AH
A.M. Herdeiro Teixeira
Authored
14 records found
Cybersecurity as a Politikum
Implications of Security Discourses for Infrastructures
In the cybersecurity community it is common to think of security as a design feature for systems and infrastructures that may be difficult to balance with other requirements. What is less studied is how security requirements come about, for which reasons, and what their influence
...
Co-simulation for Cyber Security Analysis
Data Attacks against Energy Management System
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from an integral perspective. In order to support vulnerability assessment except analytic analysis, suitable platform for security tests needs to be developed. In this paper we analyze
...
Data Attacks on Power System State Estimation
Limited Adversarial Knowledge vs. Limited Attack Resources
It has shown that with perfect knowledge of the system model and the capability to manipulate a certain number of measurements, the false data injection (FDI) attacks, as a class of data integrity attacks, can coordinate measurements corruption to keep stealth against the bad dat
...
Cyber Security of Intelligent Power Grids
Vulnerability and Impact Assessment for Combined Data Attacks
This work introduces combined data integrity and availability attacks to expand the attack scenarios against intelligent power grids. We propose security metrics that quantify vulnerability of power grids to combined data attacks under both power system models and communication m
...
Low-voltage distribution grids experience a rising penetration of inverter-based, distributed generation. In order to not only contribute to but also solve voltage problems, these inverters are increasingly asked to participate in intelligent grid controls. Communicating inverter
...
In this paper, we address the problem of distributed reconfiguration of networked control systems upon the removal of misbehaving sensors and actuators. In particular, we consider systems with redundant sensors and actuators cooperating to recover from faults. Reconfiguration is
...
This paper addresses the detection and isolation of replay attacks on sensor measurements. As opposed to previously proposed additive watermarking, we propose a multiplicative watermarking scheme, where each sensor's output is separately watermarked by being fed to a SISO waterma
...
Bayesian Networks (BNs) are an increasingly popular modelling technique in cyber security especially due to their capability to overcome data limitations. This is also instantiated by the growth of BN models development in cyber security. However, a comprehensive comparison and a
...
Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could help to address the corres
...
Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could help to address the corres
...
Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could help to address the corres
...
We introduce a model of estimation in the presence of strategic, self-interested sensors. We employ a game-Theoretic setup to model the interaction between the sensors and the receiver. The cost function of the receiver is equal to the estimation error variance while the cost fun
...
Energy management systems (EMS) are used to control energy usage in buildings and campuses, by employing technologies such as supervisory control and data acquisition (SCADA) and building management systems (BMS), in order to provide reliable energy supply and maximise user comfo
...
Energy management systems (EMS) are used to control energy usage in buildings and campuses, by employing technologies such as supervisory control and data acquisition (SCADA) and building management systems (BMS), in order to provide reliable energy supply and maximise user comfo
...
Contributed
6 records found
The usability of the Process Mining analysis method to improve processes of the Netherlands Ministry of Defence
Graduation thesis at the Netherlands Ministry of Defence
In recent years, the Netherlands Ministry of Defence (MoD) modelled, standardized, and digitally secured many of its organization-broad business processes. However, MoD experiences great difficulty in gaining insights in these processes and steering them productively. The novel b
...
ETA prediction
Predicting the ETA of a container vessel based on route identification using AIS data
Container vessels arriving in a port before or after their scheduled time can cause problems in the container terminal planning and planning of hinterland transportation. This in turn leads to an increase of the costs in the supply chain. Vessels communicate their Estimated Time
...
Distinguishing Attacks and Failures in Industrial Control Systems
Knowledge-based Design of Bayesian Networks for Water Management Infrastructures
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attack
...
Targeting financial organisations with DDoS: a multi-sided perspective
Comparing patterns in AmpPot data to experts view on target selection in the financial sector
Currently, DDoS attacks have become inevitable for financial services and their threat keeps rising. Numerous researches have focused on the technical since the rise of DDoS amplification attacks. However, there is less understanding regarding their target selection on financial
...
Nowadays, by using the new ICT technologies the functional efficiency of the Smart Grid is increased but at the same time leads to a more vulnerable system and makes the Smart Grid a potential target for cyber-attacks. In fact, cyber-attacks are becoming one of the most serious t
...