Results 101 to 110 of about 74,542 (271)

Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid [PDF]

open access: yes, 2016
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily installable
Khan, Rafiullah   +4 more
core   +1 more source

SCEN‐SCADA Security: An Enhanced Osprey Optimization‐Based Cyber Attack Detection Model in Supervisory Control and Data Acquisition System Using Serial Cascaded Ensemble Network

open access: yesOptimal Control Applications and Methods, Volume 46, Issue 5, Page 2178-2199, September/October 2025.
An efficient and accurate cyber attack detection approach with less computational overhead is still a crucial research problem in SCADA. So, a novel and secure model for cyber attack detection in the SCADA system using advanced deep learning techniques together with the heuristic algorithm is executed in this research work. The weighted optimal feature
Fatimah Yaseen Hashim Alzubaidi   +3 more
wiley   +1 more source

A Gossip Algorithm based Clock Synchronization Scheme for Smart Grid Applications

open access: yes, 2017
The uprising interest in multi-agent based networked system, and the numerous number of applications in the distributed control of the smart grid leads us to address the problem of time synchronization in the smart grid.
Khandaker, Mohammad Aqib   +4 more
core   +1 more source

ECIS: Energy‐Computing Integrated System

open access: yesEnergy Internet, Volume 2, Issue 2, Page 115-125, July 2025.
ABSTRACT With the growing demand for deep integration between computing power networks (CPNs) and energy systems (ESs), effective collaboration between these systems has become increasingly crucial. To facilitate such integration, this paper proposes an energy‐computing integrated system (ECIS), which consists of a four‐layer framework including a ...
Haoming Zhang   +5 more
wiley   +1 more source

Application of MPLS-TP for transporting power system protection data [PDF]

open access: yes, 2016
Power utilities are increasingly dependent on the use of communications networks. These networks are evolving to be packet-based, rather than using conventional Time-Division Multiplexing (TDM) technologies.
Blair, Steven M.   +3 more
core   +1 more source

Comparative Reliability Analysis of Substation Automation Architecture Based on IEC 61850 Standard [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2016
Using IEC 61850 standard would increase the reliability and availability of electricity network and put a huge impact on network automation. Even though much research works has been done in substation system reliability, there is a few works in automated
A. Mokari-Bolhasan   +1 more
doaj  

Instantaneous and Definite Time Overcurrent Protection Algorithms [PDF]

open access: yes, 2015
The paper is focused on the instantaneous and definite time overcurrent protection algorithms. Overcurrent protection is one of the most used type of protection function. Algorithms are proposed according to IEC 60255-151.
Bajánek, T.
core  

Real-time compression of IEC 61869-9 sampled value data [PDF]

open access: yes, 2016
Fast-acting, yet cost-effective, communications is critical for smarter grid monitoring, protection, and control. This paper demonstrates a new approach for the real-time compression of Sampled Value (SV) data based on the IEC 61869-9 recommendations ...
Blair, Steven M.   +2 more
core   +1 more source

Evaluating XMPP Communication in IEC 61499-based Distributed Energy Applications

open access: yes, 2017
The IEC 61499 reference model provides an international standard developed specifically for supporting the creation of distributed event-based automation systems.
Andrén, Filip Pröstl   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy