Results 61 to 70 of about 652 (143)

Enhanced authentication and device integrity protection for GDOI using blockchain

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 35, Issue 5, May 2024.
Our work addresses the problem of device‐level cyber‐attacks such as device identity theft and introduction of fake nodes in GDOI‐enabled smart grids. It introduces a permissioned blockchain based device authentication management in the GDOI phase 1 and periodic device integrity check in phase 2 to achieve decentralized authentication and device‐level ...
Munkenyi Mukhandi   +3 more
wiley   +1 more source

Encryption for Industrial Control Systems: A Survey of Application-Level and Network-Level Approaches in Smart Grids

open access: yesJournal of Cybersecurity and Privacy
Industrial Control Systems (ICS) are fundamental to the operation, monitoring, and automation of critical infrastructure in sectors such as energy, water utilities, manufacturing, transportation, and oil and gas.
Mahesh Narayanan   +2 more
doaj   +1 more source

Protection of AC and DC Microgrids: Challenges, Solutions and Future Trends [PDF]

open access: yes, 2015
In future, distributed energy resources (RESs) will be utilized at consumption points. As a consequence, power flow and fault current would be bidirectional and topologydependent; and hence the conventional protection strategies would be inefficient ...
Beheshtaein, Siavash   +3 more
core   +2 more sources

Power quality measuring system [PDF]

open access: yes, 2011
Tato práce se zabývá problematikou měření kvality elektrické energie. Budou rozebrány parametry, dle kterých se kvalita hodnotí, dále budou popsány systémy dálkového sběru dat a s nimi spojené technologie přenosu.
Valenta, Jaroslav
core  

Exploring Cross-Substation Transfer Learning for Improving Cybersecurity in IEC 61850 Substations

open access: yesIEEE Access
The information security of IEC 61850-compliant substations is a growing concern for researchers and industry practitioners. IEC 62351, developed to address such concerns, recommends the use of intrusion detection systems (IDSs) as a defense, prompting ...
Filip Natvig   +2 more
doaj   +1 more source

A Geometrical Approach to Enhance Security Against Cyber Attacks in Digital Substations

open access: yesIEEE Access
Smart grid technology drives economic and social development but raises vulnerability to cyber threats due to digital substations’ growing reliance.
Mohamed F. Elrawy   +4 more
doaj   +1 more source

Основи інформаційної та кібернетичної безпеки та захисту інформації [PDF]

open access: yes, 2018
Робоча навчальна програма з курсу «Основи інформаційної та кібернетичної безпеки та захисту інформації» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі ...
Бурячок, Володимир Леонідович   +1 more
core   +1 more source

Стандарти безпеки та технології протидії кіберзлочинності [PDF]

open access: yes, 2018
Робоча навчальна програма з курсу «Стандарти безпеки та технології протидії кіберзлочинності» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо ...
Борсуковський, Юрій Володимирович
core  

Measurement re-ordering attacks on power system state estimation [PDF]

open access: yes, 2017
Power system state estimation is a prerequisite for detecting faults, directing power flows, and other tasks of Energy Management Systems. State estimators have conventionally filtered out so-called bad data or outliers, but in recent years a number of ...
Gul, Ammara, Wolthusen, Stephen
core   +1 more source

A survey on smart grid communication infrastructures: Motivations, requirements and challenges [PDF]

open access: yes, 2013
A communication infrastructure is an essential part to the success of the emerging smart grid. A scalable and pervasive communication infrastructure is crucial in both construction and operation of a smart grid.
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core   +1 more source

Home - About - Disclaimer - Privacy