Results 41 to 50 of about 8,366 (124)

State‐of‐the‐art of cybersecurity in the power system: Simulation, detection, mitigation, and research gaps

open access: yesIET Generation, Transmission &Distribution, Volume 19, Issue 1, January/December 2025.
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei   +2 more
wiley   +1 more source

Інформаційна безпека організації [PDF]

open access: yes, 2018
Робоча навчальна програма з курсу «Інформаційна безпека організації» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо-професійної програми ...
Борсуковський, Юрій Володимирович   +1 more
core  

Validating secure and reliable IP/MPLS communications for current differential protection [PDF]

open access: yes, 2016
Current differential protection has stringent real-time communications requirements and it is critical that protection traffic is transmitted securely, i.e., by using appropriate data authentication and encryption methods.
Blair, S.M.   +6 more
core   +1 more source

On the Detection of Cyber-Attacks in the Communication Network of IEC 61850 Electrical Substations [PDF]

open access: yes, 2022
The availability of the data within the network communication remains one of the most critical requirement when compared to integrity and confidentiality.
Elbez, Ghada
core   +2 more sources

Energy Management Under Uncertainty for Hybrid Microgrids: From Data to Decision‐Making

open access: yesIET Renewable Power Generation, Volume 19, Issue 1, January/December 2025.
This review explores energy management under uncertainty in hybrid microgrids, focusing on how data‐driven methods support robust decision‐making. It examines sources of uncertainty, such as forecast errors and modelling inaccuracies and reviews analytical and AI‐based strategies to manage them.
Farid Moazzen   +3 more
wiley   +1 more source

Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures [PDF]

open access: yes, 2014
The electricity industry is now at the verge of a new era. An era that promises, through the evolution of the existing electrical grids to Smart Grids, more efficient and effective power management, better reliability, reduced production costs and more ...
Komninos, N.   +2 more
core   +1 more source

Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids

open access: yesIET Smart Grid, Volume 8, Issue 1, January/December 2025.
This work presents a taxonomy and a survey of cybersecurity control schemes specifically tailored for smart grids, considering vulnerabilities in IEC 61850 and the corresponding IEC 62351 security requirements. The taxonomy considers deployment strategies, analysis methods, mitigated threats and protected applications in power systems.
Aldo Insfrán   +2 more
wiley   +1 more source

Energy management in microgrid and multi‐microgrid

open access: yesIET Renewable Power Generation, Volume 18, Issue 15, Page 3480-3508, 16 November 2024.
This problem‐oriented study is the first to elaborate energy management in microgrid and multi‐microgrid from the perspective of energy utilization model. Then, a systematic hierarchical architecture is designed to incorporate stability, touch, efficiency, evenness, and resilience dimensions. Last, main energy management technologies are summarized and
Xueliang Xing, Limin Jia
wiley   +1 more source

Основи інформаційної безпеки [PDF]

open access: yes, 2018
Робоча навчальна програма з курсу «Основи інформаційної безпеки» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо-професійної програми підготовки ...
Бурячок, Володимир Леонідович   +1 more
core   +3 more sources

A Test bed dedicated to the Study of Vulnerabilities in IEC 61850 Power Utility Automation Networks

open access: yes, 2016
International audienceIndustrial control systems rely more and more on digital technologies. Although the cyber risk such technologies induce is widely judged as serious, especially for critical infrastructures, these systems have generally not been ...
Kabir-Querrec, Maëlle   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy