Academic literature on the topic 'Power System Cyber Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Power System Cyber Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Power System Cyber Security"
Oyewole, Peju Adesina, and Dilan Jayaweera. "Power System Security With Cyber-Physical Power System Operation." IEEE Access 8 (2020): 179970–82. http://dx.doi.org/10.1109/access.2020.3028222.
Full textRahul Kumar Jha, Sumina Neupane, and Roshan Raj Bhatt. "A Comprehensive Approach to Securing Power Converters: Cyber-Physical Integration." December 2023 2, no. 2 (December 2023): 256–87. http://dx.doi.org/10.36548/rrrj.2023.2.003.
Full textEdhi Harianto, Rahmat, Bintoro Aji, and M. Rifqi Harahap. "Rekomendasi Teknis Antar Muka Aspek Keselamatan dan Keamanan Sistem Instrumentasi dan Kendali PLTN di Indonesia." Jurnal Pengawasan Tenaga Nuklir 3, no. 1 (July 30, 2023): 10–16. http://dx.doi.org/10.53862/jupeten.v3i1.002.
Full textJaysawal, Anoop. "Cyber Security in Smart Grid System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.
Full textLiu, Chen-Ching, Juan C. Bedoya, Nitasha Sahani, Alexandru Stefanov, Jennifer Appiah-Kubi, Chih-Che Sun, Jin Young Lee, and Ruoxi Zhu. "Cyber–Physical System Security of Distribution Systems." Foundations and Trends® in Electric Energy Systems 4, no. 4 (2021): 346–410. http://dx.doi.org/10.1561/3100000026.
Full textSingh, Arunabh. "Cyber Security Frameworks." International Journal for Research in Applied Science and Engineering Technology 10, no. 1 (January 31, 2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.
Full textSridhar, Siddharth, Adam Hahn, and Manimaran Govindarasu. "Cyber–Physical System Security for the Electric Power Grid." Proceedings of the IEEE 100, no. 1 (January 2012): 210–24. http://dx.doi.org/10.1109/jproc.2011.2165269.
Full textAl-Gburi, Qusay A., and Mohd Aifaa Mohd Ariff. "Dynamic Security Assessment for Power System Under Cyber-Attack." Journal of Electrical Engineering & Technology 14, no. 2 (January 15, 2019): 549–59. http://dx.doi.org/10.1007/s42835-019-00084-2.
Full textMohan, Athira M., Nader Meskin, and Hasan Mehrjerdi. "A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems." Energies 13, no. 15 (July 28, 2020): 3860. http://dx.doi.org/10.3390/en13153860.
Full textWadhawan, Yatin, Anas AlMajali, and Clifford Neuman. "A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks." Electronics 7, no. 10 (October 13, 2018): 249. http://dx.doi.org/10.3390/electronics7100249.
Full textDissertations / Theses on the topic "Power System Cyber Security"
Sridharan, Venkatraman. "Cyber security in power systems." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.
Full textGiannini, Martina. "Improving Cyber-Security of Power System State Estimators." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.
Full textYoussef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.
Full textWang, Zhuoyang. "Application of Complex Network Theory in Power System Security Assessment." Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/17367.
Full textVuković, Ognjen, and György Dán. "On the Security of Distributed Power System State Estimation under Targeted Attacks." KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122442.
Full textQC 20130522
Vuković, Ognjen. "Data Integrity and Availability in Power System Communication Infrastructures." Licentiate thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122447.
Full textQC 20130522
El, Hariri Mohamad. "Secure Control and Operation of Energy Cyber-Physical Systems Through Intelligent Agents." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3854.
Full textWei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.
Full textKlas, Juliana. "Advanced applications for state estimators in smart grids : identification, detection and correction of simultaneous measurement, parameter and topology cyber-attacks." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/185233.
