Cybersecurity challenges in energy sector (virtual power plants) - can edge computing principles be applied to enhance security?

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

Can Cybersecurity Be Proactive? A Big Data Approach and Challenges

The cybersecurity community typically reacts to attacks after they occur. Being reactive is costly and can be fatal where attacks threaten lives, important data, or mission success. But can cybersecurity be done proactively? Our research capitalizes on the Germination Period—the time lag between hacker communities discussing software flaw types and flaws actually being exploited—where proactive...

متن کامل

IBM Watson: How Cognitive Computing Can Be Applied to Big Data Challenges in Life Sciences Research.

Life sciences researchers are under pressure to innovate faster than ever. Big data offer the promise of unlocking novel insights and accelerating breakthroughs. Ironically, although more data are available than ever, only a fraction is being integrated, understood, and analyzed. The challenge lies in harnessing volumes of data, integrating the data from hundreds of sources, and understanding t...

متن کامل

A Bilevel Scheduling Approach for Modeling Energy Transaction of Virtual Power Plants in Distribution Networks

By increasing the use of distributed generation (DG) in the distribution network operation, an entity called virtual power plant (VPP) has been introduced to control, dispatch and aggregate the generation of DGs, enabling them to participate either in the electricity market or the distribution network operation. The participation of VPPs in the electricity market has made challenges to fairly a...

متن کامل

QoS applied to security in mobile computing

Hand-held mobile computers have the potential to become important communication tools for roaming users. As such, they will also become very personal. They will be used under a wide range of operating conditions, and tight user control will be enforced on issues like power consumption, consistency control, and trust management. Their ability to adapt will be the key to their success. In this pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Energy Informatics

سال: 2021

ISSN: 2520-8942

DOI: 10.1186/s42162-021-00139-7