Gotowa bibliografia na temat „Power System Cyber Security”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Power System Cyber Security”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Power System Cyber Security"

1

Oyewole, Peju Adesina, i Dilan Jayaweera. "Power System Security With Cyber-Physical Power System Operation". IEEE Access 8 (2020): 179970–82. http://dx.doi.org/10.1109/access.2020.3028222.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Rahul Kumar Jha, Sumina Neupane i Roshan Raj Bhatt. "A Comprehensive Approach to Securing Power Converters: Cyber-Physical Integration". December 2023 2, nr 2 (grudzień 2023): 256–87. http://dx.doi.org/10.36548/rrrj.2023.2.003.

Pełny tekst źródła
Streszczenie:
This paper presents a novel approach for integrating cyber-physical security measures into power converters. As the demand for renewable energy sources continues to grow, the importance of securing the power grid against cyber-attacks becomes increasingly critical. Power converters are a key component of the grid, and their vulnerability to cyber-attacks presents a significant risk to the security and reliability of the system. In this study, a solution that combines traditional physical security measures with advanced cyber-security techniques to provide a comprehensive approach to protecting power converters is proposed. Our approach includes the use of secure communication protocols, intrusion detection systems, and advanced encryption algorithms to safeguard against cyber-attacks. The use of physical security measures, such as tamper-evident seals and monitoring systems, to protect against physical attacks is also explored. The results demonstrate the effectiveness of the approach in mitigating both cyber and physical security threats to power converters, and highlight the importance of integrating cyber-physical security measures into critical infrastructure systems.
Style APA, Harvard, Vancouver, ISO itp.
3

Edhi Harianto, Rahmat, Bintoro Aji i M. Rifqi Harahap. "Rekomendasi Teknis Antar Muka Aspek Keselamatan dan Keamanan Sistem Instrumentasi dan Kendali PLTN di Indonesia". Jurnal Pengawasan Tenaga Nuklir 3, nr 1 (30.07.2023): 10–16. http://dx.doi.org/10.53862/jupeten.v3i1.002.

Pełny tekst źródła
Streszczenie:
Instrumentation and control (I&C) systems are crucial in ensuring the safe operation of power reactors. New and modern nuclear facilities commonly use digital I&C systems. However, the application of digital technologies within I&C systems has made these systems vulnerable to cyber-attack. Literature study shows that cyber-attack is one of the threats that could occur at any time in the lifetime of the I&C system. Indonesia regulates cyber security and interface of safety and security through BAPETEN Chairman Regulation (BCR) number 1 of 2009 on Nuclear Installation Physical Protection and BCR number 6 of 2012 on Design Provision of Computer-Based Important Safety System on Power Reactor. The provision related to interface safety and security against cyber-attack has a significant gap compared to IAEA Requirements and Internationals practice. Therefore, this paper tries to identify technical recommendations for BCR number 1 of 2009 and BCR number 6 of 2012 related to the interface of safety and security and cyber security in the Nuclear Power Plant (NPP) I&C system using IAEA requirements and international practice. The paper concludes that some technical recommendations must be added to BCR 1 of 2009 and BCR 6 of 2012. These recommendations are required in establishing cyber security program, integrating a cyber-security program with physical protection system, implementing control networks with reduced interconnectivity, implementing defense-in-depth as an essential concept in designing the NPP I&C system, developing a highly integrated protection system platform that utilizes FPG, and integrating passive safety system into the safety system. Keywords: cyber-attack, safety and security interfaces, instrumentation and control system
Style APA, Harvard, Vancouver, ISO itp.
4

Jaysawal, Anoop. "Cyber Security in Smart Grid System". International Journal of Advanced Research in Computer Science and Software Engineering 7, nr 8 (30.08.2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.

Pełny tekst źródła
Streszczenie:
Abstract: The smart grid is an evolution of the electrical grid to respond to these challenges. A smart grid is an energy transmission and distribution network enhanced through digital control, monitoring, and telecommunications capabilities. It provides a real-time, two-way flow of energy and information to all stakeholders in the electricity chain, from the generation plant to the commercial, industrial, and residential end user. This evolution is crucial for integrating both renewable and distributed energy resources and to improve the efficiency and sustainability of the electrical grid and associated services. It will also help in other ways, such as enabling:• Smart and positive energy infrastructures• Increased energy density management during peaks• Real-time pricing to customers• Integrated mobility services• New virtual power plants• Micro grid
Style APA, Harvard, Vancouver, ISO itp.
5

Liu, Chen-Ching, Juan C. Bedoya, Nitasha Sahani, Alexandru Stefanov, Jennifer Appiah-Kubi, Chih-Che Sun, Jin Young Lee i Ruoxi Zhu. "Cyber–Physical System Security of Distribution Systems". Foundations and Trends® in Electric Energy Systems 4, nr 4 (2021): 346–410. http://dx.doi.org/10.1561/3100000026.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Singh, Arunabh. "Cyber Security Frameworks". International Journal for Research in Applied Science and Engineering Technology 10, nr 1 (31.01.2022): 590–99. http://dx.doi.org/10.22214/ijraset.2022.39843.