Full textO aumento da demanda e a preocupação com as mudanças climáticas são importantes motivadores para as fontes de energia renováveis e a modernização da rede elétrica. A modernização da rede elétrica inteligentes (REI) ou smart grid, não somente possibilita as fontes de energia renováveis mas também abre portas à novas aplicações de grande impacto como a prevenção e restauração automática de falhas e a possibilidade dos consumidores terem grande controle sobre o consumo de eletricidade e atuação participativa no mercado de energia. De acordo com o Instituto Norte Americano de Pesquisas do Setor Elétrico, um dos principais desafios a ser enfrentado no desenvolvimento das REIs é relacionado a segurança cibernética dos sistemas. O cenário da segurança cibernética atual é caracterizado pela rápida evolução dos riscos e vulnerabilidades que impõe desafios para a confiabilidade, segurança e resiliência do setor elétrico. Neste contexto, estimadores de estado do sistema de potência são ferramentas críticas para a confiabilidade da rede, sob um cenário de observabilidade do sistema eles possibilitam o fluxo de potência do sistema e a análise de dados incorretos. Neste trabalho, ataques cibernéticos são modelados como injeção de dados incorretos em medidas, parâmetros e topologia do sistema. A metodologia proposta possibilita detecção de ataques mesmo se eles pertencerem ao subespaço ortogonal formado pelas colunas da matriz Jacobiana e em áreas do sistema com reduzida redundância de medidas. A solução proposta pelo estado da arte considera correções em parâmetros ou topologia quando medidas estão livres de erros. Porém, como pode-se corrigir medidas se parâmetros ou a topologia estão simultaneamente com erros? Para resolver este problema um modelo relaxado é proposto e resolvido iterativamente. Assim que detectado e identificado, ataques cibernéticos em parâmetros, topologia e/ou medidas são corrigidos. As contribuições específicas do trabalho são: cálculo do desvio padrão para pseudomedidas (iguais à zero) e medidas de baixa magnitude baseado em medidas correlatas e propriedades da covariância; modelo baseado em relaxação lagrangiana e erro composto de medida para identificação e detecção de ataques cibernéticos; estratégia hibrida de relaxamento iterativo (EHRI) para correção de ataque cibernético em parâmetros da rede de modo contínuo e com reduzido esforço computacional e metodologia baseada em ciclo holístico de resiliência para estimadores de estado sob ataques cibernéticos simultâneos em parâmetros, topologia e medidas. A validação é feita através dos sistemas de teste do IEEE de 14 e 57 barras, testes comparativos elucidam as contribuições da metodologia proposta ao estado da arte nesta área de pesquisa. Trazendo as capacidades de mitigação, resposta e recuperação ao estimador de estado com esforço computacional reduzido, o modelo e metodologia propostos tem grande potencial de ser integrado em SCADAs para aplicação em casos reais.
Akbar, Yousef M. A. H. "Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98554.
Full textM.S.
The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized in the modernized power grid that directly relies on new communication networks. The power grid is becoming more efficient and more effective due to these developments, however, there are some considerations to be made as for the security of the power grid. An important expectation of the power grid is the reliability of power delivery to its customers. New information and communication technology integration brings rise to new cyber vulnerabilities that can inhibit the functionality of the power grid. A coordinated cyber-attack was conducted against the Ukrainian power grid in 2015 that targeted the cyber vulnerabilities of the system. The attackers made sure that the grid operators were unable to observe their system being attacked via Denial of Service attacks. Smart meters are the digitized equivalent of a traditional energy meter, it wirelessly communicates with the grid operators. An increase in deployment of these smart meters makes it such that we are more dependent on them and hence creating a new vulnerability for an attack. The smart meter integration into the power grid needs to be studied and carefully considered for the prevention of attacks. A testbed is created using devices that emulate the smart meters and a network is established between the devices. The network was attacked with a Denial of Service attack to validate the testbed performance, and an Intrusion detection method was developed and applied onto the testbed to prove that the testbed created can be used to study and develop methods to cover the vulnerabilities present.
Books on the topic "Power System Cyber Security"
Lukszo, Zofia. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure. Dordrecht: Springer Science+Business Media B.V., 2010.
