As vulnerabilidades do SEE - A cyber segurança
Mestrado Integrado em Engenharia Electrotécnica e Computadores
Bibliografia
[1] REN, "CARACTERIZAÇÃO DA REDE NACIONAL DE TRANSPORTE PARA EFEITOS DE ACESSO À REDE," ed, 2014.
[2] E. distribuição, "Ordem dos Engenheiros–Região Centro
Ciclo Sessões técnicas," in Evolução QS da rede de distribuição MT em Portugal continental e próximos desafios, ed, 2012.
[3] ENTSO-E. (2010). ENTSO-E releases its Annual Report 2010: Towards a transmission system for 2020 and beyond Available: https://www.entsoe.eu/news-events/announcements/announcements-archive/Pages/News/entso-e-releases-its-annual-report-2010-towards-a-transmission-system-for-2020-and-beyond.aspx
[4] R. international, "National Programme for Turkey 2010 under the Instrument for Pre-Accession Assistance " in Technical Assistance for Harmonisation of TransmissionCode in line with ENTSO-E, ed, 2014, pp. 1-30.
[5] E. COMMISSION. (2015). ENERGY UNION PACKAGE. Available: http://ec.europa.eu/priorities/energy-union/docs/interconnectors_en.pdf
[6] R. E. D. ESPAÑA. (2012, Electricity interconnections: a step forward towards a single integrated European energy market. 1-20. Available: http://www.ree.es/sites/default/files/electricity_interconnections_eng_2.pdf
[7] REE. (2015). Strengthening interconnections. Available: http://www.ree.es/en/red21/strengthening-interconnections
[8] EDP. (2009). O Sistema Eléctrico Nacional. Available: https://www.edp.pt/pt/aedp/sectordeenergia/sistemaelectricoportugues/Pages/SistElectNacional.aspx
[9] ERSE. (2015). Distribuição Available: http://www.erse.pt/pt/electricidade/actividadesdosector/distribuicao/Paginas/default.aspx
[10] J. Lopes, "Supervisão e Controlo de Sistemas Eléctricos ", ed. FEUP.
[11] S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-Physical System Security for the Electric Power Grid," Proceedings of the IEEE, vol. 100, pp. 210-224, 2012.
[12] E. Chikuni and M. Dondo, "Investigating the security of electrical power systems SCADA," in AFRICON 2007, 2007, pp. 1-7.
[13] G. Clarke and D. Reynders, Modern SCADA Protocols: Newnes, 2004.
[14] D. Bailey and E. Wright, Practical SCADA for Industry: Newnes, 2003.
[15] I. Triangle MicroWorks. DNP3 Overview. Available: (http://trianglemicroworks.com/docs/default-source/referenced-documents/DNP3_Overview.pdf):
[16] Multitrode, "PROTOCOL Translator DNP3 User Manual."
[17] Wikipedia. (Maio). IEC 60870-5 Available: https://en.wikipedia.org/wiki/IEC_60870-5
[18] D. Bailey and E. Wright, Practical SCADA for Industry: Newnes, 2003.
[19] NIST. (Maio). NIST Framework and Roadmap for Smart Grid Interoperability Standards Release 1.0 (Draft) Available: http://www.nist.gov/public_affairs/releases/upload/smartgrid_interoperability.pdf
[20] A. Suspiro. (2014, Maio). Relatório de Bruxelas responsabiliza fraude por derrapagem no défice da eletricidade. Available: http://observador.pt/2014/12/22/relatorio-de-bruxelas-responsabiliza-fraude-por-derrapagem-no-defice-da-eletricidade
[21] R. Moleiro. (2013, Maio). Roubados 90 milhões de euros em eletricidade. Available: http://expresso.sapo.pt/sociedade/roubados-90-milhoes-de-euros-em-eletricidade=f844983
[22] ANEEL. (Maio). Power Theft in Brazil. Available: http://www.aneel.gov.br/
[23] E. Commission. (Maio). The 2020 climate and energy package. Available: http://ec.europa.eu/clima/policies/package/index_en.htm
[24] GBC. (Maio). The Global Carbon Project. Available: http://www.globalcarbonproject.org/
[25] IEA. (2012, Maio). World CO2 emissions by sector in 2012 Available: https://www.iea.org/publications/freepublications/publication/CO2EmissionsFromFuelCombustionHighlights2014.pdf
[26] M. Stogsdill. (2011, Maio). Deploying Public, Private, and Hybrid Storage Clouds. Available: http://www.snia.org/sites/default/education/tutorials/2011/fall/CloudTechnologies/MartyStogsdill_Deploying_Public_Private_Hybrid_Storage-v1-8.pdf
[27] ModernTech. (Maio). Datacenter - Cloud Computing. Available: http://www.moderntech.com.hk/en/solution/103
[28] T. Lee. (2013, Maio). Here’s everything we know about PRISM to date. Available: http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/12/heres-everything-we-know-about-prism-to-date
[29] K. Hill. (Maio). When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet. Available: http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/
[30] D. Crowley, J. Savage, and D. Bryan, "Home Invasion v2.0," ed: blackhat USA 2013.
[31] T. Holwerda. (2013, Maio). The second operating system hiding in every mobile phone. Available: http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone
[32] Spiegel. (2013, Maio). Privacy Scandal: NSA Can Spy on Smart Phone. Available: http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html
[33] S. Lee and S. Kim, in HACKING, SURVEILLING, AND DECEIVING VICTIMS ON SMART TV, ed: Korea University.
[34] P. Bocij, The Dark Side of the Internet: Protecting Yourself and Your Family From Online Criminals: Praeger, 2006.
[35] S. Gorman, "Electricity Grid in U.S. Penetrated By Spies," The Wall Street Journal, 2009.
[36] K. Zetter, "Blockbuster Worm Aimed for Infrastructure, But No Proof Iran Nukes Were Target," Wired, 2010.
[37] R. Langner, "To Kill a Centrifuge," The Langner Group2013.
[38] N. Falliere, L. Murchu, and E. Chien, "Symantec Security Response," Symantec Corporation2011.
[39] McAfee. (2011). Global Energy Cyberattacks:“Night Dragon”. Available: http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf
[40] S. Corporation. (2014). Advanced Persistent Threats: How They Work. Available: https://www.symantec.com/theme.jsp?themeid=apt-infographic-1
[41] T. Zoller, "The Rise of Vulnerability Markets - History, Impacts, Mitigations," Verizon2011.
[42] B. Wingfield, "Power-Grid Cyber Attack Seen Leaving Millions in Dark for Months," BloomberBusiness, 2012.
[43] M. Riley and A. Vance, "Cyber Weapons: The New Arms Race," BloomberBusiness, 2011.
[44] R. Lemos. (2012). Private market growing for zero-day exploits and vulnerabilities. Available: http://searchsecurity.techtarget.com/feature/Private-market-growing-for-zero-day-exploits-and-vulnerabilities