Pełny tekst źródła
Streszczenie:
Abstract: In this paper we attempt to explain and establish certain frameworks that can be assessed for implementing security systems against cyber-threats and cyber-criminals. We give a brief overview of electronic signature generation procedures which include its validation and efficiency for promoting cyber security for confidential documents and information stored in the cloud. We strictly avoid the mathematical modelling of the electronic signature generation process as it is beyond the scope of this paper, instead we take a theoretical approach to explain the procedures. We also model the threats posed by a malicious hacker seeking to induce disturbances in the functioning of a power transmission grid via the means of cyber-physical networks and systems. We use the strategy of a load redistribution attack, while clearly acknowledging that the hacker would form its decision policy on inadequate information. Our research indicate that inaccurate admittance values often cause moderately invasive cyber-attacks that still compromise the grid security, while inadequate capacity values result in comparatively less efficient attacks. In the end we propose a security framework for the security systems utilised by companies and corporations at global scale to conduct cyber-security related operations. Keywords: Electronic signature, Key pair, sequence modelling, hacker, power transmission grid, Threat response, framework.
Style APA, Harvard, Vancouver, ISO itp.
7

Sridhar, Siddharth, Adam Hahn i Manimaran Govindarasu. "Cyber–Physical System Security for the Electric Power Grid". Proceedings of the IEEE 100, nr 1 (styczeń 2012): 210–24. http://dx.doi.org/10.1109/jproc.2011.2165269.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Al-Gburi, Qusay A., i Mohd Aifaa Mohd Ariff. "Dynamic Security Assessment for Power System Under Cyber-Attack". Journal of Electrical Engineering & Technology 14, nr 2 (15.01.2019): 549–59. http://dx.doi.org/10.1007/s42835-019-00084-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Mohan, Athira M., Nader Meskin i Hasan Mehrjerdi. "A Comprehensive Review of the Cyber-Attacks and Cyber-Security on Load Frequency Control of Power Systems". Energies 13, nr 15 (28.07.2020): 3860. http://dx.doi.org/10.3390/en13153860.

Pełny tekst źródła
Streszczenie:
Power systems are complex systems that have great importance to socio-economic development due to the fact that the entire world relies on the electric network power supply for day-to-day life. Therefore, for the stable operation of power systems, several protection and control techniques are necessary. The power system controllers should have the ability to maintain power system stability. Three important quantities that should be effectively controlled to maintain the stability of power systems are frequency, rotor angle, and voltage. The voltage control in power systems maintains the voltage and reactive power within the required limits and the power factor control enhances the efficiency of power distribution systems by improving load power factors. Among various controls, the frequency control is the most time-consuming control mechanism of power systems due to the involvement of mechanical parts. As the control algorithms of frequency stabilization deliver control signals in the timescale of seconds, load frequency control (LFC) systems cannot handle complicated data validation algorithms, making them more vulnerable to disturbances and cyber-attacks. In addition, the LFC system has extended digital layers with open communication networks and is designed to operate with less human intervention. Moreover, the frequency fluctuation due to load change or cyber-attack in one area affects all other interconnected areas, and thus threatens the stability of the entire network. Due to these circumstances, research activities are still carried out in the field of frequency control and cyber-security. In this paper, a comprehensive review of the cyber-security of the LFC mechanism in the power system is presented. The highlights of the paper include the identification of attack points of different configurations of the LFC system, discussion of the attack strategies, formulation of various attack models, and a brief review of the existing detection and defense mechanisms against cyber-attacks on LFC.
Style APA, Harvard, Vancouver, ISO itp.
10

Wadhawan, Yatin, Anas AlMajali i Clifford Neuman. "A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks". Electronics 7, nr 10 (13.10.2018): 249. http://dx.doi.org/10.3390/electronics7100249.

Pełny tekst źródła
Streszczenie:
In this paper, we present a comprehensive study of smart grid security against cyber-physical attacks on its distinct functional components. We discuss: (1) a function-based methodology to evaluate smart grid resilience against cyber-physical attacks; (2) a Bayesian Attack Graph for Smart Grid (BAGS) tool to compute the likelihood of the compromise of cyber components of the smart grid system; (3) risk analysis methodology, which combines the results of the function-based methodology and BAGS to quantify risk for each cyber component of the smart grid; and (4) efficient resource allocation in the smart grid cyber domain using reinforcement learning (extension of BAGS tool) to compute optimal policies about whether to perform vulnerability assessment or patch a cyber system of the smart grid whose vulnerability has already been discovered. The results and analysis of these approaches help power engineers to identify failures in advance from one system component to another, develop robust and more resilient power systems and improve situational awareness and the response of the system to cyber-physical attacks. This work sheds light on the interdependency between the cyber domain and power grid and demonstrates that the security of both worlds requires the utmost attention. We hope this work assists power engineers to protect the grid against future cyber-physical attacks.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Power System Cyber Security"

1

Sridharan, Venkatraman. "Cyber security in power systems". Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43692.

Pełny tekst źródła
Streszczenie:
Many automation and power control systems are integrated into the 'Smart Grid' concept for efficiently managing and delivering electric power. This integrated approach created several challenges that need to be taken into consideration such as cyber security issues, information sharing, and regulatory compliance. There are several issues that need to be addressed in the area of cyber security. Currently, there are no metrics for evaluating cyber security and methodologies to detect cyber attacks are in their infancy. There is a perceived lack of security built into the smart grid systems, but there is no mechanism for information sharing on cyber security incidents. In this thesis, we discuss the vulnerabilities in power system devices, and present ideas and a proposal towards multiple-threat system intrusion detection. We propose to test the multiple-threat methods for cyber security monitoring on a multi-laboratory test bed, and aid the development of a SCADA test bed, to be constructed on the Georgia Tech Campus.
Style APA, Harvard, Vancouver, ISO itp.
2

Giannini, Martina. "Improving Cyber-Security of Power System State Estimators". Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.

Pełny tekst źródła
Streszczenie:
During the last century, technological advances have deeply renewed many critical infrastructures, such as transportation networks and power systems. In fact, the strong interconnection between physical process, communication channels, and control systems have led to the new concept of cyber-physical systems. Next to countless new advantages, these systems unfortunately have also new weaknesses. An example is cyber-attacks: malicious intrusions into the communication channel turned to manipulate data. In this thesis the considered cyber-physical system is a power network where hundreds of eld devices are connected to a control center, which collects data and controls the whole system. A cyber-attack where the adversary model is based on the attacker's knowledge of the network topology and line parameters is considered. This work is focused on one of the features of the control center: the state estimator. After a preliminary analysis of the conventional state estimators with respect to cyber attacks constructed according to this adversary model, new ideas for improving the security of the system are presented. The aim of this thesis is to propose novel state estimators that are both accurate under no cyber-attack, and at the same time able to detect attacks that are undetectable by the conventional state estimator. This mainly involves introducing additional information about the system as constraints in the state estimator, under the assumption that the new information is not available to the adversary. At the end of the analysis of the new mathematical model of the state estimators, a new denition of undetectable attack is proposed. The functionality of the novel state estimators is demonstrated in numerical experiments, which have been performed on dierent benchmark power networks.
Style APA, Harvard, Vancouver, ISO itp.
3

Youssef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System". FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.

Pełny tekst źródła
Streszczenie:
The modern smart grid would involve deep integration between measurement nodes, communication systems, artificial intelligence, power electronics and distributed resources. On one hand, this type of integration can dramatically improve the grid performance and efficiency, but on the other, it can also introduce new types of vulnerabilities to the grid. To obtain the best performance, while minimizing the risk of vulnerabilities, the physical power system must be designed as a security aware system. In this dissertation, an interoperability and communication framework for microgrid control and Cyber Physical system enhancements is designed and implemented taking into account cyber and physical security aspects. The proposed data-centric interoperability layer provides a common data bus and a resilient control network for seamless integration of distributed energy resources. In addition, a synchronized measurement network and advanced metering infrastructure were developed to provide real-time monitoring for active distribution networks. A hybrid hardware/software testbed environment was developed to represent the smart grid as a cyber-physical system through hardware and software in the loop simulation methods. In addition it provides a flexible interface for remote integration and experimentation of attack scenarios. The work in this dissertation utilizes communication technologies to enhance the performance of the DC microgrids and distribution networks by extending the application of the GPS synchronization to the DC Networks. GPS synchronization allows the operation of distributed DC-DC converters as an interleaved converters system. Along with the GPS synchronization, carrier extraction synchronization technique was developed to improve the system’s security and reliability in the case of GPS signal spoofing or jamming. To improve the integration of the microgrid with the utility system, new synchronization and islanding detection algorithms were developed. The developed algorithms overcome the problem of SCADA and PMU based islanding detection methods such as communication failure and frequency stability. In addition, a real-time energy management system with online optimization was developed to manage the energy resources within the microgrid. The security and privacy were also addressed in both the cyber and physical levels. For the physical design, two techniques were developed to address the physical privacy issues by changing the current and electromagnetic signature. For the cyber level, a security mechanism for IEC 61850 GOOSE messages was developed to address the security shortcomings in the standard.
Style APA, Harvard, Vancouver, ISO itp.
4

Wang, Zhuoyang. "Application of Complex Network Theory in Power System Security Assessment". Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/17367.

Pełny tekst źródła
Streszczenie:
The power demand increases every year around the world with the growth of population and the expansion of cities. Meanwhile, the structure of a power system becomes increasing complex. Moreover, increasing renewable energy sources (RES) has linked to the power network at different voltage levels. These new features are expected to have a negative impact on the security of the power system. In recent years, complex network (CN) theory has been studied intensively in solving practical problems of large-scale complex systems. A new direction for power system security assessment has been provided with the developments in the CN field. In this thesis, we carry out investigations on models and approaches that aim to make the security assessment from an overview system level with CN theory. Initially, we study the impact of the renewable energy (RE) penetration level on the vulnerability in the future grid (FG). Data shows that the capacity of RE has been increasing over by 10% annually all over the world. To demonstrate the impact of unpredictable fluctuating characteristics of RES on the power system stability, a CN model given renewable energy integration for the vulnerability analysis is introduced. The numerical simulations are investigated based on the simplified 14-generator model of the South Eastern Australia power system. Based on the simulation results, the impact of different penetrations of RES and demand side management on the Australian FG is discussed. Secondly, the distributed optimization performance of the communication network topology in the photovoltaic (PV) and energy storage (ES) combined system is studied with CN theory. A Distributed Alternating Direction Method of Multipliers (D-ADMM) is proposed to accelerate the convergence speed in a large dimensional communication system. It is shown that the dynamic performance of this approach is highly-sensitive to the communication network topology. We study the variation of convergence speed under different communication network topology. Based on this research, guidance on how to design a relatively more optimal communication network is given as well. Then, we focus on a new model of vulnerability analysis. The existing CN models usually neglect the detailed electrical characteristics of a power grid. In order to address the issue, an innovative model which considers power flow (PF), one of the most important characteristics in a power system, is proposed for the analysis of power grid vulnerability. Moreover, based on the CN theory and the Max-Flow theorem, a new vulnerability index is presented to identify the vulnerable lines in a power system. The comparative simulations between the power flow model and existing models are investigated on the IEEE 118-bus system. Based on the PF model, we improve a power system cascading risk assessment model. In this research the risk is defined by the consequence and probabilities of the failures in the system, which is affected by both power factors and the network structure. Furthermore, a cascading event simulation module is designed to identify the cascading chain in the system during a failure. This innovation can form a better module for the cascading risk assessment of a power system. Finally, we argue that the current cyber-physical network model have their limitations and drawbacks. The existing “point-wise” failure model is not appropriate to present the interdependency of power grid and communication network. The interactions between those two interdependent networks are much more complicated than they were described in some the prior literatures. Therefore, we propose a new interdependency model which is based on earlier research in this thesis. The simulation results confirm the effectiveness of the new model in explaining the cascading mechanism in this kind of networks.
Style APA, Harvard, Vancouver, ISO itp.
5

