Results 81 to 90 of about 69,448 (250)

Scenarios for the development of smart grids in the UK: literature review [PDF]

open access: yes, 2014
Smart grids are expected to play a central role in any transition to a low-carbon energy future, and much research is currently underway on practically every area of smart grids.
Axon, Colin   +8 more
core   +2 more sources

Protection of AC and DC Microgrids: Challenges, Solutions and Future Trends [PDF]

open access: yes, 2015
In future, distributed energy resources (RESs) will be utilized at consumption points. As a consequence, power flow and fault current would be bidirectional and topologydependent; and hence the conventional protection strategies would be inefficient ...
Beheshtaein, Siavash   +3 more
core   +2 more sources

SCEN‐SCADA Security: An Enhanced Osprey Optimization‐Based Cyber Attack Detection Model in Supervisory Control and Data Acquisition System Using Serial Cascaded Ensemble Network

open access: yesOptimal Control Applications and Methods, Volume 46, Issue 5, Page 2178-2199, September/October 2025.
An efficient and accurate cyber attack detection approach with less computational overhead is still a crucial research problem in SCADA. So, a novel and secure model for cyber attack detection in the SCADA system using advanced deep learning techniques together with the heuristic algorithm is executed in this research work. The weighted optimal feature
Fatimah Yaseen Hashim Alzubaidi   +3 more
wiley   +1 more source

ECIS: Energy‐Computing Integrated System

open access: yesEnergy Internet, Volume 2, Issue 2, Page 115-125, July 2025.
ABSTRACT With the growing demand for deep integration between computing power networks (CPNs) and energy systems (ESs), effective collaboration between these systems has become increasingly crucial. To facilitate such integration, this paper proposes an energy‐computing integrated system (ECIS), which consists of a four‐layer framework including a ...
Haoming Zhang   +5 more
wiley   +1 more source

Modeling and Integrating PV Stations into IEC 61850 XMPP Intelligent Edge Computing Gateway

open access: yesEnergies, 2019
Distributed energy resources (DERs) are being widely interconnected to electrical power grids. The dispersed and intermittent generational mixes bring technical and economic challenges to the power systems in terms of stability, reliability, and ...
Chun-Hung Liu, Jyh-Cherng Gu
doaj   +1 more source

IEC 61850-based WLAN peer-to-peer feeder protection improvement in smart grid substation automation system [PDF]

open access: yes, 2015
The development of a computational platform of a communication network for an automation system using the precepts of IEC 61850 has become a great trend in substation automation systems (SASs) research.
Ali, Nasser Hasan   +4 more
core  

Research on the Adaptive Protection Method for Distribution Networks With Inverter‐Type Distributed Power Supplies: Based on Short‐Circuit Impedance Calculation

open access: yesEngineering Reports, Volume 7, Issue 4, April 2025.
If the linear node voltage equation set obtained from the faulty composite sequential network is solved directly by linear transformation, it is not possible to accurately calculate and obtain the fault current and the voltage at the merging point of IIDG.
Zhuoran Song   +5 more
wiley   +1 more source

Scalable cyber‐physical testbed for cybersecurity evaluation of synchrophasors in power systems

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
This paper introduces a synchrophasor‐based cyber‐physical power system testbed using the pySynphasor tool for emulating various cyber‐attacks on phasor measurement units (PMUs). The testbed combines real‐time simulation, virtual machines, network emulation, and packet manipulation for scalable cyber‐security testing, focussing on attacks like ARP ...
Shuvangkar Chandra Das   +2 more
wiley   +1 more source

Analysing a multi‐stage cyber threat and its impact on the power system

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The work in this paper highlights the importance of the multi‐stage defence paradigm. The use case presented here shows a multi‐stage threat scenario on a power utility, from Stage 1—initial access to Stage 4—physical impact. Abstract Electric power systems are composed of physical and cyber sub‐systems. The sub‐systems depend on each other.
Leen Al Homoud   +5 more
wiley   +1 more source

Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security

open access: yesIEEE Access, 2019
There is growing awareness towards cybersecurity threats in power systems. IEC 61850 standard facilitates communication between different Intelligent Electronic devices (IEDs) and eases interoperable operation with set data and message structures.
S. M. Suhail Hussain   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy