Zobrazeno 1 - 10
of 329
pro vyhledávání: '"system of security"'
Autor:
Hossien Faraji, Reza Hemmati
Publikováno v:
IET Smart Grid, Vol 7, Iss 5, Pp 531-553 (2024)
Abstract A comprehensive model is developed for coordinated control of voltage‐frequency‐inertia and identifying multiple cyberattacks simultaneously in two microgrids (MGs). The MGs are integrated with solar units, Wind turbine (WT), hybrid supe
Externí odkaz:
https://doaj.org/article/0562397926b6495993bb04f39bdd723f
Publikováno v:
IET Smart Grid, Vol 7, Iss 5, Pp 583-592 (2024)
Abstract A novel metric that describes the vulnerability of the measurements in power systems to data integrity attacks is proposed. The new metric, coined vulnerability index (VuIx), leverages information theoretic measures to assess the attack effe
Externí odkaz:
https://doaj.org/article/18f34d986e374d1791c451188ac74bfe
Publikováno v:
IET Smart Grid, Vol 7, Iss 4, Pp 370-385 (2024)
Abstract The role of cybersecurity in cyber‐physical power systems (CPPS) is reviewed, focusing on the applications of dynamic state estimation (DSE) techniques. These DSE techniques are particularly relevant with the integration of phasor measurem
Externí odkaz:
https://doaj.org/article/b87a2c840a354b1783c07472862db07a
Publikováno v:
IET Smart Grid, Vol 7, Iss 1, Pp 13-27 (2024)
Abstract Traditional power systems have evolved into cyber‐physical power systems (CPPS) with the integration of information and communication technologies. CPPS can be considered as a typical hierarchical control system that can be divided into tw
Externí odkaz:
https://doaj.org/article/ad3dc91bc38a49149aff9fa77e50b6df
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 3, Pp 16-29 (2023)
The paper is dedicated to the problem of choosing a SIEM system for use in the Network Security Center (NSC) of the critical information infrastructure (CII) information and telecommunications system (ITCS) entities. The security information and even
Externí odkaz:
https://doaj.org/article/535812ef2150462684489c354589d9d2
Autor:
Provid Ariantoko, Pujo Widodo, Herlina Juri Risma Saragih, Panji Suwarno, Endro Legowo, Moch Yurianto
Publikováno v:
Rekayasa, Vol 16, Iss 2, Pp 171-178 (2023)
The conditions of vulnerability and potential security threats in the sea area of the southern part of Java Island and the level of ability of elements operating in the area are still inadequate both in quality and quantity. This thesis uses qualitat
Externí odkaz:
https://doaj.org/article/3a992679ec634b02bccc4eb47d94fedd
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 2, Pp 63-79 (2023)
The paper presents the conceptual framework for assessing the level of security of automated systems based on their vulnerability. The analysis of regulatory standards, methodological recommendations and regulatory documents in the field of assessmen
Externí odkaz:
https://doaj.org/article/f12b1d9a84ba4b53bc1b9adfa3e1dd40
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 4, Pp 42-52 (2022)
When building multi-level information protection both in the public and in the private sector, it is necessary to take the measures aimed at preventing threats to information security. Cyberphysical systems, as a means of communication, are actively
Externí odkaz:
https://doaj.org/article/35dfe55111b44695adb8d2a858936809
Publikováno v:
Безопасность информационных технологий, Vol 29, Iss 2, Pp 57-70 (2022)
The purpose of the paper is to identify possible approaches to assessing the effectiveness of the information security system (EISS) for a distributed data transmission system (DDTS) related to a significant object of critical information infrastruct
Externí odkaz:
https://doaj.org/article/bac9e72750be4753ad2234f51207d957
Publikováno v:
IET Smart Grid, Vol 5, Iss 3, Pp 189-202 (2022)
Abstract Attackers are able to enumerate all devices and computers within a compromised substation network. Digital relays deployed in the substation are the devices with IP addresses that can be discovered in the process of trial‐and‐error searc
Externí odkaz:
https://doaj.org/article/b2f569211be94146bf2de7b85ed0c6ef