Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?
نویسندگان
چکیده
منابع مشابه
Security Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملCan Cybersecurity Be Proactive? A Big Data Approach and Challenges
The cybersecurity community typically reacts to attacks after they occur. Being reactive is costly and can be fatal where attacks threaten lives, important data, or mission success. But can cybersecurity be done proactively? Our research capitalizes on the Germination Period—the time lag between hacker communities discussing software flaw types and flaws actually being exploited—where proactive...
متن کاملIBM Watson: How Cognitive Computing Can Be Applied to Big Data Challenges in Life Sciences Research.
Life sciences researchers are under pressure to innovate faster than ever. Big data offer the promise of unlocking novel insights and accelerating breakthroughs. Ironically, although more data are available than ever, only a fraction is being integrated, understood, and analyzed. The challenge lies in harnessing volumes of data, integrating the data from hundreds of sources, and understanding t...
متن کاملA Bilevel Scheduling Approach for Modeling Energy Transaction of Virtual Power Plants in Distribution Networks
By increasing the use of distributed generation (DG) in the distribution network operation, an entity called virtual power plant (VPP) has been introduced to control, dispatch and aggregate the generation of DGs, enabling them to participate either in the electricity market or the distribution network operation. The participation of VPPs in the electricity market has made challenges to fairly a...
متن کاملQoS applied to security in mobile computing
Hand-held mobile computers have the potential to become important communication tools for roaming users. As such, they will also become very personal. They will be used under a wide range of operating conditions, and tight user control will be enforced on issues like power consumption, consistency control, and trust management. Their ability to adapt will be the key to their success. In this pa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energy Informatics
سال: 2021
ISSN: 2520-8942
DOI: 10.1186/s42162-021-00139-7