[1] | Africa, https://www.hydropower.org/region-profiles/africa. |
[2] | IEA (2020), SDG7: Data and Projections, IEA, Paris https://www.iea.org/reports/sdg7-data-and-projections. |
[3] | “The National Energy Policy 2019.” Ministry of Energy Integrated Resource Plan, 21 Oct. 2021, https://www.moe.gov.zm/irp/download/the-national-energy-policy-2019-2/. |
[4] | Final Report - Moe.gov.zm. https://www.moe.gov.zm/?wpfb_dl=45. |
[5] | “Home.” Ministry of Energy Integrated Resource Plan, 1 Sept. 2021, https://www.moe.gov.zm/irp/. |
[6] | Energy Sector Report 2020 - Erb.org.zm. https://www.erb.org.zm/reports/esr2020.pdf. |
[7] | Press Statement - Erb.org.zm. https://www.erb.org.zm/press/statements/2021-11-26_PressStatement.pdf. |
[8] | Lukumba Phiri, Simon Tembo. Computer Science and Engineering, 2022 12(1), pp. 1-14 Published Online: January 21, 202210.5923/j.computer.20221201.01. |
[9] | Antonio Marino, Enrico Zio, A framework for the resilience analysis of complex natural gas pipeline networks from a cyber-physical system perspective, Computers & Industrial Engineering, Volume 162, 2021, 107727, ISSN 0360-8352, https://doi.org/10.1016/j.cie.2021.107727. |
[10] | Cho, Chi-Shiang et al. “Cyberphysical Security and Dependability Analysis of Digital Control Systems in Nuclear Power Plants.” IEEE Transactions on Systems, Man, and Cybernetics: Systems 46 (2016): 356-369. |
[11] | Nelson H. Carreras Guzman, Igor Kozine, Mary Ann Lundteigen, An integrated safety and security analysis for cyber-physical harm scenarios, Safety Science, Volume 144, 2021, 105458, ISSN 0925-7535, https://doi.org/10.1016/j.ssci.2021.105458. |
[12] | Ivo Friedberg, Kieran McLaughlin, Paul Smith, David Laverty, Sakir Sezer, STPA-SafeSec: Safety and security analysis for cyber-physical systems, Journal of Information Security and Applications, Volume 34, Part 2, 2017, Pages 183-196, ISSN 2214-2126, https://doi.org/10.1016/j.jisa.2016.05.008. |
[13] | Lu T, Guo X, Li Y, et al. Cyberphysical Security for Industrial Control Systems Based on Wireless Sensor Networks. International Journal of Distributed Sensor Networks. June 2014. doi:10.1155/2014/438350. |
[14] | Sun C-C, Liu C-C, Xie J. Cyber-Physical System Security of a Power Grid: State-of-the-Art. Electronics. 2016; 5(3):40. https://doi.org/10.3390/electronics5030040. |
[15] | Xie, Jing & Stefanov, Alexandru & Liu, Chen-Ching. (2016). Physical and cyber security in a smart grid environment. Wiley Interdisciplinary Reviews: Energy and Environment. 5. n/a-n/a. 10.1002/wene.202. |
[16] | Hawrylak, Peter J., Hale, John, Papa, Mauricio, Edgar, Thomas, Craig, Philip, Wall, Donald, and Hines, Corey. Cyber Security Analysis for Nuclear Reactor Control Systems (Final Technical Report). United States: N. p., 2020. Web. doi: 10.2172/1650024.. |
[17] | Yaacoub JA, Salman O, Noura HN, Kaaniche N, Chehab A, Malli M. Cyber-physical systems security: Limitations, issues and future trends. Microprocess Microsyst. 2020; 77: 103201. doi:10.1016/j.micpro.2020.103201. |
[18] | Uchenna D. Ani, Nneka Daniel, Francisca Oladipo & Sunday E. Adewumi (2018) Securing industrial control system environments: the missing piece, Journal of Cyber Security Technology, 2:3-4, 131-163, DOI: 10.1080/23742917.2018.1554985. |
[19] | Yeboah-Ofori, Abel & Abdulai, Jamal-Deen & Katsriku, Ferdinand. (2018). Cybercrime and Risks for Cyber-Physical Systems: A Review. 10.20944/preprints201804.0066.v1. |
[20] | Kavallieratos, Georgios & Katsikas, Sokratis & Gkioulos, Vasileios. (2019). Towards a Cyber-Physical Range. 25-34. 10.1145/3327961.3329532. |
[21] | 30 years of GreatSPN Amparore, Elvio Gilberto and Balbo, Gianfranco and Beccuti, Marco and Donatelli, Susanna and Franceschinis, Giuliana,” Principles of Performance and Reliability Modeling and Evaluation pages 227--254, 2016,. Springer. |
[22] | Automation Solutions for Hydropower Plants - Andritz. https://www.andritz.com/resource/blob/334010/ca47bd154c713b3509acc9472cd134c5/hy-automation-en-data.pdf. |
[23] | T. J. Williams, ”The Purdue enterprise reference architecture,” ComputInd, vol. 24, no. 2-3, pp. 141-158, 1994. |
[24] | ISA, ”ANSI/ISA-62443-1-1 (99.01.01)-2007 Security for Industrial Automation and Control Systems Part 1-1: Terminology, Concepts, and Models,” in Part 1-1: Terminology, Concepts, and Models, ed, 2007. |
[25] | C. E. Bodungen, B. L. Singer, A. Shbeeb, S. Hilt, and K. Wilhoit, Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions: McGraw-Hill Education, 2016. |
[26] | Macola, Ilaria Grasso, et al. “The Five Worst Cyberattacks against the Power Industry since 2014.” Power Technology, 24 Jan. 2022, http://u6.gg/k5nru. |
[27] | Desarnaud, Gabrielle. “Cyber Attacks and Energy Infrastructures: Anticipating Risks.” Afficher La Page D'accueil Du Site, http://u6.gg/k5nrg. |
[28] | Cybersecurity for Energy Delivery Systems: DOE ... - Congress. https://crsreports.congress.gov/product/pdf/R/R44939. |
[29] | Sanger, David E., and Nicole Perlroth. “U.S. Escalates Online Attacks on Russia's Power Grid.” The New York Times, The New York Times, 15 June 2019, https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html. |
[30] | “Russia Power Market Outlook to 2030, Update 2021 - Market Trends, Regulations, and Competitive Landscape.” GlobalData Report Store, 1 Feb. 2022, http://u6.gg/k5kpe. |
[31] | Offensive Cyberspace Operations: A Gray Area in ... https://www.bu.edu/ilj/files/2020/08/10.-Article_Bailey.pdf. |
[32] | “A Cyber Attack in Saudi Arabia Failed to Cause Carnage, but the next Could Be Deadly.” The Independent, Independent Digital News and Media, 21 Mar. 2018, http://u6.gg/k5kpn. |
[33] | “Ukraine Power Cut 'Was Cyber-Attack'.” BBC News, BBC, 11 Jan. 2017, https://www.bbc.com/news/technology-38573074. |
[34] | “Ukraine Power Cut 'Was Cyber-Attack'.” BBC News, BBC, 11 Jan. 2017, https://www.bbc.com/news/technology-38573074. |
[35] | A. Shahzad, S. Musa, A. Aborujilah, and M. Irfan. The SCADA review: System components, architecture, protocols, and future security trends. American Journal of Applied Sciences, 11(8): 1418–1425, 2014. |
[36] | Udara Perera. Comparisons of SCADA communication protocols for power systems, 2015. |
[37] | Muhammad Uzair. Communication methods (protocols, format & language) for the substation automation & control. |
[38] | Tom Sheldon. McGraw-Hill’s Encyclopedia of Networking and Telecommunications. McGraw-Hill Professional, 2001. |
[39] | WINGPATH software development. Modbus protocol, 2004-2017. |
[40] | RDMS. What is Modbus?, 2016. |
[41] | Krushna Chandra Mahapatra and S Magesh. Analysis of vulnerabilities in the protocols used in SCADA systems. International Journal of Advanced Research in Computer Engineering & Technology, 4(3), 2015. |
[42] | IPCOMM. Iec 60870-5-102, 2004-2017. |
[43] | “Foundation Fieldbus.” FieldComm, https://www.fieldcommgroup.org/technologies/foundation-fieldbus. Date accessed 16 February 2022. |
[44] | “Customize Your engineering360 Experience.” IEC 61850-8-2 - Communication Networks and Systems for Power Utility Automation – Part 8-2: Specific Communication Service Mapping (SCSM) – Mapping to Extensible Messaging Presence Protocol (XMPP) | Engineering 360, https://standards.globalspec.com/std/13127190/IEC%2061850-8-2. |
[45] | Robert Czechowski, Pawel Wicher, and Bernard Wiecha. Cyber security in the communication of scada systems using iec 61850. 2015 Modern Electric Power Systems (MEPS), pages 1–7, 2015. |
[46] | “IEEE Power & Energy Society.” Application Testing of IEC 61850 Based Systems (TR84), https://resourcecenter.ieee-pes.org/publications/technical-reports/PES_TP_TR84_PSRC_120720.html. |
[47] | Y. Yang, H. Q. Xu, L. Gao, Y. B. Yuan, K. McLaughlin, and S. Sezer. Multidimensional intrusion detection system for IEC 61850-based SCADA networks. IEEE Transactions on Power Delivery, 32(2):1068–1078, April 2017. |
[48] | Pallavi Sethi and Smruti R. Sarangi. Internet of things: Architectures, protocols, and applications. J. Electrical and Computer Engineering, 2017:9324035:1–9324035: 25, 2017. |
[49] | N. DeCaro B. Buta and V. Dobrota W. Colitti, K. Steenhaut. Evaluation of constrained application protocol for wireless sensor networks. 2011. |
[50] | K. Hartke Z. Shelby and C. Bormann. The constrained application protocol (coap). 2014. |
[51] | Pallavi Sethi and Smruti R. Sarangi. Mq telemetry transport (MQTT) v3. 1 protocol specification. 2010. |
[52] | F. Bause and P. S. Kritzinger, Stochastic Petri Nets: An Introduction to the Theory, 2nd ed. Braunschweig, Germany: Vieweg, 2002. |
[53] | Trivedi, Kishor S. “Probability and Statistics with Reliability, Queuing, and Computer Science Applications, 2nd Edition.” Wiley.com, 28 Nov. 2001, http://u6.gg/k5kqx. |
[54] | K. Yamashita, C.-W. Ten, Y. Rho, L. Wang, W. Wei, and A. F. Ginter, (2020) Measuring systemic risk of switching attacks based on cybersecurity technologies in substations,” IEEE Trans. Power Syst., vol. 35, no. 6, pp. 4206–4219, Nov. 2020. [Online]. Available: https://ieeexplore.ieee.org/document/9078877. |
[55] | International Electrotechnical Commission (IEC). IEC 62443-3-3: 2013 Industrial Communication Networks — Network and System Security—Part 3-3: System Security Requirements and Security Levels. Available online: https://webstore.iec.ch/publication/7033 (accessed on 2 August 2021). |
[56] | ISO/IEC. ISO/IEC 27001:2013: Information Technology Security Techniques Information Security Management Systems Requirements; ISO: Geneva, Switzerland, 2013. |
[57] | ISO/IEC. ISO/IEC 27002:2013: Information Technology — Security Techniques—Code of Practice for Information Security Controls; ISO: Geneva, Switzerland, 2013. |
[58] | National Institute of Standards and Technology (NIST). NIST SP 800-53 Rev. 5 Security and Privacy Controls for Information Systems and Organizations. Available online: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final (accessed on 3 August 2021). |
[59] | North American Electric Reliability Corporation (NERC). CIP Standards. Available online: https://www.nerc.com/pa/Stand/Pages/CIPStandards.aspx (accessed on 3 August 2021). |
[60] | “Platform Independent Petri Net Editor 2.” Platform Independent Petri Net Editor 2, http://pipe2.sourceforge.net/. |
[61] | Helerea, Elena. “Interconnections between Reliability, Maintenance and Availability.” IFIP Advances in Information and Communication Technology, 19 Aug. 2016, https://www.academia.edu/27901809/Interconnections_between_Reliability_Maintenance_and_Availability. |