Поиск по сайту

crime [x]

   


Результаты поиска ( Сортировать по релевантности | Отсортировано по дате )


Wavelet analysis of PMU measurements for identification of cyber attacks on TCMS

Kolosok I., Gurina L. Wavelet analysis of PMU measurements for identification of cyber attacks on TCMS // Proceedings - 2018 International Conference on Industrial Engineering, Applications and Manufacturing, ICIEAM 2018. ID: 8728768. ISBN (print): 9781538643075. DOI: 10.1109/ICIEAM.2018.8728768 The development of Russia's power industry is aimed at the establishment of smart grid and suggests wide application of new technologies, measurement devices, and advanced communications systems designed...

Теги: cyber attacks , pmu measurements , tcms , validation , wavelet analysis , computation theory , crime , data acquisition , distributed computer systems , electric power system security , electric power systems , electric power transmission networks , manufacture , netw
Раздел: ИСЭМ СО РАН
Resilience Assessment of the State Estimation Software under Cyber Attacks

Voropai N., Kolosok I., Korkina E. Resilience Assessment of the State Estimation Software under Cyber Attacks // E3S Web of Conferences. Vol.58. ID: 02013. 2018. DOI: 10.1051/e3sconf/20185802013 Taking into account Smart Grid creation, cyber security appears as critical problem. In spite of wide set of technical tools and organisational decisions, which use for protection of electrical objects against cyber attacks, it is impossible to prevent them completely. Therefore, the ability of Smart Grid...

Теги: crime , electric power systems , electric power transmission networks , network security , smart power grids , state estimation , critical problems , cyber security , determination methods , electric power , or
Раздел: ИСЭМ СО РАН
Decomposition of power system state estimation problem as a method to tackle cyber attacks

Kolosok I., Korkina E. Decomposition of power system state estimation problem as a method to tackle cyber attacks // Proceedings - 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018. P.398-403. ISBN (print): 9781538665312. DOI: 10.1109/ICPHYS.2018.8387691 Nowadays the operation of electric power systems (EPS) requires that measures against cyber attacks be taken not only to protect the process equipment but also to upgrade the software involved in the power system control. State estimation (SE)...

Теги: bad data detection , cyber attack , scada , state estimation , wams , computer crime , crime , electric control equipment , electric power system control , electric power systems , embedded systems , network security , problem solving , quality control , wide a
Раздел: ИСЭМ СО РАН
Calculation of cyber security index in the problem of power system state estimation based on SCADA and WAMS measurements

Kolosok I., Gurina L. Calculation of cyber security index in the problem of power system state estimation based on SCADA and WAMS measurements // Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol.8985. 2016. P.172-177. ISBN (print): 9783319316. DOI: 10.1007/978-3-319-31664-2_18 State estimation is an important procedure providing reliable quality information for control of electric power system (EPS). The paper...

Теги: crime , critical infrastructures , electric power system control , electric power system security , electric power systems , state estimation , bad data detections , cyber security , cyber-attacks , scada , tes
Раздел: ИСЭМ СО РАН
Development of a State Estimation Methodology to Improve the Quality of Control of the Boundary Areas of the Neighboring Smart Transmission Grids

Kolosok I., Korkina E. Development of a State Estimation Methodology to Improve the Quality of Control of the Boundary Areas of the Neighboring Smart Transmission Grids // IFAC-PapersOnLine. Vol.49. No.27. 2016. P.461-466. DOI: 10.1016/j.ifacol.2016.10.776 The reliable failure-free operation of electric power systems requires valid initial data. Technical failures or impact of cyber-attacks can cause partial loss or corruption of these data. If this happens at the boundary of the neighboring electric...

Теги: boundary conditions , crime , electric power system measurement , electric power systems , monitoring , state estimation , cyber-attacks , estimation methodologies , failure-free operations , quality of contro
Раздел: ИСЭМ СО РАН


x
x