1. [1] J. Wang, F. Yang, T. Chen, and S. L. Shah, "An overview of industrial alarm systems: main causes for alarm overloading, research status, and open problems," IEEE Transactions on Automation Science and Engineering, vol. 13, pp. 1045-1061, 2016. [
DOI:10.1109/TASE.2015.2464234]
2. [2] D. Li, J. Hu, H. Wang, and W. Huang, "A distributed parallel alarm management strategy for alarm reduction in chemical plants," Journal of Process Control, vol. 34, pp. 117-125, 2015. [
DOI:10.1016/j.jprocont.2015.07.008]
3. [3] Y. Wu, M. Kezunovic, and T. Kostic, "An advanced alarm processor using two-level processing structure," in Power Tech, 2007 IEEE Lausanne, 2007, pp. 125-130. [
DOI:10.1109/PCT.2007.4538304]
4. [4] P. Mahmoudi-Nasr and A. Yazdian-Varjani, "An Access Management System to Mitigate Operational Threats in SCADA System", JSDP, vol. 14 (4), pp. 3-18, 2018. [
DOI:10.29252/jsdp.14.4.3]
5. [5] P. Mahmoudi-Nasr and A. Yazdian-Varjani, "Toward Operator Access Management in SCADA System: Deontological Threat Mitigation," IEEE Transactions on Industrial Informatics, vol. 14, pp. 3314-3324, 2018.
6. [6] P. T. Bullemer, M. Tolsma, D. Reising, and J. Laberge, "Towards improving operator alarm flood responses: alternative alarm presentation techniques," Abnormal Situation Management Consortium, 2011.
7. [7] S. Charbonnier, N. Bouchair, and P. Gayet, "Fault template extraction to assist operators during industrial alarm floods," Engineering Applications of Artificial Intelligence, vol. 50, pp. 32-44, 2016. [
DOI:10.1016/j.engappai.2015.12.007]
8. [8] R. R. R. Barbosa, R. Sadre, and A. Pras, "Exploiting traffic periodicity in industrial control networks," International journal of critical infrastructure protection, vol. 13, pp. 52-62, 2016. [
DOI:10.1016/j.ijcip.2016.02.004]
9. [9] M. Kezunovic and Y. Guan, "Intelligent alarm processing: From data intensive to information rich," in System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on, 2009, pp. 1-8.
10. [10] S. Khanmohammadi, K. Rezaie, J. Jassbi, and S. Tadayon, "A model of the failure detection based on fuzzy inference system for the control center of a power system," Appl. Math. Sci, vol. 6, pp. 1747-1758, 2012.
11. [11] V. Calderaro, C. N. Hadjicostis, A. Piccolo, and P. Siano, "Failure identification in smart grids based on petri net modeling," IEEE Transactions on Industrial Electronics, vol. 58, pp. 4613-4623, 2011. [
DOI:10.1109/TIE.2011.2109335]
12. [12] Y. Guan and M. Kezunovic, "Contingency-based nodal market operation using intelligent economic alarm processor," IEEE Transactions on Smart Grid, vol. 4, pp. 540-548, 2013. [
DOI:10.1109/TSG.2012.2223722]
13. [13] D. Hadžiosmanović, D. Bolzoni, and P. H. Hartel, "A log mining approach for process monitoring in SCADA," International Journal of Information Security, pp. 1-21, 2012.
14. [14] Niroo Research Institue, "Substation automation systems standard (transmission and subtransmission substations), Ministry of Energy of Iran, 2008.
15. [15] T. M. Chen, J. C. Sanchez-Aarnoutse, and J. Buford, "Petri net modeling of cyber-physical attacks on smart grid," IEEE Transactions on Smart Grid, vol. 2, pp. 741-749, 2011. [
DOI:10.1109/TSG.2011.2160000]
16. [16] C. Fecarotti, J. Andrews, and R. Remenyte-Prescott, "Analysis of the Design, Operation and Maintenance Options to Provide a Fault Tolerant Railway System," in Transport Research Arena (TRA) 5th Conference: Transport Solutions from Research to Deployment, 2014. [
DOI:10.1201/b15938-448]
17. [17] D. C. Montgomery, Introduction to statistical quality control: John Wiley & Sons (New York), 2009.
18. [18] X. Dong, K. Hopkinson, X. Tong, X. Wang, and J. Thorp, "IP-based communication systems for wide-area frequency stability predictive control," in Critical Infrastructure (CRIS), 2010 5th International Conference on, 2010, pp. 1-7. [
DOI:10.1109/CRIS.2010.5617555] [
PMCID]
19. [19] J. Zhao, Y. Xu, F. Luo, Z. Dong, and Y. Peng, "Power system fault diagnosis based on history driven differential evolution and stochastic time domain simulation," Information Sciences, vol. 275, pp. 13-29, 2014. [
DOI:10.1016/j.ins.2014.02.039]
20. [20] V. Rodrigo, M. Chioua, T. Hagglund, and M. Hollender, "Causal analysis for alarm flood reduction," IFAC-PapersOnLine, vol. 49, pp. 723-728, 2016. [
DOI:10.1016/j.ifacol.2016.07.269]
21. [21] (2017). http://CPNTools.org