top of page

Bibliografia

[1]        REN, "CARACTERIZAÇÃO DA REDE NACIONAL DE TRANSPORTE PARA EFEITOS DE ACESSO À REDE," ed, 2014.

[2]        E. distribuição, "Ordem dos Engenheiros–Região Centro

Ciclo Sessões técnicas," in Evolução QS da rede de distribuição MT em Portugal continental e próximos desafios, ed, 2012.

[3]        ENTSO-E. (2010). ENTSO-E releases its Annual Report 2010: Towards a transmission system for 2020 and beyond Available: https://www.entsoe.eu/news-events/announcements/announcements-archive/Pages/News/entso-e-releases-its-annual-report-2010-towards-a-transmission-system-for-2020-and-beyond.aspx

[4]        R. international, "National Programme for Turkey 2010 under the Instrument for Pre-Accession Assistance " in Technical Assistance for Harmonisation of TransmissionCode in line with ENTSO-E, ed, 2014, pp. 1-30.

[5]        E. COMMISSION. (2015). ENERGY UNION PACKAGE. Available: http://ec.europa.eu/priorities/energy-union/docs/interconnectors_en.pdf

[6]        R. E. D. ESPAÑA. (2012, Electricity interconnections: a step forward towards a single integrated European energy market. 1-20. Available: http://www.ree.es/sites/default/files/electricity_interconnections_eng_2.pdf

[7]        REE. (2015). Strengthening interconnections. Available: http://www.ree.es/en/red21/strengthening-interconnections

[8]        EDP. (2009). O Sistema Eléctrico Nacional. Available: https://www.edp.pt/pt/aedp/sectordeenergia/sistemaelectricoportugues/Pages/SistElectNacional.aspx

[9]        ERSE. (2015). Distribuição  Available: http://www.erse.pt/pt/electricidade/actividadesdosector/distribuicao/Paginas/default.aspx

[10]      J. Lopes, "Supervisão e Controlo de Sistemas Eléctricos ", ed. FEUP.

[11]       S. Sridhar, A. Hahn, and M. Govindarasu, "Cyber-Physical System Security for the Electric Power Grid," Proceedings of the IEEE, vol. 100, pp. 210-224, 2012.

[12]      E. Chikuni and M. Dondo, "Investigating the security of electrical power systems SCADA," in AFRICON 2007, 2007, pp. 1-7.

[13]      G. Clarke and D. Reynders, Modern SCADA Protocols: Newnes, 2004.

[14]      D. Bailey and E. Wright, Practical SCADA for Industry: Newnes, 2003.

[15]      I. Triangle MicroWorks. DNP3 Overview. Available: (http://trianglemicroworks.com/docs/default-source/referenced-documents/DNP3_Overview.pdf):

[16]      Multitrode, "PROTOCOL Translator  DNP3 User Manual."

[17]      Wikipedia. (Maio). IEC 60870-5 Available: https://en.wikipedia.org/wiki/IEC_60870-5

[18]      D. Bailey and E. Wright, Practical SCADA for Industry: Newnes, 2003.

[19]      NIST. (Maio). NIST Framework and Roadmap for  Smart Grid Interoperability Standards  Release 1.0 (Draft) Available: http://www.nist.gov/public_affairs/releases/upload/smartgrid_interoperability.pdf

[20]      A. Suspiro. (2014, Maio). Relatório de Bruxelas responsabiliza fraude por derrapagem no défice da eletricidade. Available: http://observador.pt/2014/12/22/relatorio-de-bruxelas-responsabiliza-fraude-por-derrapagem-no-defice-da-eletricidade

[21]      R. Moleiro. (2013, Maio). Roubados 90 milhões de euros em eletricidade. Available: http://expresso.sapo.pt/sociedade/roubados-90-milhoes-de-euros-em-eletricidade=f844983

[22]      ANEEL. (Maio). Power Theft in Brazil. Available: http://www.aneel.gov.br/

[23]      E. Commission. (Maio). The 2020 climate and energy package. Available: http://ec.europa.eu/clima/policies/package/index_en.htm

[24]      GBC. (Maio). The Global Carbon Project. Available: http://www.globalcarbonproject.org/

[25]      IEA. (2012, Maio). World CO2 emissions by sector in 2012 Available: https://www.iea.org/publications/freepublications/publication/CO2EmissionsFromFuelCombustionHighlights2014.pdf

[26]      M. Stogsdill. (2011, Maio). Deploying Public, Private, and Hybrid Storage Clouds. Available: http://www.snia.org/sites/default/education/tutorials/2011/fall/CloudTechnologies/MartyStogsdill_Deploying_Public_Private_Hybrid_Storage-v1-8.pdf

[27]      ModernTech. (Maio). Datacenter - Cloud Computing. Available: http://www.moderntech.com.hk/en/solution/103

[28]      T. Lee. (2013, Maio). Here’s everything we know about PRISM to date. Available: http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/12/heres-everything-we-know-about-prism-to-date

[29]      K. Hill. (Maio). When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet. Available: http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/

[30]      D. Crowley, J. Savage, and D. Bryan, "Home Invasion v2.0," ed: blackhat USA 2013.

[31]      T. Holwerda. (2013, Maio). The second operating system hiding in every mobile phone. Available: http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone

[32]      Spiegel. (2013, Maio). Privacy Scandal: NSA Can Spy on Smart Phone. Available: http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html

[33]      S. Lee and S. Kim, in HACKING, SURVEILLING, AND DECEIVING VICTIMS ON SMART TV, ed: Korea University.

[34]      P. Bocij, The Dark Side of the Internet: Protecting Yourself and Your Family From Online Criminals: Praeger, 2006.

[35]      S. Gorman, "Electricity Grid in U.S. Penetrated By Spies," The Wall Street Journal, 2009.

[36]      K. Zetter, "Blockbuster Worm Aimed for Infrastructure, But No Proof Iran Nukes Were Target," Wired, 2010.

[37]      R. Langner, "To Kill a Centrifuge," The Langner Group2013.

[38]      N. Falliere, L. Murchu, and E. Chien, "Symantec Security Response," Symantec Corporation2011.

[39]      McAfee. (2011). Global Energy Cyberattacks:“Night Dragon”. Available: http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf

[40]      S. Corporation. (2014). Advanced Persistent Threats: How They Work. Available: https://www.symantec.com/theme.jsp?themeid=apt-infographic-1

[41]      T. Zoller, "The Rise of Vulnerability Markets - History, Impacts, Mitigations," Verizon2011.

[42]      B. Wingfield, "Power-Grid Cyber Attack Seen Leaving Millions in Dark for Months," BloomberBusiness, 2012.

[43]      M. Riley and A. Vance, "Cyber Weapons: The New Arms Race," BloomberBusiness, 2011.

[44]      R. Lemos. (2012). Private market growing for zero-day exploits and vulnerabilities. Available: http://searchsecurity.techtarget.com/feature/Private-market-growing-for-zero-day-exploits-and-vulnerabilities

bottom of page