skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis

Abstract

This paper explores a real security vulnerability and patch management dataset from an electric utility in order to shed light on characteristics of the vulnerabilities that electric utility assets have and how they are remediated in practice. Specifically, it first analyzes the distribution of vulnerabilities over software, assets, and other metric. Then it analyzes how vulnerability features affect remediate actions.

Authors:
 [1];  [1]
  1. Univ. of Arkansas, Fayetteville, AR (United States)
Publication Date:
Research Org.:
University of Arkansas
Sponsoring Org.:
USDOE Office of Electricity Delivery and Energy Reliability (OE)
OSTI Identifier:
1434513
DOE Contract Number:  
OE0000779
Resource Type:
Conference
Resource Relation:
Conference: The 1st Radical and Experiential Security Workshop (RESEC) Incheon, Korea, June, 2018
Country of Publication:
United States
Language:
English
Subject:
25 ENERGY STORAGE

Citation Formats

Li, Qinghua, and Zhang, Fengli. Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis. United States: N. p., 2018. Web.
Li, Qinghua, & Zhang, Fengli. Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis. United States.
Li, Qinghua, and Zhang, Fengli. Thu . "Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis". United States. doi:. https://www.osti.gov/servlets/purl/1434513.
@article{osti_1434513,
title = {Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis},
author = {Li, Qinghua and Zhang, Fengli},
abstractNote = {This paper explores a real security vulnerability and patch management dataset from an electric utility in order to shed light on characteristics of the vulnerabilities that electric utility assets have and how they are remediated in practice. Specifically, it first analyzes the distribution of vulnerabilities over software, assets, and other metric. Then it analyzes how vulnerability features affect remediate actions.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Thu Jan 18 00:00:00 EST 2018},
month = {Thu Jan 18 00:00:00 EST 2018}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: