Results 61 to 70 of about 6,331 (209)

ECIS: Energy‐Computing Integrated System

open access: yesEnergy Internet, Volume 2, Issue 2, Page 115-125, July 2025.
ABSTRACT With the growing demand for deep integration between computing power networks (CPNs) and energy systems (ESs), effective collaboration between these systems has become increasingly crucial. To facilitate such integration, this paper proposes an energy‐computing integrated system (ECIS), which consists of a four‐layer framework including a ...
Haoming Zhang   +5 more
wiley   +1 more source

Modeling and Integrating PV Stations into IEC 61850 XMPP Intelligent Edge Computing Gateway

open access: yesEnergies, 2019
Distributed energy resources (DERs) are being widely interconnected to electrical power grids. The dispersed and intermittent generational mixes bring technical and economic challenges to the power systems in terms of stability, reliability, and ...
Chun-Hung Liu, Jyh-Cherng Gu
doaj   +1 more source

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]

open access: yes, 2016
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah   +4 more
core   +1 more source

Research on the Adaptive Protection Method for Distribution Networks With Inverter‐Type Distributed Power Supplies: Based on Short‐Circuit Impedance Calculation

open access: yesEngineering Reports, Volume 7, Issue 4, April 2025.
If the linear node voltage equation set obtained from the faulty composite sequential network is solved directly by linear transformation, it is not possible to accurately calculate and obtain the fault current and the voltage at the merging point of IIDG.
Zhuoran Song   +5 more
wiley   +1 more source

Scenarios for the development of smart grids in the UK: literature review [PDF]

open access: yes, 2014
Smart grids are expected to play a central role in any transition to a low-carbon energy future, and much research is currently underway on practically every area of smart grids.
Axon, Colin   +8 more
core   +2 more sources

Smart grid architecture for rural distribution networks: application to a Spanish pilot network [PDF]

open access: yes, 2018
This paper presents a novel architecture for rural distribution grids. This architecture is designed to modernize traditional rural networks into new Smart Grid ones.
Díaz González, Francisco   +4 more
core   +3 more sources

Scalable cyber‐physical testbed for cybersecurity evaluation of synchrophasors in power systems

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
This paper introduces a synchrophasor‐based cyber‐physical power system testbed using the pySynphasor tool for emulating various cyber‐attacks on phasor measurement units (PMUs). The testbed combines real‐time simulation, virtual machines, network emulation, and packet manipulation for scalable cyber‐security testing, focussing on attacks like ARP ...
Shuvangkar Chandra Das   +2 more
wiley   +1 more source

STANDARDS IN CONTROL AND PROTECTION TEHNOLOGY FOR ELECTRIC POWER SYSTEMS [PDF]

open access: yes
The features of the standard IEC 16850 with respect to intelligent applications in substations are summarized. It is shown how modeling of functions independently from its allocation to devices allows optimizing existing applications and opening up for ...
Daniel COSTIANU   +3 more
core   +3 more sources

Analysing a multi‐stage cyber threat and its impact on the power system

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The work in this paper highlights the importance of the multi‐stage defence paradigm. The use case presented here shows a multi‐stage threat scenario on a power utility, from Stage 1—initial access to Stage 4—physical impact. Abstract Electric power systems are composed of physical and cyber sub‐systems. The sub‐systems depend on each other.
Leen Al Homoud   +5 more
wiley   +1 more source

Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security

open access: yesIEEE Access, 2019
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures.
S. M. Suhail Hussain   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy