A New Brute-Force Attack Method for Power System Restoration and Reconfiguration

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Flow-based Brute-force Attack Detection

Brute-force attacks are a prevalent phenomenon that is getting harder to successfully detect on a network level due to increasing volume and encryption of network traffic and growing ubiquity of high-speed networks. Although the research in this field advanced considerably, there still remain classes of attacks that are undetectable. In this chapter, we present several methods for the detection...

متن کامل

A New Power System Restoration and Reconfiguration Using Field Programmable Gate Array

The aim of this paper is to optimize the system after restoring and reconfigure the faulted area in a distribution network after isolating the faulted block. Restoration involves changing the switch status to maximize the supply to loads that are left unsupplied after fault removal. After system optimization using reconfiguration, Field Programmable Gate Array (FPGA) is used in order to control...

متن کامل

A Denied-Events based Detection Method against SSH Brute-force Attack in Supercomputing Service Environment

The brute-force attack is one of general cyber security threats in supercomputing service environment using a secure shell (SSH) protocol. First we analyzed SSH bruteforce attacks had been detected through the log file parsing method of servers in the KISTI. We found that SSH bruteforce attacks are classified ’1:1’, ’1:N’ or ’N:1’ types of attack between source and destination IP address. And t...

متن کامل

A Fuzzy Brute Force Matching Method for Binary Image Features

Matching of binary image features is an important step in many different computer vision applications. Conventionally, an arbitrary threshold is used to identify a correct match from incorrect matches using Hamming distance which may improve or degrade the matching results for different input images. This is mainly due to the image content which is affected by the scene, lighting and imaging co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Soft Computing

سال: 2011

ISSN: 1816-9503

DOI: 10.3923/ijscomp.2011.16.19