• 1
    Kluza J. Status of grid-scale energy storage and strategies for accelerating cost-effective deployment. PhD Thesis, MIT 2009.
  • 2
    Ericsson GN. Cyber security and power system communication—essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery 2010; 25(3):15011507.
  • 3
    Wei D, Lu Y, Jafari M, Skare PM, Rohde K. Protecting smart grid automation systems against cyberattacks. IEEE Transactions on Smart Grid 2011; 2(4):782795.
  • 4
    Datta Ray P, Harnoor R, Hentea M. Smart power grid security: a unified risk management approach. IEEE International Carnahan Conference on Security Technology (ICCST), 2010; 276–285.
  • 5
    Khan H, Xu Z, Iu H, Sreeram V. Review of technologies and implementation strategies in the area of smart grid. Australasian Universities Power Engineering Conference (AUPEC), 2009; 1–6.
  • 6
    ISO/IEC 27000:2009 Information security management systems—overview and vocabulary 2009.
  • 7
    Idsø ES, Jakobsen ØM. Objekt- og informasjonssikkerhet: metode for risiko- og sårbarhetsanalyse (in Norwegian). Technical Report, Norges Teknisk-Naturvitenskapelige Universitet (NTNU) 2000.
  • 8
    Line MB, Nordland O, Røstad L, Tøndel IA. Safety vs security? Eighth International Conference on Probabilistic Safety Assessment and Management (PSAM), Stamatelatos M, Blackman H (eds). ASME Press: New York, 2006.
  • 9
    Avizienis A, Laprie JC, Randell B, Landwehr C. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 2004; 1(1):1133.
  • 10
    NIST. 800-61: Computer Security Incident Handling Guide 2008.
  • 11
    NIST. Guide to Industrial Control Systems (ICS) Security 2011.
  • 12
    NIST. 7628-1: Guidelines for Smart Grid Cyber Security 2010.
  • 13
    NIST. 7628-2: Guidelines for Smart Grid Cyber Security 2010.
  • 14
    NIST. 7628-3: Guidelines for Smart Grid Cyber Security 2010.
  • 15
    nCircle, EnergySec. 2012 Smart Grid Cyber Security Survey. Technical Report, nCircle 2012. URL
  • 16
    Wei D, Lu Y, Jafari M, Skare P, Rohde K. An integrated security system of protecting smart grid against cyber attacks. IEEE Innovative Smart Grid Technologies (ISGT) 2010, 2010; 1–7, doi:10.1109/ISGT.2010.5434767.
  • 17
    Rativa LCT. Risk assessment for power system security with regard to intentional events. PhD Thesis, Institut Polytechnique de Grenoble 2008.
  • 18
    Fabro M, Roxey T, Assante M. No grid left behind. IEEE Security & Privacy 2010; 8(1):7276.
  • 19
    Jaatun MG, Albrechtsen E, Line MB, Tøndel IA, Longva OH. A framework for incident response management in the petroleum industry. International Journal of Critical Infrastructure Protection 2009; 2:2637.
  • 20
    Govindarasu M, Hahn A. What the power industry has to learn about cyber vulnerability disclosure. IEEE Smart Grid Newsletter January 2012. URL
  • 21
    Shepherd SA. Vulnerability disclosure. Technical Report, SANS 2003.
  • 22
    Line MB, Johansen GI, Sæle H. Risikovurdering av AMS. Kartlegging av informasjonssikkerhetsmessige sårbarheter i AMS. (In Norwegian). Technical Report, SINTEF 2012.
  • 23
    Kjølle GH, Utne IB, Gjerde O. Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies. Reliability Engineering and System Safety 2012; doi:10.1016/j.ress.2012.02.006. URL 0021X.
  • 24
    Swiderski F, Snyder W. Threat Modeling. Microsoft Press: Redmond, Washington, 2004.
  • 25
    ISO/IEC 27004:2009 Information technology—Security techniques—Information security management—Measurement 2009.
  • 26
    ISO/IEC 27001:2005 Information security management systems—Requirements 2005.
  • 27
    Hahn A, Govindarasu M. Smart grid cybersecurity exposure analysis and evaluation framework. IEEE Power and Energy Society General Meeting, 2010; 1–6.
  • 28
    Ten CW, Liu CC, Manimaran G. Vulnerability assessment of cybersecurity for SCADA systems. IEEE Transactions on Power Systems, Nov 2008; 23(4): 18361846, doi:10.1109/TPWRS.2008.2002298.
  • 29
    Ten CW, Manimaran G, Liu CC. Cybersecurity for critical infrastructures: attack and defense modeling. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 2010; 40(4):853865. doi:10.1109/TSMCA.2010.2048028.
  • 30
    Negrete-Pincetic M, Yoshida F, Gross G. Towards quantifying the impacts of cyber attacks in the competitive electricity market environment. IEEE PowerTech Bucharest, 2009; 1–8.
  • 31
    Lisovich MA, Mulligan DK, Wicker SB. Inferring personal information from demand-response systems. IEEE Security and Privacy 2010; 8(1):1120.
  • 32
    Hart G. Residential energy monitoring and computerized surveillance via utility power flows. Technology and Society Magazine, IEEE 1989; 8(2):1216. doi:10.1109/44.31557.
  • 33
    Drenker S, Kader A. Nonintrusive monitoring of electric loads. Computer Applications in Power, IEEE 1999; 12(4):4751. doi:10.1109/67.795138.
  • 34
    Efthymiou C, Kalogridis G. Smart grid privacy via anonymization of smart metering data. First IEEE International Conference on Smart Grid Communications (SmartGridComm), 2010; 238–243, doi:10.1109/SMARTGRID.2010.5622050.
  • 35
    Simo Fhom H, Kuntze N, Rudolph C, Cupelli M, Liu J, Monti A. A user-centric privacy manager for future energy systems. International Conference on Power System Technology (POWERCON), 2010; 1–7, doi:10.1109/POWERCON.2010.5666447.
  • 36
    The European Commission Recommendation on preparations for the roll-out of smart metering systems (2012/148/EU) 2012.
  • 37
    Task Force Smart Grids Expert Group 2: Regulatory recommendations for data safety, data handling and data protection 2011.
  • 38
    LOV-2000-04-14-31 Lov om behandling av personopplysninger (personopplysningsloven) (in Norwegian), Ministry of Justice and Public Security 2000.
  • 39
    The Norwegian Data Inspectorate: guide for processing of personal data in connection with automatic metering systems within the energy sector 2011.
  • 40
    ASAP-SG. Security profile for advanced metering infrastructure 2010.
  • 41
    Roadmap to secure control systems in the energy sector 2006.
  • 42
    Boroomand F, Fereidunian A, Zamani M, et al. Cyber security for smart grid: a human-automation interaction framework. Innovative Smart Grid Technologies Conference Europe (ISGT Europe), 2010 IEEE PES, 2010; 1–6, doi:10.1109/ISGTEUROPE.2010.5638949.
  • 43
    ISO/IEC 27035:2011 Information technology—Security techniques—Information security incident management 2011.
  • 44
    Metzger S, Hommel W, Reiser H. Integrated security incident management—concepts and real-world experiences. Sixth International Conference on IT Security Incident Management and IT Forensics (IMF), 2011; 107–121.
  • 45
    Hennin S. Control system cyber incident reporting protocol. IEEE Conference on Technologies for Homeland Security, 2008; 463–468.
  • 46
    Falliere N, Murchu LO, Chien E. W32.Stuxnet Dossier. Technical Report, Symantec February 2011.
  • 47
    Albright D, Brannan P, Walrond C. Did Stuxnet take out 1000 centrifuges at the Natanz enrichment plant? Technical Report, Institute for Science and International Security (ISIS) 2010.
  • 48
    Albright D, Brannan P, Walrond C. Stuxnet Malware and Natanz: update of ISIS December 22, 2010 Report. Technical Report, Institute for Science and International Security (ISIS) 2011.
  • 49
    Sanger DE. Obama order sped up wave of cyberattacks against Iran 2012. URL red-wave-of-cyberattacks-against-iran.html?_r = 1
  • 50
    Global energy cyberattacks: “Night Dragon”. Technical Report, McAfee 2011.
  • 51
    Johansen PA. Stjeler kontrakter, tegninger, passord og hemmelige data (in Norwegian) 2011. URL
  • 52
  • 53
    Plikk N. Massivt cyberangrep pågår i Midtøsten (in Norwegian) 2012. URL
  • 54
    Greenberg A. New research shows Flame malware was almost certainly a U.S. or Israeli creation 2012. URL