Gotowa bibliografia na temat „Power System Cyber Security”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Power System Cyber Security”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Power System Cyber Security"
Oyewole, Peju Adesina, i Dilan Jayaweera. "Power System Security With Cyber-Physical Power System Operation". IEEE Access 8 (2020): 179970–82. http://dx.doi.org/10.1109/access.2020.3028222.
Pełny tekst źródłaRahul Kumar Jha, Sumina Neupane i Roshan Raj Bhatt. "A Comprehensive Approach to Securing Power Converters: Cyber-Physical Integration". December 2023 2, nr 2 (grudzień 2023): 256–87. http://dx.doi.org/10.36548/rrrj.2023.2.003.
Pełny tekst źródłaEdhi Harianto, Rahmat, Bintoro Aji i M. Rifqi Harahap. "Rekomendasi Teknis Antar Muka Aspek Keselamatan dan Keamanan Sistem Instrumentasi dan Kendali PLTN di Indonesia". Jurnal Pengawasan Tenaga Nuklir 3, nr 1 (30.07.2023): 10–16. http://dx.doi.org/10.53862/jupeten.v3i1.002.
Pełny tekst źródłaJaysawal, Anoop. "Cyber Security in Smart Grid System". International Journal of Advanced Research in Computer Science and Software Engineering 7, nr 8 (30.08.2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.
Pełny tekst źródłaLiu, Chen-Ching, Juan C. Bedoya, Nitasha Sahani, Alexandru Stefanov, Jennifer Appiah-Kubi, Chih-Che Sun, Jin Young Lee i Ruoxi Zhu. "Cyber–Physical System Security of Distribution Systems". Foundations and Trends® in Electric Energy Systems 4, nr 4 (2021): 346–410. http://dx.doi.org/10.1561/3100000026.
Pełny tekst źródłaSingh, Arunabh. "Cyber Security Frameworks". International Journal for Research in Applied Science and Engineering Technology 10, nr 1 (31.01.2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.
Pełny tekst źródłaSridhar, Siddharth, Adam Hahn i Manimaran Govindarasu. "Cyber–Physical System Security for the Electric Power Grid". Proceedings of the IEEE 100, nr 1 (styczeń 2012): 210–24. http://dx.doi.org/10.1109/jproc.2011.2165269.
Pełny tekst źródłaAl-Gburi, Qusay A., i Mohd Aifaa Mohd Ariff. "Dynamic Security Assessment for Power System Under Cyber-Attack". Journal of Electrical Engineering & Technology 14, nr 2 (15.01.2019): 549–59. http://dx.doi.org/10.1007/s42835-019-00084-2.
Pełny tekst źródłaMohan, Athira M., Nader Meskin i Hasan Mehrjerdi. "A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems". Energies 13, nr 15 (28.07.2020): 3860. http://dx.doi.org/10.3390/en13153860.
Pełny tekst źródłaWadhawan, Yatin, Anas AlMajali i Clifford Neuman. "A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks". Electronics 7, nr 10 (13.10.2018): 249. http://dx.doi.org/10.3390/electronics7100249.
Pełny tekst źródłaRozprawy doktorskie na temat "Power System Cyber Security"
Sridharan, Venkatraman. "Cyber security in power systems". Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.
Pełny tekst źródłaGiannini, Martina. "Improving Cyber-Security of Power System State Estimators". Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.
Pełny tekst źródłaYoussef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System". FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.
Pełny tekst źródłaWang, Zhuoyang. "Application of Complex Network Theory in Power System Security Assessment". Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/17367.
Pełny tekst źródłaVuković, Ognjen, i György Dán. "On the Security of Distributed Power System State Estimation under Targeted Attacks". KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122442.
Pełny tekst źródłaQC 20130522
Vuković, Ognjen. "Data Integrity and Availability in Power System Communication Infrastructures". Licentiate thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122447.
Pełny tekst źródłaQC 20130522
El, Hariri Mohamad. "Secure Control and Operation of Energy Cyber-Physical Systems Through Intelligent Agents". FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3854.
Pełny tekst źródłaWei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid". FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.
Pełny tekst źródłaKlas, Juliana. "Advanced applications for state estimators in smart grids : identification, detection and correction of simultaneous measurement, parameter and topology cyber-attacks". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/185233.
Pełny tekst źródłaO aumento da demanda e a preocupação com as mudanças climáticas são importantes motivadores para as fontes de energia renováveis e a modernização da rede elétrica. A modernização da rede elétrica inteligentes (REI) ou smart grid, não somente possibilita as fontes de energia renováveis mas também abre portas à novas aplicações de grande impacto como a prevenção e restauração automática de falhas e a possibilidade dos consumidores terem grande controle sobre o consumo de eletricidade e atuação participativa no mercado de energia. De acordo com o Instituto Norte Americano de Pesquisas do Setor Elétrico, um dos principais desafios a ser enfrentado no desenvolvimento das REIs é relacionado a segurança cibernética dos sistemas. O cenário da segurança cibernética atual é caracterizado pela rápida evolução dos riscos e vulnerabilidades que impõe desafios para a confiabilidade, segurança e resiliência do setor elétrico. Neste contexto, estimadores de estado do sistema de potência são ferramentas críticas para a confiabilidade da rede, sob um cenário de observabilidade do sistema eles possibilitam o fluxo de potência do sistema e a análise de dados incorretos. Neste trabalho, ataques cibernéticos são modelados como injeção de dados incorretos em medidas, parâmetros e topologia do sistema. A metodologia proposta possibilita detecção de ataques mesmo se eles pertencerem ao subespaço ortogonal formado pelas colunas da matriz Jacobiana e em áreas do sistema com reduzida redundância de medidas. A solução proposta pelo estado da arte considera correções em parâmetros ou topologia quando medidas estão livres de erros. Porém, como pode-se corrigir medidas se parâmetros ou a topologia estão simultaneamente com erros? Para resolver este problema um modelo relaxado é proposto e resolvido iterativamente. Assim que detectado e identificado, ataques cibernéticos em parâmetros, topologia e/ou medidas são corrigidos. As contribuições específicas do trabalho são: cálculo do desvio padrão para pseudomedidas (iguais à zero) e medidas de baixa magnitude baseado em medidas correlatas e propriedades da covariância; modelo baseado em relaxação lagrangiana e erro composto de medida para identificação e detecção de ataques cibernéticos; estratégia hibrida de relaxamento iterativo (EHRI) para correção de ataque cibernético em parâmetros da rede de modo contínuo e com reduzido esforço computacional e metodologia baseada em ciclo holístico de resiliência para estimadores de estado sob ataques cibernéticos simultâneos em parâmetros, topologia e medidas. A validação é feita através dos sistemas de teste do IEEE de 14 e 57 barras, testes comparativos elucidam as contribuições da metodologia proposta ao estado da arte nesta área de pesquisa. Trazendo as capacidades de mitigação, resposta e recuperação ao estimador de estado com esforço computacional reduzido, o modelo e metodologia propostos tem grande potencial de ser integrado em SCADAs para aplicação em casos reais.
Akbar, Yousef M. A. H. "Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters". Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98554.
Pełny tekst źródłaM.S.
The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized in the modernized power grid that directly relies on new communication networks. The power grid is becoming more efficient and more effective due to these developments, however, there are some considerations to be made as for the security of the power grid. An important expectation of the power grid is the reliability of power delivery to its customers. New information and communication technology integration brings rise to new cyber vulnerabilities that can inhibit the functionality of the power grid. A coordinated cyber-attack was conducted against the Ukrainian power grid in 2015 that targeted the cyber vulnerabilities of the system. The attackers made sure that the grid operators were unable to observe their system being attacked via Denial of Service attacks. Smart meters are the digitized equivalent of a traditional energy meter, it wirelessly communicates with the grid operators. An increase in deployment of these smart meters makes it such that we are more dependent on them and hence creating a new vulnerability for an attack. The smart meter integration into the power grid needs to be studied and carefully considered for the prevention of attacks. A testbed is created using devices that emulate the smart meters and a network is established between the devices. The network was attacked with a Denial of Service attack to validate the testbed performance, and an Intrusion detection method was developed and applied onto the testbed to prove that the testbed created can be used to study and develop methods to cover the vulnerabilities present.
Książki na temat "Power System Cyber Security"
Lukszo, Zofia. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure. Dordrecht: Springer Science+Business Media B.V., 2010.
Znajdź pełny tekst źródłaCyber security: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Twelfth Congress, first session, to receive testimony on a joint staff discussion draft pertaining to cyber security of the bulk-power system and electric infrastructure and for other purposes, May 5, 2011. Washington: U.S. G.P.O., 2011.
