Skip to main content

Showing 1–3 of 3 results for author: Ten, C

Searching in archive eess. Search in all archives.
.
  1. A Novel Mutual Insurance Model for Hedging Against Cyber Risks in Power Systems Deploying Smart Technologies

    Authors: Pikkin Lau, Lingfeng Wang, Wei Wei, Zhaoxi Liu, Chee-Wooi Ten

    Abstract: In this paper, a novel cyber-insurance model design is proposed based on system risk evaluation with smart technology applications. The cyber insurance policy for power systems is tailored via cyber risk modeling, reliability impact analysis, and insurance premium calculation. A stochastic Epidemic Network Model is developed to evaluate the cyber risk by propagating cyberattacks among graphical vu… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

    Comments: Power system reliability, cyber-insurance, power system security, cyber-physical systems, cyber risk modeling, actuarial design, tail risk

    Journal ref: in IEEE Transactions on Power Systems, vol. 38, no. 1, pp. 630-642, Jan. 2023

  2. arXiv:1801.08408  [pdf, ps, other

    eess.SP

    Cyber-Induced Risk Modeling for Microprocessor-Based Relays in Substations

    Authors: Zhiyuan Yang, Chee-Wooi Ten

    Abstract: Once critical substations are compromised, attack agents can coordinate among their peers to plot for maximizing disruption using local control devices. For defenders, it is critical to enumerate and identify all digital relays to determine the systemic risks. Any combination of disruptive switching via the compromised relays can result in misoperation or immediate effect to the system. The result… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.

    Comments: 6 pages

  3. Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

    Authors: Chee-Wooi Ten, Koji Yamashita, Zhiyuan Yang, Athanasios V. Vasilakos, Andrew Ginter

    Abstract: The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks is to execute a series of disruptive switching executions on multiple substations using compromised supervisory control and data acquisition (SCADA… ▽ More

    Submitted 3 January, 2018; originally announced January 2018.