Results 41 to 50 of about 63,500 (142)

SMART GRIDS LABORATORIES INVENTORY 2015 [PDF]

open access: yes, 2015
A smart electricity grid opens the door to a myriad of new applications aimed at enhancing security of supply, sustainability and market competitiveness.
ANDREADOU NIKOLETA   +5 more
core   +1 more source

Towards a Secure Smart Grid Storage Communications Gateway

open access: yes, 2017
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core   +1 more source

Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol [PDF]

open access: yes, 2017
The ISO/IEC 61850 protocol for substation automation is a key component for the safe and efficient operation of smart grids, whilst offering a substantial range of functions.
Wolthusen, Stephen, Wright, James
core   +1 more source

Information standards to support application and enterprise interoperability for the smart grid [PDF]

open access: yes, 2012
Copyright @ 2012 IEEE.Current changes in the European electricity industry are driven by regulatory directives to reduce greenhouse gas emissions, at the same time as replacing aged infrastructure and maintaining energy security.
Carter, A, Hargreaves, N, Taylor, GA
core   +1 more source

Safety and security risk assessment in cyber‐physical systems

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 4, Issue 3, Page 221-232, September 2019., 2019
The term cyber physical systems (CPS) refers to a new generation of systems with integrated computational and physical capabilities through computation, communication, and control. In the past decades, related techniques for CPS have been well studied and developed, and are widely applied in the fields such as industrial automation, smart ...
Xiaorong Lyu   +2 more
wiley   +1 more source

Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid

open access: yesEnergies, 2012
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard.
JungChan Na   +5 more
doaj   +1 more source

Application of NTRU Cryptographic Algorithm for securing SCADA communication

open access: yes, 2013
Supervisory Control and Data Acquisition (SCADA) system is a control system which is widely used in Critical Infrastructure System to monitor and control industrial processes autonomously.
Puliadi Premnath, Amritha
core   +1 more source

Structured approach to maintenance and modification of a railway traction IEC 61850 substation automation system

open access: yesThe Journal of Engineering, Volume 2018, Issue 15, Page 1365-1368, October 2018., 2018
Network Rail is currently electrifying one of the world's oldest main line railways, the Great Western main line between London and Cardiff. The traction system substations will incorporate full IEC 61850 functionality including the Rationalised Autotransformer Scheme: the world's first wide‐area traction protection scheme operating using GOOSE ...
David Hewings, Andrea Poczapsky
wiley   +1 more source

State‐of‐the‐art of cybersecurity in the power system: Simulation, detection, mitigation, and research gaps

open access: yesIET Generation, Transmission &Distribution, Volume 19, Issue 1, January/December 2025.
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei   +2 more
wiley   +1 more source

Cybersecurity for distributed energy resources and smart inverters

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 1, Issue 1, Page 28-39, December 2016., 2016
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third‐parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber‐attacks.
Junjian Qi   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy