Добірка наукової літератури з теми "Energy security system"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Energy security system".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Energy security system"
Morogov, Alexander. "DEVELOPMENT OF JAPAN'S ENERGY SECURITY SYSTEM." Security Index: A Russian Journal on International Security 16, no. 1 (February 2010): 95–100. http://dx.doi.org/10.1080/19934270903570778.
Повний текст джерелаNiu, Dong Xiao, Xin Lu, Huan Huan Qiao, and Hui Juan Zhai. "Research on Evaluation System of China’s Energy Security Considering Energy Transportation." Advanced Materials Research 535-537 (June 2012): 2049–52. http://dx.doi.org/10.4028/www.scientific.net/amr.535-537.2049.
Повний текст джерелаXiang, Bo, and Cai Liu. "Research on China’s Legal Protection System for Energy Security." Advanced Materials Research 805-806 (September 2013): 1466–71. http://dx.doi.org/10.4028/www.scientific.net/amr.805-806.1466.
Повний текст джерелаMouftah, H. T., R. Kun, and D. Hoffer. "A distributed energy management and security system." Journal of Microcomputer Applications 10, no. 1 (January 1987): 29–39. http://dx.doi.org/10.1016/0745-7138(87)90034-0.
Повний текст джерелаLi, Jing, Zhijie Shang, Ren Qiang, Jin Pang, Han Guo, Jingchu Wang, and Haihang Niu. "Energy Internet Security Risk Evaluation Index System." IOP Conference Series: Earth and Environmental Science 645 (January 26, 2021): 012045. http://dx.doi.org/10.1088/1755-1315/645/1/012045.
Повний текст джерелаShen, Pei, Sining Wang, and Nie Ling. "Research on Security Architecture of Global Energy Internet Standard Support System." E3S Web of Conferences 118 (2019): 01011. http://dx.doi.org/10.1051/e3sconf/201911801011.
Повний текст джерелаKoval, Viktor, Yevheniia Sribna, and Krzysztof Gaska. "Energy Cooperation Ukraine-Poland to Strengthen Energy Security." E3S Web of Conferences 132 (2019): 01009. http://dx.doi.org/10.1051/e3sconf/201913201009.
Повний текст джерелаJaysawal, Anoop. "Cyber Security in Smart Grid System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 341. http://dx.doi.org/10.23956/ijarcsse.v7i8.85.
Повний текст джерелаGlynn, James, Alessandro Chiodi, and Brian Ó Gallachóir. "Energy security assessment methods: Quantifying the security co-benefits of decarbonising the Irish Energy System." Energy Strategy Reviews 15 (March 2017): 72–88. http://dx.doi.org/10.1016/j.esr.2016.11.005.
Повний текст джерелаLukutin, Boris, and Violetta Kiushkina. "Intellectual energy security monitoring of decentralized systems of electricity with renewable energy sources." E3S Web of Conferences 69 (2018): 02002. http://dx.doi.org/10.1051/e3sconf/20186902002.
Повний текст джерелаДисертації з теми "Energy security system"
Jeffrey, Bernard Kucharski. "Energy security in Japan in the context of a planned energy system transition." Kyoto University, 2016. http://hdl.handle.net/2433/217192.
Повний текст джерелаChu, Weilian. "Evaluating effectiveness of an embedded system endpoint security technology on energy delivery systems." Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/121597.
Повний текст джерелаCataloged from PDF version of thesis.
Includes bibliographical references (pages 67-68).
The Internet of Things (IoT) is starting to take off in the modern day tech scene, with almost every user device being connected to a huge network with other devices; industrial energy delivery systems are no different. However, IoT in industry (known as IIoT) severely lags behind conventional IoT networks when it comes to cybersecurity, as IIoT endpoint devices generally lack the same level of memory and computation as conventional IoT endpoints. As a result, the same level of security measurements can't be implemented, and IIoT devices often are vulnerable to malicious users attempting to hack the device. The goal of this research is to create a lightweight software system that protects the endpoint devices from hackers, as well as prevent malicious accesses from impacting other parts of the system. This thesis will focus on the command and control unit, where the aim is to develop a neural net classifier to detect anomalies in network traffic. This thesis details the background surrounding IIoT endpoint devices, and the current attempts that have been made at providing a solution, as well as our approach to solving this problem, using both supervised and unsupervised machine learning approaches, and describe the testing environment with which the experiments were conducted. In the end we discuss how the work contributes to the future progress of IIoT security.
by Weilian Chu.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Vterkovska, V. "Fundamentals of geoinformation systems energy security of economic entities." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/65038.
Повний текст джерелаMelin, Erik. "Depoliticising Energy : A Review of Energy Security in Swedish Policy-Making." Thesis, Uppsala universitet, Institutionen för arkeologi och antik historia, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-353430.
Повний текст джерелаHomon, Bohdan. "Combined power supply system converting unit with renewable sources." Thesis, Дніпропетровський національний університет залізничного транспорту ім. академіка В. Лазаряна, 2017. https://er.knutd.edu.ua/handle/123456789/9329.
Повний текст джерелаСтаття присвячена питанню впровадження відновлювальних джерел енергії (сонячна батарея, вітрові турбіни) в місцевих електричних системах. Покращення та широке розповсюдження поновлюваних джерел енергії розподіленої генерації є одним із способів підвищення енергетичної безпеки країни.
Статья посвящена вопросу внедрения возобновляемых источников энергии (солнечная батарея, ветровые турбины) в местных электрических системах. Улучшение и широкое распространение возобновляемых источников энергии распределенной генерации является одним из способов повышения энергетической безопасности страны.
Chapman, Jeffrey W. (Jeffrey Wayne). "Power system control for large-disturbance stability : security, robustness and transient energy." Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/39393.
Повний текст джерелаIncludes bibliographical references (p. 223-228).
by Jeffrey Wayne Chapman.
Ph.D.
Foord, Wayne. "Energy scarcity and food security : strategies for transition to resilient food system governance." Thesis, Queen's University Belfast, 2016. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.705918.
Повний текст джерелаBlazeviciute, Lina. "Illustrative ElectricitySupply Scenarios and Sustainable Development in Lithuania." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-233643.
Повний текст джерелаNair, Nirmal-Kumar. "Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets." Texas A&M University, 2004. http://hdl.handle.net/1969.1/3199.
Повний текст джерелаYoussef, Tarek. "Co-design of Security Aware Power System Distribution Architecture as Cyber Physical System." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3210.
Повний текст джерелаКниги з теми "Energy security system"
Nihon Kokusai Fōramu. Policy Council. The 27th policy recommendations: The establishment of an international energy security system. Tokyo: Japan Forum on International Relations, 2006.
Знайти повний текст джерелаHeinrich Böll Foundation (Addis Ababa, Ethiopia) and Forum for Environment (Ethiopia), eds. Diversity and security for Ethiopian power system: A preliminary assessment of opportunities and risks for the power sector. Addis Ababa: HBF, 2009.
Знайти повний текст джерелаGuo ji neng yuan ji gou neng yuan an quan fa lü zhi du yan jiu: On the legal system of the international Energy Aagency for energy security. Beijing Shi: Zhongguo zheng fa da xue chu ban she, 2009.
Знайти повний текст джерелаKröger, Wolfgang. Vulnerable Systems. London: Springer-Verlag London Limited, 2011.
Знайти повний текст джерелаLobanov, Aleksey. Biomedical foundations of security. ru: INFRA-M Academic Publishing LLC., 2019. http://dx.doi.org/10.12737/1007643.
Повний текст джерелаEnvironmental Planning and Coordination Organization (Madhya Pradesh, India). Thematic position papers on water and sanitation, energy, health, agriculture and food security, biodiversity and eco-system management: With focus on Madhya Pradesh. Bhopal: Environmental Planning & Coordination Organisation, 2008.
Знайти повний текст джерелаRezendes, Victor S. Department of Energy: Improving management of major system acquisitions : statement by Victor S. Rezendes, Director, Energy, Resources, and Science Issues, Resources, Community, and Economic Development Division, before the Subcommittee on Energy and Environment, Committee on Science, House of Representatives. Washington, D.C: The Office, 1997.
Знайти повний текст джерелаOffice, General Accounting. Information system: Opportunities exist to strengthen SEC's oversight of capacity and security : report to the Ranking Minority Member, Committee on Energy and Commerce, House of Representatives. Washington, D.C: GAO, 2001.
Знайти повний текст джерелаCyber security: Hearing before the Committee on Energy and Natural Resources, United States Senate, One Hundred Twelfth Congress, first session, to receive testimony on a joint staff discussion draft pertaining to cyber security of the bulk-power system and electric infrastructure and for other purposes, May 5, 2011. Washington: U.S. G.P.O., 2011.
Знайти повний текст джерелаOffice, General Accounting. Homeland security: Communication protocols and risk communication principles can assist in refining the advisory system : report to congressional requesters. Washington, D.C: U.S. General Accounting Office, 2004.
Знайти повний текст джерелаЧастини книг з теми "Energy security system"
Jia, Heping, Yi Ding, Yishuang Hu, and Yonghua Song. "Cyber-Physical System Security." In Energy Internet, 107–19. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45453-1_3.
Повний текст джерелаNarula, Kapil. "Global Energy System and Sustainable Energy Security." In Lecture Notes in Energy, 23–49. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1589-3_2.
Повний текст джерелаWalker, Sara L. "The UK Electricity System and Its Resilience." In Global Energy Policy and Security, 75–102. London: Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-5286-6_6.
Повний текст джерелаAlcaraz, Cristina, Angel Balastegui, and Javier Lopez. "Early Warning System for Cascading Effect Control in Energy Control Systems." In Critical Information Infrastructures Security, 55–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21694-7_5.
Повний текст джерелаAmrutha, A. A., P. Balachandra, and M. Mathirajan. "Low-Carbon Planning in A Resource-Constrained Electricity System: A Case Study from India." In Energy Security and Development, 111–32. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2065-7_7.
Повний текст джерелаJiang, Xiawei, Weidong Yi, Yongrui Chen, and Hao He. "Energy Efficient Smart Irrigation System Based on 6LoWPAN." In Cloud Computing and Security, 308–19. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_28.
Повний текст джерелаLiang, Lulu, Kai Zheng, Qiankun Sheng, Wei Wang, Rong Fu, and Xin Huang. "A Denial of Service Attack Method for IoT System in Photovoltaic Energy System." In Network and System Security, 613–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_48.
Повний текст джерелаHong, Insung, Jisung Byun, and Sehyun Park. "Lightweight Middleware-Based ZigBee Security in Building Energy Management System." In Information Security Applications, 151–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27890-7_13.
Повний текст джерелаJiang, Lijun, Weizhi Meng, Yu Wang, Chunhua Su, and Jin Li. "Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study." In Network and System Security, 199–213. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-64701-2_15.
Повний текст джерелаZeng, Qinghao, Renjun Tang, Xianjun Chen, Hang Pan, Jinlong Chen, and Hui Zhou. "Research on Building Energy Consumption Acquisition System Based on Configuration." In Cloud Computing and Security, 648–57. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00018-9_57.
Повний текст джерелаТези доповідей конференцій з теми "Energy security system"
Neto, C. A. S., M. A. Quadros, M. G. Santos, and Jorge Jardim. "Brazilian System Operator online security assessment system." In Energy Society General Meeting. IEEE, 2010. http://dx.doi.org/10.1109/pes.2010.5590039.
Повний текст джерелаHong Chen and Jianwei Liu. "Practices of system security pricing." In Energy Society General Meeting. IEEE, 2008. http://dx.doi.org/10.1109/pes.2008.4596585.
Повний текст джерелаAzadani, E. Nasr, S. H. Hosseinian, and J. Moghani. "Market clearing considering power system security." In Energy Conference (EPEC). IEEE, 2008. http://dx.doi.org/10.1109/epc.2008.4763394.
Повний текст джерелаBedekar, Vishwas, Mirza Bichurin, Ivan Solovjev, and Shashank Priya. "Multimodal energy harvesting system." In SPIE Defense, Security, and Sensing, edited by Nibir K. Dhar, Priyalal S. Wijewarnasuriya, and Achyut K. Dutta. SPIE, 2011. http://dx.doi.org/10.1117/12.884747.
Повний текст джерелаPrakash, Y. W., Vishakha Biradar, Shenil Vincent, Minto Martin, and Anita Jadhav. "Smart bluetooth low energy security system." In 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2017. http://dx.doi.org/10.1109/wispnet.2017.8300139.
Повний текст джерелаSaba, Amreen, and Nagarathna. "IOT based energy efficient security system." In 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, 2017. http://dx.doi.org/10.1109/icatcct.2017.8389120.
Повний текст джерелаWang, Fang, Jian Yang, Zhimin Wu, Xi Chen, and Jianzhong Yu. "Distributed Energy System Improving Security for City Energy Supply." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5304094.
Повний текст джерелаAlsayegh, Osamah. "Primary Energy System Chain Security Under the Energy Transition." In SPE Middle East Oil & Gas Show and Conference. SPE, 2021. http://dx.doi.org/10.2118/204893-ms.
Повний текст джерелаLerch, E., and U. Kerin. "Dynamic System Security Assessment using Inventive Simulation Techniques." In Power and Energy Systems. Calgary,AB,Canada: ACTAPRESS, 2010. http://dx.doi.org/10.2316/p.2010.701-021.
Повний текст джерелаKerin, Uros, Edwin Lerch, and Grega Bizjak. "Power system dynamic security inference — Conceptual solution." In Energy Society General Meeting. IEEE, 2010. http://dx.doi.org/10.1109/pes.2010.5588171.
Повний текст джерелаЗвіти організацій з теми "Energy security system"
Judson, Nicholas. Interdependence of the Electricity Generation System and the Natural Gas System and Implications for Energy Security. Fort Belvoir, VA: Defense Technical Information Center, May 2013. http://dx.doi.org/10.21236/ada584764.
Повний текст джерелаMiller, Craig, and Robert Larmouth. Energy Sector Security through a System for Intelligent, Learning Network Configuration Monitoring and Management (“Essence”). Office of Scientific and Technical Information (OSTI), May 2017. http://dx.doi.org/10.2172/1360111.
Повний текст джерелаErkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.
Повний текст джерелаStamp, Jason E., Jimmy Edward Quiroz, and Abraham Ellis. Cyber Security Gap Analysis for Critical Energy Systems (CSGACES). Office of Scientific and Technical Information (OSTI), August 2017. http://dx.doi.org/10.2172/1494189.
Повний текст джерелаPullammanappallil, Pratap, Haim Kalman, and Jennifer Curtis. Investigation of particulate flow behavior in a continuous, high solids, leach-bed biogasification system. United States Department of Agriculture, January 2015. http://dx.doi.org/10.32747/2015.7600038.bard.
Повний текст джерелаStamber, Kevin L., Andjelka Kelic, Robert A. Taylor, Jordan M. Henry, and Jason E. Stamp. Distributed Energy Systems: Security Implications of the Grid of the Future. Office of Scientific and Technical Information (OSTI), January 2017. http://dx.doi.org/10.2172/1341777.
Повний текст джерелаGadgil, Shrirang, Yow-Jian Lin, Abhrajit Ghosh, Sunil Samtani, Jaewon Kang, Bruce Siegell, Vikram Kaul, et al. Tools and Methods for Hardening Communication Security of Energy Delivery Systems. Office of Scientific and Technical Information (OSTI), September 2014. http://dx.doi.org/10.2172/1170365.
Повний текст джерелаBenton, Tim, Antony Froggatt, Laura Wellesley, Owen Grafham, Richard King, Neil Morisetti, James Nixey, and Patrick Schröder. The Ukraine war and threats to food and energy security: Cascading risks from rising prices and supply disruptions. Royal Institute of International Affairs, April 2022. http://dx.doi.org/10.55317/9781784135225.
Повний текст джерелаLewis, Dustin, and Naz Modirzadeh. Taking into Account the Potential Effects of Counterterrorism Measures on Humanitarian and Medical Activities: Elements of an Analytical Framework for States Grounded in Respect for International Law. Harvard Law School Program on International Law and Armed Conflict, May 2021. http://dx.doi.org/10.54813/qbot8406.
Повний текст джерелаRahimipour, Shai, and David Donovan. Renewable, long-term, antimicrobial surface treatments through dopamine-mediated binding of peptidoglycan hydrolases. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7597930.bard.
Повний текст джерела