safety indicators related to chemical accident prevention, preparedness and response. OECD Environment, Health and Safety Publications. Series on Chemical Accidents, 19 (2008)"},{"key":"17_CR35","unstructured":"Electric Power Research Institute (EPRI): Final report on leading indicators of human performance (2001)"},{"key":"17_CR36","unstructured":"\u00d8ien, K.: Development of early warning indicators based on accident investigation. In: PSAM9 International Probabilistic Safety Assessment and Management Conference (May 2008)"},{"key":"17_CR37","unstructured":"\u00d8ien, K., Massaiu, S., Tinmannsvik, R., Strseth, F.: Development of early warning indicators based on resilience engineering. In: PSAM10 International Probabilistic Safety Assessment and Management Conference (June 2010)"},{"key":"17_CR38","first-page":"12","volume":"10","author":"T.H. Rockhwell","year":"1959","unstructured":"Rockhwell, T.H.: Safety performance measurement. Journal of Industrial Engineering\u00a010, 12\u201316 (1959)","journal-title":"Journal of Industrial Engineering"},{"key":"17_CR39","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1016\/j.ssci.2008.07.023","volume":"47","author":"U. Kjell\u00e9n","year":"2009","unstructured":"Kjell\u00e9n, U.: The safety measurement problem revisited. Safety Science\u00a047, 486\u2013489 (2009)","journal-title":"Safety Science"},{"key":"17_CR40","doi-asserted-by":"crossref","DOI":"10.1201\/b17206","volume-title":"Prevention of Accidents through Experience Feedback","author":"U. Kjell\u00e9n","year":"2000","unstructured":"Kjell\u00e9n, U.: Prevention of Accidents through Experience Feedback. Taylor & Francis, London (2000)"},{"issue":"6","key":"17_CR41","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1016\/j.ssci.2010.02.015","volume":"48","author":"J.E. Vinnem","year":"2010","unstructured":"Vinnem, J.E.: Risk indicators for major hazards on offshore installations. Safety Science\u00a048(6), 770\u2013787 (2010)","journal-title":"Safety Science"},{"key":"17_CR42","unstructured":"Herrera, I.A., Hollnagel, E., H\u00e5brekke, S.: Proposing safety performance indicators for helicopter offshore on the norwegian continental shelf. In: 10th International Probabilistic Safety Assessment & Management Conference(PSAM 2010), Seattle, USA (2010)"},{"key":"17_CR43","unstructured":"SANS Institute: Twenty Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines (CAG), version 3.1 (October 2011)"},{"key":"17_CR44","doi-asserted-by":"publisher","DOI":"10.1201\/9781420013283","volume-title":"Complete Guide to Security and Privacy Metrics. Measuring Regulatory Compliance, Operational Resilience and ROI","author":"D.S. Herrmann","year":"2007","unstructured":"Herrmann, D.S.: Complete Guide to Security and Privacy Metrics. Measuring Regulatory Compliance, Operational Resilience and ROI. Auerbach Publications, Taylor & Francis Group, New York (2007)"},{"key":"17_CR45","doi-asserted-by":"crossref","unstructured":"Gelbstein, E.E.: Designing a Security Audit Plan for a Critical Information Infrastructure (CII). In: Laing, C., Badii, A., Vickers, P. (eds.) Securing Critical Infrastructures and Critical Control Systems: Approaches for threat Protection, pp. 262\u2013285. IGI Global (2013)","DOI":"10.4018\/978-1-4666-2659-1.ch011"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability, and Security in Information Systems and HCI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40511-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T14:20:46Z","timestamp":1558016446000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40511-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405105","9783642405112"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40511-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}