Znajdź pełny tekst źródłaLehto, Martti, i Pekka Neittaanmäki, red. Cyber Security: Power and Technology. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2.
Pełny tekst źródłaLonergan, Shawn William. Cyber Power and the International System. [New York, N.Y.?]: [publisher not identified], 2017.
Znajdź pełny tekst źródłaSecuring the modern electric grid from physical and cyber attacks: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, first session, July 21, 2009. Washington: U.S. G.P.O., 2009.
Znajdź pełny tekst źródłaNational Institute of Standards and Technology (U.S.). Office of the National Coordinator for Smart Grid Interoperability. Guidelines for smart grid cyber security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2010.
Znajdź pełny tekst źródłaThe cyber threat to control systems: Stronger regulations are necessary to secure the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 17, 2007. Washington: U.S. G.P.O., 2009.
Znajdź pełny tekst źródłaUnited States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. The cyber threat to control systems: Stronger regulations are necessary to secure the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 17, 2007. Washington: U.S. G.P.O., 2009.
Znajdź pełny tekst źródłaImplications of cyber vulnerabilities on the resilience and security of the electric grid: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 21, 2008. Washington: U.S. G.P.O., 2008.
Znajdź pełny tekst źródłaCyber warfare: The power of the unseen. New Delhi: KW Publishers in association with Centre for Air Power Studies, 2011.
Znajdź pełny tekst źródłaCzęści książek na temat "Power System Cyber Security"
Liao, Weixian, i Pan Li. "Cascading Failure Attacks in the Power System". W Security of Cyber-Physical Systems, 53–79. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45541-5_4.
Pełny tekst źródłaKuusisto, Rauno, i Tuija Kuusisto. "Cyber Security Strategy Implementation Architecture in a Value System". W Cyber Security: Power and Technology, 49–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_4.
Pełny tekst źródłaChakhchoukh, Yacine, i Hideaki Ishii. "Cyber Security for Power System State Estimation". W Smart Grid Control, 241–56. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98310-3_15.
Pełny tekst źródłaShen, Xifeng, Ming Liu, Hua Liu, Jinfeng Dong, Guoqing Jiang i Xin Zhao. "System Design of Single On-line Uninterruptible Power Supply". W Cyber Security Intelligence and Analytics, 601–8. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_75.
Pełny tekst źródłaLu, Xiao, Lei Wei i Zhe Wang. "The Digital New Infrastructure Construction System of Provincial Power Grid". W Cyber Security Intelligence and Analytics, 158–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_20.
Pełny tekst źródłaFeng, Xiaomeng, Yang Liu i Shiyan Hu. "Machine Learning for Cyber-Physical Power System Security". W Machine Learning for Embedded System Security, 105–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9_4.
Pełny tekst źródłaJu, Yige. "Application of Improved Particle Swarm Optimization Algorithm in Power Economic Dispatch System". W Cyber Security Intelligence and Analytics, 216–26. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31775-0_23.
Pełny tekst źródłaHarison, Elad, i Nezer Zaidenberg. "Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems". W Cyber Security: Power and Technology, 199–217. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_12.
Pełny tekst źródłaWang, Ning, Xing Wen, Jinwei Zhu i Jiong Jiao. "Design of Intelligent Power Search Engine Selection System Based on Micro Service Architecture". W Cyber Security Intelligence and Analytics, 846–50. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_118.
Pełny tekst źródłaKuang, Zijia, Guihua Qiu i Zhirui Tang. "Design and Application Analysis of Network Command System for Power Grid Dispatching Operation". W Cyber Security Intelligence and Analytics, 80–87. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_10.
Pełny tekst źródłaStreszczenia konferencji na temat "Power System Cyber Security"
Li, Bo, i Lichen Zhang. "Security analysis of cyber-physical system". W MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I: 1st International Conference on Materials Science, Energy Technology, Power Engineering (MEP 2017). Author(s), 2017. http://dx.doi.org/10.1063/1.4982543.
Pełny tekst źródłaBian, Yufang, Jing Li i Baojuan Yin. "Analysis of Cyber Security Incident in South Korean Nuclear Power Plant and Cyber Security Solutions for Nuclear Power Industrial Control System". W 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67577.
Pełny tekst źródłaGu, Liang, Yi An i Xin Zhou. "Network Security Analysis Method for Power System". W 2022 12th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2022. http://dx.doi.org/10.1109/cyber55403.2022.9907699.
Pełny tekst źródłaSukumara, T., S. D. Sudarsan, Janne Starck i Timothy R. Vittor. "Cyber Security – Securing electrical power transmission and distribution systems". W 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS). IEEE, 2018. http://dx.doi.org/10.1109/cccs.2018.8586822.
Pełny tekst źródłaHu, Bing, Longqiang Zhang, Zhiwu Guo, Youran Li, Wei Sun, Liang Zhou i Yong Tian. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants". W 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.
Pełny tekst źródłaGol, Murat, i Ali Abur. "Effective measurement design for cyber security". W 2014 Power Systems Computation Conference (PSCC). IEEE, 2014. http://dx.doi.org/10.1109/pscc.2014.7038496.
Pełny tekst źródłaSu, Sheng, Xianzhong Duan, Xiangjun Zeng, W. L. Chan i K. K. Li. "Context Information based Cyber Security Defense of Protection System". W 2007 IEEE Power Engineering Society General Meeting. IEEE, 2007. http://dx.doi.org/10.1109/pes.2007.385649.
Pełny tekst źródłaBeasley, Christopher, G. Kumar Venayagamoorthy i Richard Brooks. "Cyber security evaluation of synchrophasors in a power system". W 2014 Clemson University Power Systems Conference (PSC). IEEE, 2014. http://dx.doi.org/10.1109/psc.2014.6808100.
Pełny tekst źródłaNi, Ming, Anurag K. Srivastava, Rui Bo i Jie Yan. "Design of A Game Theory Based Defense System for Power System Cyber Security". W 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2017. http://dx.doi.org/10.1109/cyber.2017.8446449.
Pełny tekst źródłaAbegaz, Brook W. "ASCPN - A Security Evaluation System for Cyber Power Networks". W 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2019. http://dx.doi.org/10.1109/uemcon47517.2019.8992946.
Pełny tekst źródłaRaporty organizacyjne na temat "Power System Cyber Security"
Peisert, Sean, Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Charles Mcparland, Alex McEachren, Galen Rasche i Aaron Snyder. Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-Synchrophasor Measurements and Cyber-Reported SCADA - Final Report. Office of Scientific and Technical Information (OSTI), grudzień 2020. http://dx.doi.org/10.2172/1755352.
Pełny tekst źródłaHarris, Emilee. Success in Industrial Control System Cyber Security Training. Office of Scientific and Technical Information (OSTI), styczeń 2016. http://dx.doi.org/10.2172/1483594.
Pełny tekst źródłaWayne F. Boyer i Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), maj 2008. http://dx.doi.org/10.2172/935471.
Pełny tekst źródłaAuthor, Not Given. Laboratory Cyber Security Assessment of the OSII SCADA Control System. Office of Scientific and Technical Information (OSTI), marzec 2010. http://dx.doi.org/10.2172/974248.
Pełny tekst źródłaSharland, Lisa, Netta Goussac, Emilia Currey, Genevieve Feely i Sarah O’Connor. System Update: Toward a Women, Peace and Cyber Security Agenda. United Nations Institute for Disarmament Research, wrzesień 2021. http://dx.doi.org/10.37559/gen/2021/03.
Pełny tekst źródłaMay Robin Chaffin. NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses. Office of Scientific and Technical Information (OSTI), maj 2010. http://dx.doi.org/10.2172/983345.
Pełny tekst źródłaHorowitz, Barry, Peter Beling, Kevin Skadron, Ron D. Williams i William Melvin. Security Engineering Project - System Aware Cyber Security for an Autonomous Surveillance System On Board an Unmanned Aerial Vehicle. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2014. http://dx.doi.org/10.21236/ada608340.
Pełny tekst źródłaPollock, Guylaine M., William Dee Atkins, Moses Daniel Schwartz, Adrian R. Chavez, Jorge Mario Urrea, Nicholas Pattengale, Michael James McDonald i in. Modeling and simulation for cyber-physical system security research, development and applications. Office of Scientific and Technical Information (OSTI), luty 2010. http://dx.doi.org/10.2172/1028942.
Pełny tekst źródłaHu, Tan Chang, i David G. Robinson. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary. Office of Scientific and Technical Information (OSTI), wrzesień 2011. http://dx.doi.org/10.2172/1037742.
Pełny tekst źródłaFranusich, Michael D. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report. Office of Scientific and Technical Information (OSTI), marzec 2016. http://dx.doi.org/10.2172/1242462.
Pełny tekst źródła