Find full textCyber security: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Twelfth Congress, first session, to receive testimony on a joint staff discussion draft pertaining to cyber security of the bulk-power system and electric infrastructure and for other purposes, May 5, 2011. Washington: U.S. G.P.O., 2011.
Find full textLehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security: Power and Technology. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2.
Full textLonergan, Shawn William. Cyber Power and the International System. [New York, N.Y.?]: [publisher not identified], 2017.
Find full textSecuring the modern electric grid from physical and cyber attacks: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, first session, July 21, 2009. Washington: U.S. G.P.O., 2009.
Find full textNational Institute of Standards and Technology (U.S.). Office of the National Coordinator for Smart Grid Interoperability. Guidelines for smart grid cyber security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2010.
Find full textThe cyber threat to control systems: Stronger regulations are necessary to secure the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 17, 2007. Washington: U.S. G.P.O., 2009.
Find full textUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. The cyber threat to control systems: Stronger regulations are necessary to secure the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 17, 2007. Washington: U.S. G.P.O., 2009.
Find full textImplications of cyber vulnerabilities on the resilience and security of the electric grid: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 21, 2008. Washington: U.S. G.P.O., 2008.
Find full textCyber warfare: The power of the unseen. New Delhi: KW Publishers in association with Centre for Air Power Studies, 2011.
Find full textBook chapters on the topic "Power System Cyber Security"
Liao, Weixian, and Pan Li. "Cascading Failure Attacks in the Power System." In Security of Cyber-Physical Systems, 53–79. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45541-5_4.
Full textKuusisto, Rauno, and Tuija Kuusisto. "Cyber Security Strategy Implementation Architecture in a Value System." In Cyber Security: Power and Technology, 49–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_4.
Full textChakhchoukh, Yacine, and Hideaki Ishii. "Cyber Security for Power System State Estimation." In Smart Grid Control, 241–56. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98310-3_15.
Full textShen, Xifeng, Ming Liu, Hua Liu, Jinfeng Dong, Guoqing Jiang, and Xin Zhao. "System Design of Single On-line Uninterruptible Power Supply." In Cyber Security Intelligence and Analytics, 601–8. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_75.
Full textLu, Xiao, Lei Wei, and Zhe Wang. "The Digital New Infrastructure Construction System of Provincial Power Grid." In Cyber Security Intelligence and Analytics, 158–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_20.
Full textFeng, Xiaomeng, Yang Liu, and Shiyan Hu. "Machine Learning for Cyber-Physical Power System Security." In Machine Learning for Embedded System Security, 105–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9_4.
Full textJu, Yige. "Application of Improved Particle Swarm Optimization Algorithm in Power Economic Dispatch System." In Cyber Security Intelligence and Analytics, 216–26. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31775-0_23.
Full textHarison, Elad, and Nezer Zaidenberg. "Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems." In Cyber Security: Power and Technology, 199–217. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_12.
Full textWang, Ning, Xing Wen, Jinwei Zhu, and Jiong Jiao. "Design of Intelligent Power Search Engine Selection System Based on Micro Service Architecture." In Cyber Security Intelligence and Analytics, 846–50. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_118.
Full textKuang, Zijia, Guihua Qiu, and Zhirui Tang. "Design and Application Analysis of Network Command System for Power Grid Dispatching Operation." In Cyber Security Intelligence and Analytics, 80–87. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_10.
Full textConference papers on the topic "Power System Cyber Security"
Li, Bo, and Lichen Zhang. "Security analysis of cyber-physical system." In MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I: 1st International Conference on Materials Science, Energy Technology, Power Engineering (MEP 2017). Author(s), 2017. http://dx.doi.org/10.1063/1.4982543.
Full textBian, Yufang, Jing Li, and Baojuan Yin. "Analysis of Cyber Security Incident in South Korean Nuclear Power Plant and Cyber Security Solutions for Nuclear Power Industrial Control System." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67577.
Full textGu, Liang, Yi An, and Xin Zhou. "Network Security Analysis Method for Power System." In 2022 12th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2022. http://dx.doi.org/10.1109/cyber55403.2022.9907699.
Full textSukumara, T., S. D. Sudarsan, Janne Starck, and Timothy R. Vittor. "Cyber Security – Securing electrical power transmission and distribution systems." In 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS). IEEE, 2018. http://dx.doi.org/10.1109/cccs.2018.8586822.
Full textHu, Bing, Longqiang Zhang, Zhiwu Guo, Youran Li, Wei Sun, Liang Zhou, and Yong Tian. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.
Full textGol, Murat, and Ali Abur. "Effective measurement design for cyber security." In 2014 Power Systems Computation Conference (PSCC). IEEE, 2014. http://dx.doi.org/10.1109/pscc.2014.7038496.
Full textSu, Sheng, Xianzhong Duan, Xiangjun Zeng, W. L. Chan, and K. K. Li. "Context Information based Cyber Security Defense of Protection System." In 2007 IEEE Power Engineering Society General Meeting. IEEE, 2007. http://dx.doi.org/10.1109/pes.2007.385649.
Full textBeasley, Christopher, G. Kumar Venayagamoorthy, and Richard Brooks. "Cyber security evaluation of synchrophasors in a power system." In 2014 Clemson University Power Systems Conference (PSC). IEEE, 2014. http://dx.doi.org/10.1109/psc.2014.6808100.
Full textNi, Ming, Anurag K. Srivastava, Rui Bo, and Jie Yan. "Design of A Game Theory Based Defense System for Power System Cyber Security." In 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2017. http://dx.doi.org/10.1109/cyber.2017.8446449.
Full textAbegaz, Brook W. "ASCPN - A Security Evaluation System for Cyber Power Networks." In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2019. http://dx.doi.org/10.1109/uemcon47517.2019.8992946.
Full textReports on the topic "Power System Cyber Security"
Peisert, Sean, Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Charles Mcparland, Alex McEachren, Galen Rasche, and Aaron Snyder. Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-Synchrophasor Measurements and Cyber-Reported SCADA - Final Report. Office of Scientific and Technical Information (OSTI), December 2020. http://dx.doi.org/10.2172/1755352.
Full textHarris, Emilee. Success in Industrial Control System Cyber Security Training. Office of Scientific and Technical Information (OSTI), January 2016. http://dx.doi.org/10.2172/1483594.
Full textWayne F. Boyer and Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), May 2008. http://dx.doi.org/10.2172/935471.
Full textAuthor, Not Given. Laboratory Cyber Security Assessment of the OSII SCADA Control System. Office of Scientific and Technical Information (OSTI), March 2010. http://dx.doi.org/10.2172/974248.
Full textSharland, Lisa, Netta Goussac, Emilia Currey, Genevieve Feely, and Sarah O’Connor. System Update: Toward a Women, Peace and Cyber Security Agenda. United Nations Institute for Disarmament Research, September 2021. http://dx.doi.org/10.37559/gen/2021/03.
Full textMay Robin Chaffin. NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses. Office of Scientific and Technical Information (OSTI), May 2010. http://dx.doi.org/10.2172/983345.
Full textHorowitz, Barry, Peter Beling, Kevin Skadron, Ron D. Williams, and William Melvin. Security Engineering Project - System Aware Cyber Security for an Autonomous Surveillance System On Board an Unmanned Aerial Vehicle. Fort Belvoir, VA: Defense Technical Information Center, January 2014. http://dx.doi.org/10.21236/ada608340.
Full textPollock, Guylaine M., William Dee Atkins, Moses Daniel Schwartz, Adrian R. Chavez, Jorge Mario Urrea, Nicholas Pattengale, Michael James McDonald, et al. Modeling and simulation for cyber-physical system security research, development and applications. Office of Scientific and Technical Information (OSTI), February 2010. http://dx.doi.org/10.2172/1028942.
Full textHu, Tan Chang, and David G. Robinson. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary. Office of Scientific and Technical Information (OSTI), September 2011. http://dx.doi.org/10.2172/1037742.
Full textFranusich, Michael D. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report. Office of Scientific and Technical Information (OSTI), March 2016. http://dx.doi.org/10.2172/1242462.
Full text