Results 41 to 50 of about 63,500 (142)
SMART GRIDS LABORATORIES INVENTORY 2015 [PDF]
A smart electricity grid opens the door to a myriad of new applications aimed at enhancing security of supply, sustainability and market competitiveness.
ANDREADOU NIKOLETA +5 more
core +1 more source
Towards a Secure Smart Grid Storage Communications Gateway
This research in progress paper describes the role of cyber security measures undertaken in an ICT system for integrating electric storage technologies into the grid.
Marksteiner, Stefan, Vallant, Heribert
core +1 more source
Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol [PDF]
The ISO/IEC 61850 protocol for substation automation is a key component for the safe and efficient operation of smart grids, whilst offering a substantial range of functions.
Wolthusen, Stephen, Wright, James
core +1 more source
Information standards to support application and enterprise interoperability for the smart grid [PDF]
Copyright @ 2012 IEEE.Current changes in the European electricity industry are driven by regulatory directives to reduce greenhouse gas emissions, at the same time as replacing aged infrastructure and maintaining energy security.
Carter, A, Hargreaves, N, Taylor, GA
core +1 more source
Safety and security risk assessment in cyber‐physical systems
The term cyber physical systems (CPS) refers to a new generation of systems with integrated computational and physical capabilities through computation, communication, and control. In the past decades, related techniques for CPS have been well studied and developed, and are widely applied in the fields such as industrial automation, smart ...
Xiaorong Lyu +2 more
wiley +1 more source
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
In this paper, we analyze the Network and System Management (NSM) requirements and NSM data objects for the intrusion detection of power systems; NSM is an IEC 62351-7 standard.
JungChan Na +5 more
doaj +1 more source
Application of NTRU Cryptographic Algorithm for securing SCADA communication
Supervisory Control and Data Acquisition (SCADA) system is a control system which is widely used in Critical Infrastructure System to monitor and control industrial processes autonomously.
Puliadi Premnath, Amritha
core +1 more source
Network Rail is currently electrifying one of the world's oldest main line railways, the Great Western main line between London and Cardiff. The traction system substations will incorporate full IEC 61850 functionality including the Rationalised Autotransformer Scheme: the world's first wide‐area traction protection scheme operating using GOOSE ...
David Hewings, Andrea Poczapsky
wiley +1 more source
This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei +2 more
wiley +1 more source
Cybersecurity for distributed energy resources and smart inverters
The increased penetration of distributed energy resources (DER) will significantly increase the number of devices that are owned and controlled by consumers and third‐parties. These devices have a significant dependency on digital communication and control, which presents a growing risk from cyber‐attacks.
Junjian Qi +4 more
wiley +1 more source

