Literatura académica sobre el tema "Power System Cyber Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Power System Cyber Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Power System Cyber Security"
Oyewole, Peju Adesina y Dilan Jayaweera. "Power System Security With Cyber-Physical Power System Operation". IEEE Access 8 (2020): 179970–82. http://dx.doi.org/10.1109/access.2020.3028222.
Texto completoRahul Kumar Jha, Sumina Neupane y Roshan Raj Bhatt. "A Comprehensive Approach to Securing Power Converters: Cyber-Physical Integration". December 2023 2, n.º 2 (diciembre de 2023): 256–87. http://dx.doi.org/10.36548/rrrj.2023.2.003.
Texto completoEdhi Harianto, Rahmat, Bintoro Aji y M. Rifqi Harahap. "Rekomendasi Teknis Antar Muka Aspek Keselamatan dan Keamanan Sistem Instrumentasi dan Kendali PLTN di Indonesia". Jurnal Pengawasan Tenaga Nuklir 3, n.º 1 (30 de julio de 2023): 10–16. http://dx.doi.org/10.53862/jupeten.v3i1.002.
Texto completoJaysawal, Anoop. "Cyber Security in Smart Grid System". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 8 (30 de agosto de 2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.
Texto completoLiu, Chen-Ching, Juan C. Bedoya, Nitasha Sahani, Alexandru Stefanov, Jennifer Appiah-Kubi, Chih-Che Sun, Jin Young Lee y Ruoxi Zhu. "Cyber–Physical System Security of Distribution Systems". Foundations and Trends® in Electric Energy Systems 4, n.º 4 (2021): 346–410. http://dx.doi.org/10.1561/3100000026.
Texto completoSingh, Arunabh. "Cyber Security Frameworks". International Journal for Research in Applied Science and Engineering Technology 10, n.º 1 (31 de enero de 2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.
Texto completoSridhar, Siddharth, Adam Hahn y Manimaran Govindarasu. "Cyber–Physical System Security for the Electric Power Grid". Proceedings of the IEEE 100, n.º 1 (enero de 2012): 210–24. http://dx.doi.org/10.1109/jproc.2011.2165269.
Texto completoAl-Gburi, Qusay A. y Mohd Aifaa Mohd Ariff. "Dynamic Security Assessment for Power System Under Cyber-Attack". Journal of Electrical Engineering & Technology 14, n.º 2 (15 de enero de 2019): 549–59. http://dx.doi.org/10.1007/s42835-019-00084-2.
Texto completoMohan, Athira M., Nader Meskin y Hasan Mehrjerdi. "A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems". Energies 13, n.º 15 (28 de julio de 2020): 3860. http://dx.doi.org/10.3390/en13153860.
Texto completoWadhawan, Yatin, Anas AlMajali y Clifford Neuman. "A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks". Electronics 7, n.º 10 (13 de octubre de 2018): 249. http://dx.doi.org/10.3390/electronics7100249.
Texto completoTesis sobre el tema "Power System Cyber Security"
Sridharan, Venkatraman. "Cyber security in power systems". Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.
Texto completoGiannini, Martina. "Improving Cyber-Security of Power System State Estimators". Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.
Texto completoYoussef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System". FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.
Texto completoWang, Zhuoyang. "Application of Complex Network Theory in Power System Security Assessment". Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/17367.
Texto completoVuković, Ognjen y György Dán. "On the Security of Distributed Power System State Estimation under Targeted Attacks". KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122442.
Texto completoQC 20130522
Vuković, Ognjen. "Data Integrity and Availability in Power System Communication Infrastructures". Licentiate thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122447.
Texto completoQC 20130522
El, Hariri Mohamad. "Secure Control and Operation of Energy Cyber-Physical Systems Through Intelligent Agents". FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3854.
Texto completoWei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid". FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.
Texto completoKlas, Juliana. "Advanced applications for state estimators in smart grids : identification, detection and correction of simultaneous measurement, parameter and topology cyber-attacks". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/185233.
Texto completoO aumento da demanda e a preocupação com as mudanças climáticas são importantes motivadores para as fontes de energia renováveis e a modernização da rede elétrica. A modernização da rede elétrica inteligentes (REI) ou smart grid, não somente possibilita as fontes de energia renováveis mas também abre portas à novas aplicações de grande impacto como a prevenção e restauração automática de falhas e a possibilidade dos consumidores terem grande controle sobre o consumo de eletricidade e atuação participativa no mercado de energia. De acordo com o Instituto Norte Americano de Pesquisas do Setor Elétrico, um dos principais desafios a ser enfrentado no desenvolvimento das REIs é relacionado a segurança cibernética dos sistemas. O cenário da segurança cibernética atual é caracterizado pela rápida evolução dos riscos e vulnerabilidades que impõe desafios para a confiabilidade, segurança e resiliência do setor elétrico. Neste contexto, estimadores de estado do sistema de potência são ferramentas críticas para a confiabilidade da rede, sob um cenário de observabilidade do sistema eles possibilitam o fluxo de potência do sistema e a análise de dados incorretos. Neste trabalho, ataques cibernéticos são modelados como injeção de dados incorretos em medidas, parâmetros e topologia do sistema. A metodologia proposta possibilita detecção de ataques mesmo se eles pertencerem ao subespaço ortogonal formado pelas colunas da matriz Jacobiana e em áreas do sistema com reduzida redundância de medidas. A solução proposta pelo estado da arte considera correções em parâmetros ou topologia quando medidas estão livres de erros. Porém, como pode-se corrigir medidas se parâmetros ou a topologia estão simultaneamente com erros? Para resolver este problema um modelo relaxado é proposto e resolvido iterativamente. Assim que detectado e identificado, ataques cibernéticos em parâmetros, topologia e/ou medidas são corrigidos. As contribuições específicas do trabalho são: cálculo do desvio padrão para pseudomedidas (iguais à zero) e medidas de baixa magnitude baseado em medidas correlatas e propriedades da covariância; modelo baseado em relaxação lagrangiana e erro composto de medida para identificação e detecção de ataques cibernéticos; estratégia hibrida de relaxamento iterativo (EHRI) para correção de ataque cibernético em parâmetros da rede de modo contínuo e com reduzido esforço computacional e metodologia baseada em ciclo holístico de resiliência para estimadores de estado sob ataques cibernéticos simultâneos em parâmetros, topologia e medidas. A validação é feita através dos sistemas de teste do IEEE de 14 e 57 barras, testes comparativos elucidam as contribuições da metodologia proposta ao estado da arte nesta área de pesquisa. Trazendo as capacidades de mitigação, resposta e recuperação ao estimador de estado com esforço computacional reduzido, o modelo e metodologia propostos tem grande potencial de ser integrado em SCADAs para aplicação em casos reais.
Akbar, Yousef M. A. H. "Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters". Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98554.
Texto completoM.S.
The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized in the modernized power grid that directly relies on new communication networks. The power grid is becoming more efficient and more effective due to these developments, however, there are some considerations to be made as for the security of the power grid. An important expectation of the power grid is the reliability of power delivery to its customers. New information and communication technology integration brings rise to new cyber vulnerabilities that can inhibit the functionality of the power grid. A coordinated cyber-attack was conducted against the Ukrainian power grid in 2015 that targeted the cyber vulnerabilities of the system. The attackers made sure that the grid operators were unable to observe their system being attacked via Denial of Service attacks. Smart meters are the digitized equivalent of a traditional energy meter, it wirelessly communicates with the grid operators. An increase in deployment of these smart meters makes it such that we are more dependent on them and hence creating a new vulnerability for an attack. The smart meter integration into the power grid needs to be studied and carefully considered for the prevention of attacks. A testbed is created using devices that emulate the smart meters and a network is established between the devices. The network was attacked with a Denial of Service attack to validate the testbed performance, and an Intrusion detection method was developed and applied onto the testbed to prove that the testbed created can be used to study and develop methods to cover the vulnerabilities present.
Libros sobre el tema "Power System Cyber Security"
Lukszo, Zofia. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure. Dordrecht: Springer Science+Business Media B.V., 2010.
Buscar texto completoCyber security: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Twelfth Congress, first session, to receive testimony on a joint staff discussion draft pertaining to cyber security of the bulk-power system and electric infrastructure and for other purposes, May 5, 2011. Washington: U.S. G.P.O., 2011.
Buscar texto completoLehto, Martti y Pekka Neittaanmäki, eds. Cyber Security: Power and Technology. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2.
Texto completoLonergan, Shawn William. Cyber Power and the International System. [New York, N.Y.?]: [publisher not identified], 2017.
Buscar texto completoSecuring the modern electric grid from physical and cyber attacks: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, first session, July 21, 2009. Washington: U.S. G.P.O., 2009.
Buscar texto completoNational Institute of Standards and Technology (U.S.). Office of the National Coordinator for Smart Grid Interoperability. Guidelines for smart grid cyber security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2010.
Buscar texto completoThe cyber threat to control systems: Stronger regulations are necessary to secure the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 17, 2007. Washington: U.S. G.P.O., 2009.
Buscar texto completoUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. The cyber threat to control systems: Stronger regulations are necessary to secure the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 17, 2007. Washington: U.S. G.P.O., 2009.
Buscar texto completoImplications of cyber vulnerabilities on the resilience and security of the electric grid: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 21, 2008. Washington: U.S. G.P.O., 2008.
Buscar texto completoCyber warfare: The power of the unseen. New Delhi: KW Publishers in association with Centre for Air Power Studies, 2011.
Buscar texto completoCapítulos de libros sobre el tema "Power System Cyber Security"
Liao, Weixian y Pan Li. "Cascading Failure Attacks in the Power System". En Security of Cyber-Physical Systems, 53–79. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45541-5_4.
Texto completoKuusisto, Rauno y Tuija Kuusisto. "Cyber Security Strategy Implementation Architecture in a Value System". En Cyber Security: Power and Technology, 49–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_4.
Texto completoChakhchoukh, Yacine y Hideaki Ishii. "Cyber Security for Power System State Estimation". En Smart Grid Control, 241–56. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98310-3_15.
Texto completoShen, Xifeng, Ming Liu, Hua Liu, Jinfeng Dong, Guoqing Jiang y Xin Zhao. "System Design of Single On-line Uninterruptible Power Supply". En Cyber Security Intelligence and Analytics, 601–8. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_75.
Texto completoLu, Xiao, Lei Wei y Zhe Wang. "The Digital New Infrastructure Construction System of Provincial Power Grid". En Cyber Security Intelligence and Analytics, 158–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_20.
Texto completoFeng, Xiaomeng, Yang Liu y Shiyan Hu. "Machine Learning for Cyber-Physical Power System Security". En Machine Learning for Embedded System Security, 105–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9_4.
Texto completoJu, Yige. "Application of Improved Particle Swarm Optimization Algorithm in Power Economic Dispatch System". En Cyber Security Intelligence and Analytics, 216–26. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31775-0_23.
Texto completoHarison, Elad y Nezer Zaidenberg. "Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems". En Cyber Security: Power and Technology, 199–217. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_12.
Texto completoWang, Ning, Xing Wen, Jinwei Zhu y Jiong Jiao. "Design of Intelligent Power Search Engine Selection System Based on Micro Service Architecture". En Cyber Security Intelligence and Analytics, 846–50. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_118.
Texto completoKuang, Zijia, Guihua Qiu y Zhirui Tang. "Design and Application Analysis of Network Command System for Power Grid Dispatching Operation". En Cyber Security Intelligence and Analytics, 80–87. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_10.
Texto completoActas de conferencias sobre el tema "Power System Cyber Security"
Li, Bo y Lichen Zhang. "Security analysis of cyber-physical system". En MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I: 1st International Conference on Materials Science, Energy Technology, Power Engineering (MEP 2017). Author(s), 2017. http://dx.doi.org/10.1063/1.4982543.
Texto completoBian, Yufang, Jing Li y Baojuan Yin. "Analysis of Cyber Security Incident in South Korean Nuclear Power Plant and Cyber Security Solutions for Nuclear Power Industrial Control System". En 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67577.
Texto completoGu, Liang, Yi An y Xin Zhou. "Network Security Analysis Method for Power System". En 2022 12th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2022. http://dx.doi.org/10.1109/cyber55403.2022.9907699.
Texto completoSukumara, T., S. D. Sudarsan, Janne Starck y Timothy R. Vittor. "Cyber Security – Securing electrical power transmission and distribution systems". En 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS). IEEE, 2018. http://dx.doi.org/10.1109/cccs.2018.8586822.
Texto completoHu, Bing, Longqiang Zhang, Zhiwu Guo, Youran Li, Wei Sun, Liang Zhou y Yong Tian. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants". En 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.
Texto completoGol, Murat y Ali Abur. "Effective measurement design for cyber security". En 2014 Power Systems Computation Conference (PSCC). IEEE, 2014. http://dx.doi.org/10.1109/pscc.2014.7038496.
Texto completoSu, Sheng, Xianzhong Duan, Xiangjun Zeng, W. L. Chan y K. K. Li. "Context Information based Cyber Security Defense of Protection System". En 2007 IEEE Power Engineering Society General Meeting. IEEE, 2007. http://dx.doi.org/10.1109/pes.2007.385649.
Texto completoBeasley, Christopher, G. Kumar Venayagamoorthy y Richard Brooks. "Cyber security evaluation of synchrophasors in a power system". En 2014 Clemson University Power Systems Conference (PSC). IEEE, 2014. http://dx.doi.org/10.1109/psc.2014.6808100.
Texto completoNi, Ming, Anurag K. Srivastava, Rui Bo y Jie Yan. "Design of A Game Theory Based Defense System for Power System Cyber Security". En 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2017. http://dx.doi.org/10.1109/cyber.2017.8446449.
Texto completoAbegaz, Brook W. "ASCPN - A Security Evaluation System for Cyber Power Networks". En 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2019. http://dx.doi.org/10.1109/uemcon47517.2019.8992946.
Texto completoInformes sobre el tema "Power System Cyber Security"
Peisert, Sean, Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Charles Mcparland, Alex McEachren, Galen Rasche y Aaron Snyder. Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-Synchrophasor Measurements and Cyber-Reported SCADA - Final Report. Office of Scientific and Technical Information (OSTI), diciembre de 2020. http://dx.doi.org/10.2172/1755352.
Texto completoHarris, Emilee. Success in Industrial Control System Cyber Security Training. Office of Scientific and Technical Information (OSTI), enero de 2016. http://dx.doi.org/10.2172/1483594.
Texto completoWayne F. Boyer y Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), mayo de 2008. http://dx.doi.org/10.2172/935471.
Texto completoAuthor, Not Given. Laboratory Cyber Security Assessment of the OSII SCADA Control System. Office of Scientific and Technical Information (OSTI), marzo de 2010. http://dx.doi.org/10.2172/974248.
Texto completoSharland, Lisa, Netta Goussac, Emilia Currey, Genevieve Feely y Sarah O’Connor. System Update: Toward a Women, Peace and Cyber Security Agenda. United Nations Institute for Disarmament Research, septiembre de 2021. http://dx.doi.org/10.37559/gen/2021/03.
Texto completoMay Robin Chaffin. NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses. Office of Scientific and Technical Information (OSTI), mayo de 2010. http://dx.doi.org/10.2172/983345.
Texto completoHorowitz, Barry, Peter Beling, Kevin Skadron, Ron D. Williams y William Melvin. Security Engineering Project - System Aware Cyber Security for an Autonomous Surveillance System On Board an Unmanned Aerial Vehicle. Fort Belvoir, VA: Defense Technical Information Center, enero de 2014. http://dx.doi.org/10.21236/ada608340.
Texto completoPollock, Guylaine M., William Dee Atkins, Moses Daniel Schwartz, Adrian R. Chavez, Jorge Mario Urrea, Nicholas Pattengale, Michael James McDonald et al. Modeling and simulation for cyber-physical system security research, development and applications. Office of Scientific and Technical Information (OSTI), febrero de 2010. http://dx.doi.org/10.2172/1028942.
Texto completoHu, Tan Chang y David G. Robinson. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary. Office of Scientific and Technical Information (OSTI), septiembre de 2011. http://dx.doi.org/10.2172/1037742.
Texto completoFranusich, Michael D. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report. Office of Scientific and Technical Information (OSTI), marzo de 2016. http://dx.doi.org/10.2172/1242462.
Texto completo