Vuković, Ognjen, i György Dán. "On the Security of Distributed Power System State Estimation under Targeted Attacks". KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122442.

Pełny tekst źródła
Streszczenie:
State estimation plays an essential role in the monitoring and control of power transmission systems. In modern, highly inter-connected power systems the state estimation should be performed in a distributed fashion and requires information exchange between the control centers of directly connected systems. Motivated by recent reportson trojans targeting industrial control systems, in this paper we investigate how a single compromised control center can affect the outcome of distributed state estimation. We describe five attack strategies, and evaluate their impact on the IEEE 118 benchmark power system. We show that that even if the state estimation converges despite the attack, the estimate can have up to 30% of error, and bad data detection cannot locate theattack. We also show that if powerful enough, the attack can impede the convergence of the state estimation, and thus it can blind the system operators. Our results show that it is important to provide confidentiality for the measurement data in order to prevent the most powerful attacks. Finally, we discuss a possible way to detect and to mitigate these attacks.

QC 20130522

Style APA, Harvard, Vancouver, ISO itp.
6

Vuković, Ognjen. "Data Integrity and Availability in Power System Communication Infrastructures". Licentiate thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-122447.

Pełny tekst źródła
Streszczenie:
Society is increasingly dependent on the proper functioning of electric power systems. Today's electric power systems rely heavily on information and networking technology in order to achieve efficient and secure operation. Recent initiatives to upgrade power systems into smart grids target an even tighter integration with information and communication technologies in order to enable the integration of renewable energy sources, local and bulk generation and demand response. Therefore for a proper functioning of smart grids, it is essential that the communication network is secure and reliable both in the face of network failures and in the face of attacks. This thesis contributes to improving the security of power system applications against attacks on the communication infrastructure. The contributions lie in two areas. The first area is the interaction of network and transport layer protocols with power system application layer security. We consider single and multi-area power system state estimation based on redundant telemetry measurements. The state estimation is a basis for a set of applications used for information support in the control center, and therefore its security is an important concern. For the case of single-area state estimation, we look at the security of measurement aggregation over a wide area communication network. Due to the size and complexity of power systems, it can be prohibitively expensive to introduce cryptographic security in every component of the communication infrastructure. Therefore, we investigate how the application layer logic can be leveraged to optimize the deployment of network, transport and application layer security solutions. We define security metrics that quantify the importance of particular components of the network infrastructure. We provide efficient algorithms to calculate the metrics, and that allow identification of the weakest points in the infrastructure that have to be secured. For the case of multi-area state estimation, we look at the security of data exchange between the control centers of neighboring areas. Although the data exchange is typically cryptographically secure, the communication infrastructure of a control center may get compromised by a targeted trojan that could attack the data before the cryptographic protection is applied or after it is removed. We define multiple attack strategies for which we show that they can significantly disturb the state estimation. We also show a possible way to detect and to mitigate the attack. The second area is a study of the communication availability at the application layer. Communication availability in power systems has to be achieved in the case of network failures as well as in the case of attacks. Availability is not necessarily achieved by cryptography, since traffic analysis attacks combined with targeted denial-of-service attacks could significantly disturb the communication. Therefore, we study how anonymity networks can be used to improve availability, which comes at the price of increased communication overhead and delay. Because of the way anonymity networks operate, one would expect that availability would be improved with more overhead and delay. We show that surprisingly this is not always the case. Moreover, we show that it is better to overestimate than to underestimate the attacker's capabilities when configuring anonymity networks.

QC 20130522

Style APA, Harvard, Vancouver, ISO itp.
7

El, Hariri Mohamad. "Secure Control and Operation of Energy Cyber-Physical Systems Through Intelligent Agents". FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3854.

Pełny tekst źródła
Streszczenie:
The operation of the smart grid is expected to be heavily reliant on microprocessor-based control. Thus, there is a strong need for interoperability standards to address the heterogeneous nature of the data in the smart grid. In this research, we analyzed in detail the security threats of the Generic Object Oriented Substation Events (GOOSE) and Sampled Measured Values (SMV) protocol mappings of the IEC 61850 data modeling standard, which is the most widely industry-accepted standard for power system automation and control. We found that there is a strong need for security solutions that are capable of defending the grid against cyber-attacks, minimizing the damage in case a cyber-incident occurs, and restoring services within minimal time. To address these risks, we focused on correlating cyber security algorithms with physical characteristics of the power system by developing intelligent agents that use this knowledge as an important second line of defense in detecting malicious activity. This will complement the cyber security methods, including encryption and authentication. Firstly, we developed a physical-model-checking algorithm, which uses artificial neural networks to identify switching-related attacks on power systems based on load flow characteristics. Secondly, the feasibility of using neural network forecasters to detect spoofed sampled values was investigated. We showed that although such forecasters have high spoofed-data-detection accuracy, they are prone to the accumulation of forecasting error. In this research, we proposed an algorithm to detect the accumulation of the forecasting error based on lightweight statistical indicators. The effectiveness of the proposed algorithms was experimentally verified on the Smart Grid testbed at FIU. The test results showed that the proposed techniques have a minimal detection latency, in the range of microseconds. Also, in this research we developed a network-in-the-loop co-simulation platform that seamlessly integrates the components of the smart grid together, especially since they are governed by different regulations and owned by different entities. Power system simulation software, microcontrollers, and a real communication infrastructure were combined together to provide a cohesive smart grid platform. A data-centric communication scheme was selected to provide an interoperability layer between multi-vendor devices, software packages, and to bridge different protocols together.
Style APA, Harvard, Vancouver, ISO itp.
8

Wei, Longfei. "Game-Theoretic and Machine-Learning Techniques for Cyber-Physical Security and Resilience in Smart Grid". FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3850.

Pełny tekst źródła
Streszczenie:
The smart grid is the next-generation electrical infrastructure utilizing Information and Communication Technologies (ICTs), whose architecture is evolving from a utility-centric structure to a distributed Cyber-Physical System (CPS) integrated with a large-scale of renewable energy resources. However, meeting reliability objectives in the smart grid becomes increasingly challenging owing to the high penetration of renewable resources and changing weather conditions. Moreover, the cyber-physical attack targeted at the smart grid has become a major threat because millions of electronic devices interconnected via communication networks expose unprecedented vulnerabilities, thereby increasing the potential attack surface. This dissertation is aimed at developing novel game-theoretic and machine-learning techniques for addressing the reliability and security issues residing at multiple layers of the smart grid, including power distribution system reliability forecasting, risk assessment of cyber-physical attacks targeted at the grid, and cyber attack detection in the Advanced Metering Infrastructure (AMI) and renewable resources. This dissertation first comprehensively investigates the combined effect of various weather parameters on the reliability performance of the smart grid, and proposes a multilayer perceptron (MLP)-based framework to forecast the daily number of power interruptions in the distribution system using time series of common weather data. Regarding evaluating the risk of cyber-physical attacks faced by the smart grid, a stochastic budget allocation game is proposed to analyze the strategic interactions between a malicious attacker and the grid defender. A reinforcement learning algorithm is developed to enable the two players to reach a game equilibrium, where the optimal budget allocation strategies of the two players, in terms of attacking/protecting the critical elements of the grid, can be obtained. In addition, the risk of the cyber-physical attack can be derived based on the successful attack probability to various grid elements. Furthermore, this dissertation develops a multimodal data-driven framework for the cyber attack detection in the power distribution system integrated with renewable resources. This approach introduces the spare feature learning into an ensemble classifier for improving the detection efficiency, and implements the spatiotemporal correlation analysis for differentiating the attacked renewable energy measurements from fault scenarios. Numerical results based on the IEEE 34-bus system show that the proposed framework achieves the most accurate detection of cyber attacks reported in the literature. To address the electricity theft in the AMI, a Distributed Intelligent Framework for Electricity Theft Detection (DIFETD) is proposed, which is equipped with Benford’s analysis for initial diagnostics on large smart meter data. A Stackelberg game between utility and multiple electricity thieves is then formulated to model the electricity theft actions. Finally, a Likelihood Ratio Test (LRT) is utilized to detect potentially fraudulent meters.
Style APA, Harvard, Vancouver, ISO itp.
9

Klas, Juliana. "Advanced applications for state estimators in smart grids : identification, detection and correction of simultaneous measurement, parameter and topology cyber-attacks". reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/185233.

Pełny tekst źródła
Streszczenie:
Growing demand and concern over climate change are key drivers for renewable sources of electricity and grid modernization. Grid modernization, or the so called smart grid, not only enables renewable sources but also opens the door to new applications with far-reaching impacts such as preventing or restoring outages (self-healing capabilities), and enabling consumers to have greater control over their electricity consumption and to actively participate in the electricity market. According to the Electric Power Research Institute (EPRI), one of the biggest challenges facing smart grid deployment is related to the cyber security of the systems. The current cyber-security landscape is characterized by rapidly evolving threats and vulnerabilities that pose challenges for the reliability, security, and resilience of the electricity sector. Power system state estimators (PSSE) are critical tools for grid reliability, under a system observable scenario, they allow power flow optimization and detection of incorrect data. In this work cyber-attacks are modeled as malicious data injections on system measurements, parameters and topology. The contributions of this work are twofold. First, a model for cyber-attack as a false data injection detection and identification is presented. The presented model considers the minimization of the composed measurement error while applying the Lagrangian relaxation. The presented contribution, enables false data injection attacks detection even if this belongs to the subspace spanned by the columns of the Jacobian matrix and in network areas with low measurement redundancy Second, state-of-the-art solutions consider correction of parameters or topology when measurements are free of error. However, how may one correct measurements if parameters or topology might be simultaneously in error? To solve this problem, a relaxed model is presented and solved iteratively in a continuous manner. Once identified and detected, cyber-attacks in parameters, topology and measurements are corrected. The proposed solution is based on a Taylor series relaxed, composed normalized error (CNE) hybrid approach with Lagrange multipliers. Validation is made on the IEEE-14 and IEEE-57 bus systems. Comparative results highlight the proposed methodology’s contribution to the current state-of-the-art research on this subject. Providing mitigation, response and system recovery capabilities to the state estimator with reduced computational burden, the proposed model and methodology have strong potential to be integrated into SCADA state estimators for real-world applications.
O aumento da demanda e a preocupação com as mudanças climáticas são importantes motivadores para as fontes de energia renováveis e a modernização da rede elétrica. A modernização da rede elétrica inteligentes (REI) ou smart grid, não somente possibilita as fontes de energia renováveis mas também abre portas à novas aplicações de grande impacto como a prevenção e restauração automática de falhas e a possibilidade dos consumidores terem grande controle sobre o consumo de eletricidade e atuação participativa no mercado de energia. De acordo com o Instituto Norte Americano de Pesquisas do Setor Elétrico, um dos principais desafios a ser enfrentado no desenvolvimento das REIs é relacionado a segurança cibernética dos sistemas. O cenário da segurança cibernética atual é caracterizado pela rápida evolução dos riscos e vulnerabilidades que impõe desafios para a confiabilidade, segurança e resiliência do setor elétrico. Neste contexto, estimadores de estado do sistema de potência são ferramentas críticas para a confiabilidade da rede, sob um cenário de observabilidade do sistema eles possibilitam o fluxo de potência do sistema e a análise de dados incorretos. Neste trabalho, ataques cibernéticos são modelados como injeção de dados incorretos em medidas, parâmetros e topologia do sistema. A metodologia proposta possibilita detecção de ataques mesmo se eles pertencerem ao subespaço ortogonal formado pelas colunas da matriz Jacobiana e em áreas do sistema com reduzida redundância de medidas. A solução proposta pelo estado da arte considera correções em parâmetros ou topologia quando medidas estão livres de erros. Porém, como pode-se corrigir medidas se parâmetros ou a topologia estão simultaneamente com erros? Para resolver este problema um modelo relaxado é proposto e resolvido iterativamente. Assim que detectado e identificado, ataques cibernéticos em parâmetros, topologia e/ou medidas são corrigidos. As contribuições específicas do trabalho são: cálculo do desvio padrão para pseudomedidas (iguais à zero) e medidas de baixa magnitude baseado em medidas correlatas e propriedades da covariância; modelo baseado em relaxação lagrangiana e erro composto de medida para identificação e detecção de ataques cibernéticos; estratégia hibrida de relaxamento iterativo (EHRI) para correção de ataque cibernético em parâmetros da rede de modo contínuo e com reduzido esforço computacional e metodologia baseada em ciclo holístico de resiliência para estimadores de estado sob ataques cibernéticos simultâneos em parâmetros, topologia e medidas. A validação é feita através dos sistemas de teste do IEEE de 14 e 57 barras, testes comparativos elucidam as contribuições da metodologia proposta ao estado da arte nesta área de pesquisa. Trazendo as capacidades de mitigação, resposta e recuperação ao estimador de estado com esforço computacional reduzido, o modelo e metodologia propostos tem grande potencial de ser integrado em SCADAs para aplicação em casos reais.
Style APA, Harvard, Vancouver, ISO itp.
10

Akbar, Yousef M. A. H. "Intrusion Detection of Flooding DoS Attacks on Emulated Smart Meters". Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98554.

Pełny tekst źródła
Streszczenie:
The power grid has changed a great deal from what has been generally viewed as a traditional power grid. The modernization of the power grid has seen an increase in the integration and incorporation of computing and communication elements, creating an interdependence of both physical and cyber assets of the power grid. The fast-increasing connectivity has transformed the grid from what used to be primarily a physical system into a Cyber- Physical System (CPS). The physical elements within a power grid are well understood by power engineers; however, the newly deployed cyber aspects are new to most researchers and operators in this field. The new computing and communications structure brings new vulnerabilities along with all the benefits it provides. Cyber security of the power grid is critical due to the potential impact it can make on the community or society that relies on the critical infrastructure. These vulnerabilities have already been exploited in the attack on the Ukrainian power grid, a highly sophisticated, multi-layered attack which caused large power outages for numerous customers. There is an urgent need to understand the cyber aspects of the modernized power grid and take the necessary precautions such that the security of the CPS can be better achieved. The power grid is dependent on two main cyber infrastructures, i.e., Supervisory Control And Data Acquisition (SCADA) and Advanced Metering Infrastructure (AMI). This thesis investigates the AMI in power grids by developing a testbed environment that can be created and used to better understand and develop security strategies to remove the vulnerabilities that exist within it. The testbed is to be used to conduct and implement security strategies, i.e., an Intrusion Detections Systems (IDS), creating an emulated environment to best resemble the environment of the AMI system. A DoS flooding attack and an IDS are implemented on the emulated testbed to show the effectiveness and validate the performance of the emulated testbed.
M.S.
The power grid is becoming more digitized and is utilizing information and communication technologies more, hence the smart grid. New systems are developed and utilized in the modernized power grid that directly relies on new communication networks. The power grid is becoming more efficient and more effective due to these developments, however, there are some considerations to be made as for the security of the power grid. An important expectation of the power grid is the reliability of power delivery to its customers. New information and communication technology integration brings rise to new cyber vulnerabilities that can inhibit the functionality of the power grid. A coordinated cyber-attack was conducted against the Ukrainian power grid in 2015 that targeted the cyber vulnerabilities of the system. The attackers made sure that the grid operators were unable to observe their system being attacked via Denial of Service attacks. Smart meters are the digitized equivalent of a traditional energy meter, it wirelessly communicates with the grid operators. An increase in deployment of these smart meters makes it such that we are more dependent on them and hence creating a new vulnerability for an attack. The smart meter integration into the power grid needs to be studied and carefully considered for the prevention of attacks. A testbed is created using devices that emulate the smart meters and a network is established between the devices. The network was attacked with a Denial of Service attack to validate the testbed performance, and an Intrusion detection method was developed and applied onto the testbed to prove that the testbed created can be used to study and develop methods to cover the vulnerabilities present.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Power System Cyber Security"

1

Lukszo, Zofia. Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure. Dordrecht: Springer Science+Business Media B.V., 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Cyber security: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Twelfth Congress, first session, to receive testimony on a joint staff discussion draft pertaining to cyber security of the bulk-power system and electric infrastructure and for other purposes, May 5, 2011. Washington: U.S. G.P.O., 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Lehto, Martti, i Pekka Neittaanmäki, red. Cyber Security: Power and Technology. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Lonergan, Shawn William. Cyber Power and the International System. [New York, N.Y.?]: [publisher not identified], 2017.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Securing the modern electric grid from physical and cyber attacks: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Eleventh Congress, first session, July 21, 2009. Washington: U.S. G.P.O., 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

National Institute of Standards and Technology (U.S.). Office of the National Coordinator for Smart Grid Interoperability. Guidelines for smart grid cyber security. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 2010.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

The cyber threat to control systems: Stronger regulations are necessary to secure the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 17, 2007. Washington: U.S. G.P.O., 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

United States. Congress. House. Committee on Homeland Security. Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. The cyber threat to control systems: Stronger regulations are necessary to secure the electric grid : hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first session, October 17, 2007. Washington: U.S. G.P.O., 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Implications of cyber vulnerabilities on the resilience and security of the electric grid: Hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 21, 2008. Washington: U.S. G.P.O., 2008.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Cyber warfare: The power of the unseen. New Delhi: KW Publishers in association with Centre for Air Power Studies, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Power System Cyber Security"

1

Liao, Weixian, i Pan Li. "Cascading Failure Attacks in the Power System". W Security of Cyber-Physical Systems, 53–79. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45541-5_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Kuusisto, Rauno, i Tuija Kuusisto. "Cyber Security Strategy Implementation Architecture in a Value System". W Cyber Security: Power and Technology, 49–62. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Chakhchoukh, Yacine, i Hideaki Ishii. "Cyber Security for Power System State Estimation". W Smart Grid Control, 241–56. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98310-3_15.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Shen, Xifeng, Ming Liu, Hua Liu, Jinfeng Dong, Guoqing Jiang i Xin Zhao. "System Design of Single On-line Uninterruptible Power Supply". W Cyber Security Intelligence and Analytics, 601–8. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_75.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Lu, Xiao, Lei Wei i Zhe Wang. "The Digital New Infrastructure Construction System of Provincial Power Grid". W Cyber Security Intelligence and Analytics, 158–65. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-96908-0_20.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Feng, Xiaomeng, Yang Liu i Shiyan Hu. "Machine Learning for Cyber-Physical Power System Security". W Machine Learning for Embedded System Security, 105–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94178-9_4.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Ju, Yige. "Application of Improved Particle Swarm Optimization Algorithm in Power Economic Dispatch System". W Cyber Security Intelligence and Analytics, 216–26. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-31775-0_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Harison, Elad, i Nezer Zaidenberg. "Survey of Cyber Threats in Air Traffic Control and Aircraft Communications Systems". W Cyber Security: Power and Technology, 199–217. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75307-2_12.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Wang, Ning, Xing Wen, Jinwei Zhu i Jiong Jiao. "Design of Intelligent Power Search Engine Selection System Based on Micro Service Architecture". W Cyber Security Intelligence and Analytics, 846–50. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_118.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Kuang, Zijia, Guihua Qiu i Zhirui Tang. "Design and Application Analysis of Network Command System for Power Grid Dispatching Operation". W Cyber Security Intelligence and Analytics, 80–87. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Power System Cyber Security"

1

Li, Bo, i Lichen Zhang. "Security analysis of cyber-physical system". W MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I: 1st International Conference on Materials Science, Energy Technology, Power Engineering (MEP 2017). Author(s), 2017. http://dx.doi.org/10.1063/1.4982543.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Bian, Yufang, Jing Li i Baojuan Yin. "Analysis of Cyber Security Incident in South Korean Nuclear Power Plant and Cyber Security Solutions for Nuclear Power Industrial Control System". W 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67577.

Pełny tekst źródła
Streszczenie:
South Korean nuclear power plant information leakage incident occurred in 2014. A hacker on the Internet issued four compressed files of Korean nuclear power plant, and threatened the nuclear power plant to stop related units. This paper reviews the cyber security incident and analyses the cause of the event. Then, it analyzes the security risks of industrial control system in nuclear power plants and proposes some suggestions to strengthen nuclear power cyber security.
Style APA, Harvard, Vancouver, ISO itp.
3

Gu, Liang, Yi An i Xin Zhou. "Network Security Analysis Method for Power System". W 2022 12th International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2022. http://dx.doi.org/10.1109/cyber55403.2022.9907699.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sukumara, T., S. D. Sudarsan, Janne Starck i Timothy R. Vittor. "Cyber Security – Securing electrical power transmission and distribution systems". W 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS). IEEE, 2018. http://dx.doi.org/10.1109/cccs.2018.8586822.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Hu, Bing, Longqiang Zhang, Zhiwu Guo, Youran Li, Wei Sun, Liang Zhou i Yong Tian. "Data Flow Based Cyber Security Defense-in-Depth Model of I&C System for Nuclear Power Plants". W 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67918.

Pełny tekst źródła
Streszczenie:
With the introduction of digital instrumentation system, the cyber security threat to nuclear power plants is becoming more and more serious. The existing cyber security standards of nuclear power plants still need to be improved, and the technology practice of defensive strategies is lacking all over the world. In this paper, based on the comparison of domestic and foreign regulations and standards, combined with the technical practice of I&C system overall plan, a defense-in-depth model based on data flow is proposed. The overall technical requirements, hierarchy, network model, cyber security basic requirements, cyber security interface and protection of digital assets are introduced, the application of the model and the direction of research on cyber security of nuclear power plant are prospected.
Style APA, Harvard, Vancouver, ISO itp.
6

Gol, Murat, i Ali Abur. "Effective measurement design for cyber security". W 2014 Power Systems Computation Conference (PSCC). IEEE, 2014. http://dx.doi.org/10.1109/pscc.2014.7038496.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Su, Sheng, Xianzhong Duan, Xiangjun Zeng, W. L. Chan i K. K. Li. "Context Information based Cyber Security Defense of Protection System". W 2007 IEEE Power Engineering Society General Meeting. IEEE, 2007. http://dx.doi.org/10.1109/pes.2007.385649.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Beasley, Christopher, G. Kumar Venayagamoorthy i Richard Brooks. "Cyber security evaluation of synchrophasors in a power system". W 2014 Clemson University Power Systems Conference (PSC). IEEE, 2014. http://dx.doi.org/10.1109/psc.2014.6808100.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Ni, Ming, Anurag K. Srivastava, Rui Bo i Jie Yan. "Design of A Game Theory Based Defense System for Power System Cyber Security". W 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER). IEEE, 2017. http://dx.doi.org/10.1109/cyber.2017.8446449.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Abegaz, Brook W. "ASCPN - A Security Evaluation System for Cyber Power Networks". W 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2019. http://dx.doi.org/10.1109/uemcon47517.2019.8992946.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Power System Cyber Security"

1

Peisert, Sean, Ciaran Roberts, Anna Scaglione, Mahdi Jamei, Reinhard Gentz, Charles Mcparland, Alex McEachren, Galen Rasche i Aaron Snyder. Supporting Cyber Security of Power Distribution Systems by Detecting Differences Between Real-time Micro-Synchrophasor Measurements and Cyber-Reported SCADA - Final Report. Office of Scientific and Technical Information (OSTI), grudzień 2020. http://dx.doi.org/10.2172/1755352.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Harris, Emilee. Success in Industrial Control System Cyber Security Training. Office of Scientific and Technical Information (OSTI), styczeń 2016. http://dx.doi.org/10.2172/1483594.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Wayne F. Boyer i Miles A. McQueen. Primer Control System Cyber Security Framework and Technical Metrics. Office of Scientific and Technical Information (OSTI), maj 2008. http://dx.doi.org/10.2172/935471.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Author, Not Given. Laboratory Cyber Security Assessment of the OSII SCADA Control System. Office of Scientific and Technical Information (OSTI), marzec 2010. http://dx.doi.org/10.2172/974248.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Sharland, Lisa, Netta Goussac, Emilia Currey, Genevieve Feely i Sarah O’Connor. System Update: Toward a Women, Peace and Cyber Security Agenda. United Nations Institute for Disarmament Research, wrzesień 2021. http://dx.doi.org/10.37559/gen/2021/03.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

May Robin Chaffin. NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses. Office of Scientific and Technical Information (OSTI), maj 2010. http://dx.doi.org/10.2172/983345.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Horowitz, Barry, Peter Beling, Kevin Skadron, Ron D. Williams i William Melvin. Security Engineering Project - System Aware Cyber Security for an Autonomous Surveillance System On Board an Unmanned Aerial Vehicle. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2014. http://dx.doi.org/10.21236/ada608340.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Pollock, Guylaine M., William Dee Atkins, Moses Daniel Schwartz, Adrian R. Chavez, Jorge Mario Urrea, Nicholas Pattengale, Michael James McDonald i in. Modeling and simulation for cyber-physical system security research, development and applications. Office of Scientific and Technical Information (OSTI), luty 2010. http://dx.doi.org/10.2172/1028942.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Hu, Tan Chang, i David G. Robinson. Cyber Security Indications and Warning System (SV): CRADA 1573.94 Project Accomplishments Summary. Office of Scientific and Technical Information (OSTI), wrzesień 2011. http://dx.doi.org/10.2172/1037742.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Franusich, Michael D. Security Hardened Cyber Components for Nuclear Power Plants: Phase I SBIR Final Technical Report. Office of Scientific and Technical Information (OSTI), marzec 2016. http://dx.doi.org/10.2172/1242462.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii