security decisions to changing circumstances. Our
framework is based on a continuous cycle of
adaptive monitoring, predictive analytics and
automated adaptive decisionmaking. In our future
work, we aim to develop the adaptive monitoring
model using automated process and based on the
GEMOM Middleware. Then, we plan to develop the
predictive model that will estimate risks and the
decision-making model.
REFERENCES
Abie, H., Savola, R., and Dattani, I. (2009). Robust,
secure, self-adaptive and resilient messaging
middleware for business critical systems. In Future
Computing, Service Computation, Cognitive,
Adaptive, Content, Patterns, 2009.
COMPUTATIONWORLD ’09. Computation World:,
pages 153–160.
Barrett, M., Johnson, C., Mell, P., Quinn, S., Scarfone, K.
Stephen Quinn, K. S. M. B., and Johnson, C. (2009).
Guide to adopting and using the Security Content
Automation Protocol (SCAP). NIST Special Publ.
800-117 (Draft), U.S. National Institute of Standards
and Technology.
Baskerville, R. L. (1999). Investigating information
systems with action research. Commun. AIS, 2(3es).
Bier, V. M. and Azaiez, M. N. (2010). Game
Theoretic Risk Analysis of Security Threats. Springer.
Cox, Jr., L. A. T. (2009). Game theory and risk analysis.
Risk Analysis, 29(8):1062–1068.
DHS (2011). Enabling Distributed Security in
Cyberspace: Building a Healthy and Resilient Cyber
Ecosystem with Automated Collective Action. DHS
National Protection and Programs Directorate.
Gungor, V., Sahin, D., Kocak, T., Ergut, S., Buccella, C.,
Cecati, C., and Hancke, G. (2011). Smart grid
technologies: Communication technologies and
standards. Industrial Informatics, IEEE Transactions
on, 7(4):529–539.
Hevner, A. R., March, S. T., Park, J., and Ram, S. (2004).
Design science in information systems research. MIS
Q., 28(1):75–105.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacs¸ar, T., and
Hubaux, J.-P. (2013). Game theory meets network
security and privacy. ACM Comput. Surv.,
45(3):25:1–25:39.
Metke, A. and Ekl, R. (2010). Smart grid security
technology. In Innovative Smart Grid Technologies
(ISGT), 2010, pages 1–7.
NIST (2010a). Nist framework and roadmap for smart
grid interoperability standards, release 1.0.
NIST (2010b). The smart grid interoperability panel-
cyber security working group: Smart grid cyber
security strategy and requirements. NIST IR-7628.
Poslad, S., Hamdi, M., and Abie, H. (2013). Adaptive
security and privacy management for the internet of
things (aspi 2013). In Proceedings of the 2013 ACM
Conference on Pervasive and Ubiquitous Computing
Adjunct Publication, UbiComp ’13 Adjunct, pages
373–378, New York, NY, USA. ACM.
Ray, P. D. (2011). Interoperating grid cyber security
systems: Adaptive risk management across unified ot
and it domains. Grid-InterOp.
Riadh W. Y. Habash, V. G. and Burr, K. (2013). Risk
management framework for the power grid cyber-
physical security. British Journal of Applied Science
and Technology.
Salehie, M., Pasquale, L., Omoronyia, I., and Nuseibeh,
B. (2012). Adaptive security and privacy in smart
grids: A software engineering vision. In Software
Engineering for the Smart Grid (SE4SG), 2012
International Workshop on, pages 46–49.
Santacana, E., Rackliffe, G., Tang, L., and Feng, X.
(2010). Getting smart. Power and Energy Magazine,
IEEE, 8(2):41–48.
Sridhar, S., Govindarasu, M., and Liu, C.-C. (2012). Risk
analysis of coordinated cyber attacks on power grid.
In Control and Optimization Methods for Electric
Smart Grids. Springer New York.
Tang, F., Li, M., and Huang, J. Z. (2004). Real-time
transaction processing for autonomic grid
applications. Eng. Appl. Artif. Intell., 17(7):799–807.
ICETE2014-DoctoralConsortium
14