Results 41 to 50 of about 8,366 (124)
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei +2 more
wiley +1 more source
Інформаційна безпека організації [PDF]
Робоча навчальна програма з курсу «Інформаційна безпека організації» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо-професійної програми ...
Борсуковський, Юрій Володимирович +1 more
core
Validating secure and reliable IP/MPLS communications for current differential protection [PDF]
Current differential protection has stringent real-time communications requirements and it is critical that protection traffic is transmitted securely, i.e., by using appropriate data authentication and encryption methods.
Blair, S.M. +6 more
core +1 more source
On the Detection of Cyber-Attacks in the Communication Network of IEC 61850 Electrical Substations [PDF]
The availability of the data within the network communication remains one of the most critical requirement when compared to integrity and confidentiality.
Elbez, Ghada
core +2 more sources
Energy Management Under Uncertainty for Hybrid Microgrids: From Data to Decision‐Making
This review explores energy management under uncertainty in hybrid microgrids, focusing on how data‐driven methods support robust decision‐making. It examines sources of uncertainty, such as forecast errors and modelling inaccuracies and reviews analytical and AI‐based strategies to manage them.
Farid Moazzen +3 more
wiley +1 more source
Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures [PDF]
The electricity industry is now at the verge of a new era. An era that promises, through the evolution of the existing electrical grids to Smart Grids, more efficient and effective power management, better reliability, reduced production costs and more ...
Komninos, N. +2 more
core +1 more source
Taxonomy and Survey on Cybersecurity Control Schemes for Smart Grids
This work presents a taxonomy and a survey of cybersecurity control schemes specifically tailored for smart grids, considering vulnerabilities in IEC 61850 and the corresponding IEC 62351 security requirements. The taxonomy considers deployment strategies, analysis methods, mitigated threats and protected applications in power systems.
Aldo Insfrán +2 more
wiley +1 more source
Energy management in microgrid and multi‐microgrid
This problem‐oriented study is the first to elaborate energy management in microgrid and multi‐microgrid from the perspective of energy utilization model. Then, a systematic hierarchical architecture is designed to incorporate stability, touch, efficiency, evenness, and resilience dimensions. Last, main energy management technologies are summarized and
Xueliang Xing, Limin Jia
wiley +1 more source
Основи інформаційної безпеки [PDF]
Робоча навчальна програма з курсу «Основи інформаційної безпеки» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо-професійної програми підготовки ...
Бурячок, Володимир Леонідович +1 more
core +3 more sources
A Test bed dedicated to the Study of Vulnerabilities in IEC 61850 Power Utility Automation Networks
International audienceIndustrial control systems rely more and more on digital technologies. Although the cyber risk such technologies induce is widely judged as serious, especially for critical infrastructures, these systems have generally not been ...
Kabir-Querrec, Maëlle +3 more
core +2 more sources

