{"id":192086,"date":"2024-08-12T14:20:09","date_gmt":"2024-08-12T12:20:09","guid":{"rendered":"https:\/\/www.rse-web.it\/pubblicazioni\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/"},"modified":"2024-08-21T15:07:27","modified_gmt":"2024-08-21T13:07:27","slug":"evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources","status":"publish","type":"pubblicazioni","link":"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/","title":{"rendered":"Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources"},"content":{"rendered":"<p class=\"last-updated-date\">Recently updated on August 21st, 2024 at 03:07 pm<\/p>","protected":false},"excerpt":{"rendered":"<p>The innovative contribution of this work is in the introduction of security analysis to support the configuration of platforms for the detection of anomalies in digital energy infrastructures<\/p>\n","protected":false},"author":93,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"tags":[1378,1344,1316,1341,1330,1315],"targets":[],"pubblicazioni_tipologie":[773],"class_list":["post-192086","pubblicazioni","type-pubblicazioni","status-publish","hentry","tag-communication-systems-en","tag-cybersecurity-en","tag-digital-transition","tag-infrastructure","tag-security-en","tag-smart-grids-en","pubblicazioni_tipologie-isi-article-en"],"acf":{"projects":{"ID":191051,"post_author":"464","post_date":"2024-07-10 16:51:29","post_date_gmt":"2024-07-10 14:51:29","post_content":"","post_title":"Application of Information Technology, Internet of Things, Peer-to-peer, to the electrical system in order to improve security and resilience","post_excerpt":"The project develops methods, tools, demonstrators and experiments to evaluate the application potential of the latest information and communication technologies for the benefit of the electro-energy system.","post_status":"publish","comment_status":"open","ping_status":"closed","post_password":"","post_name":"application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience","to_ping":"","pinged":"","post_modified":"2024-08-09 15:59:29","post_modified_gmt":"2024-08-09 13:59:29","post_content_filtered":"","post_parent":0,"guid":"https:\/\/www.rse-web.it\/progetti\/application-of-information-technology-internet-of-things-peer-to-peer-to-the-electrical-system-in-order-to-improve-security-and-resilience\/","menu_order":0,"post_type":"progetti","post_mime_type":"","comment_count":"0","filter":"raw"},"order_posts":"","dont_show_search":false,"related_posts":false,"dont_show_hompage":false,"show_on_slider":false,"single_post_data":{"titolo_spot":"","post_content":"<p>This work proposes an approach based on dynamic Bayesian networks to support the analysis of the cybersecurity of controllers in distributed energy plants. We built a system model that exploits real-world information coming from the information and operational technologies used in energy infrastructure and used it to demonstrate the value of security tests for predictive analytics and temporal diagnostics. The innovative contribution of this work is in the methodological ability to capture the causal and temporal dependencies involved in the assessment of security threats and in the introduction of security analysis to support the configuration of platforms for detecting anomalies in digital energy infrastructures.<\/p>\n","scarica_file":false,"link_estreno":[{"link_text":"Download ISI Article","link":"https:\/\/www.mdpi.com\/2076-3417\/10\/14\/4725"}],"button":{"text":"","link":""},"referente_group":false,"data_emissione":"2020-07-09","autori":"D. Cerotti, D. Codetta-Raiteri, L. Egidi, G. Franceschinis, L. Portinale (Universit\u00e0 del Piemonte Orientale), G. Dondossola, R. Terruggia (RSE S.p.A.)","destinazione":"MDPI Applied Sciences, Vol.10, Issue 14, July 9, 2020 ","rif_rse":"20008905"},"satellite_post_url":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources - RSE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources - RSE\" \/>\n<meta property=\"og:description\" content=\"The innovative contribution of this work is in the introduction of security analysis to support the configuration of platforms for the detection of anomalies in digital energy infrastructures\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"RSE\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-21T13:07:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/\",\"url\":\"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/\",\"name\":\"Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources - RSE\",\"isPartOf\":{\"@id\":\"https:\/\/www.rse-web.it\/#website\"},\"datePublished\":\"2024-08-12T12:20:09+00:00\",\"dateModified\":\"2024-08-21T13:07:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rse-web.it\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rse-web.it\/#website\",\"url\":\"https:\/\/www.rse-web.it\/\",\"name\":\"RSE\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.rse-web.it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rse-web.it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rse-web.it\/#organization\",\"name\":\"RSE\",\"url\":\"https:\/\/www.rse-web.it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"contentUrl\":\"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png\",\"width\":734,\"height\":164,\"caption\":\"RSE\"},\"image\":{\"@id\":\"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources - RSE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/","og_locale":"en_US","og_type":"article","og_title":"Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources - RSE","og_description":"The innovative contribution of this work is in the introduction of security analysis to support the configuration of platforms for the detection of anomalies in digital energy infrastructures","og_url":"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/","og_site_name":"RSE","article_modified_time":"2024-08-21T13:07:27+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/","url":"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/","name":"Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources - RSE","isPartOf":{"@id":"https:\/\/www.rse-web.it\/#website"},"datePublished":"2024-08-12T12:20:09+00:00","dateModified":"2024-08-21T13:07:27+00:00","breadcrumb":{"@id":"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rse-web.it\/en\/publications\/evidence-based-analysis-of-cyber-attacks-to-security-monitored-distributed-energy-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rse-web.it\/en\/"},{"@type":"ListItem","position":2,"name":"Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources"}]},{"@type":"WebSite","@id":"https:\/\/www.rse-web.it\/#website","url":"https:\/\/www.rse-web.it\/","name":"RSE","description":"","publisher":{"@id":"https:\/\/www.rse-web.it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rse-web.it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rse-web.it\/#organization","name":"RSE","url":"https:\/\/www.rse-web.it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/","url":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","contentUrl":"https:\/\/www.rse-web.it\/wp-content\/uploads\/2024\/01\/cropped-logo_rse_2022.png","width":734,"height":164,"caption":"RSE"},"image":{"@id":"https:\/\/www.rse-web.it\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni\/192086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni"}],"about":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/types\/pubblicazioni"}],"author":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/comments?post=192086"}],"version-history":[{"count":1,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni\/192086\/revisions"}],"predecessor-version":[{"id":192221,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni\/192086\/revisions\/192221"}],"wp:attachment":[{"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/media?parent=192086"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/tags?post=192086"},{"taxonomy":"targets","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/targets?post=192086"},{"taxonomy":"pubblicazioni_tipologie","embeddable":true,"href":"https:\/\/www.rse-web.it\/en\/wp-json\/wp\/v2\/pubblicazioni_tipologie?post=192086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}