Power System Reliability Evaluation With SCADA Cybersecurity Considerations
نویسندگان
چکیده
منابع مشابه
Industrial Cybersecurity for Power System and Scada
Many automation and modernization programs are now employing intranet/internet technologies in industrial control strategies. The ensuing systems are a mixture of state-of-the-art and legacy installations and create challenges in the implementation and enforcement of security measures. Control system intrusions can cause environmental damage, safety risks, poor quality and lost production. This...
متن کاملA Testbed for SCADA Control System Cybersecurity
This paper describes the Mississippi State University Supervisory Control and Data Acquisition (SCADA) security laboratory and Power and Energy Research laboratory. This laboratory combines process control systems from multiple critical infrastructure industries to create a testbed with functional physical processes controlled by commercial hardware and software over common industrial control s...
متن کاملPower System Reliability Analysis with Emergency Demand Response Program
With the development of restructured power systems and increase of prices in some hours of day and increase fuel price, demand response programs were noticed more by customers. demand response consists of a series of activities that governments or utilities design to change the amount or time of electric energy consumption, to achieve better social welfare or some times for maximizing the benef...
متن کاملPower System Reliability Analysis with Emergency Demand Response Program
With the development of restructured power systems and increase of prices in some hours of day and increase fuel price, demand response programs were noticed more by customers. demand response consists of a series of activities that governments or utilities design to change the amount or time of electric energy consumption, to achieve better social welfare or some times for maximizing the benef...
متن کاملCybersecurity Considerations for Information Systems
The significant efficiencies possible through the use of information technology in public systems are alluring, however, as the value of the information stored electronically increases, computer systems become targets for abuse and attack. To ensure continued public confidence in these systems, managers need to understand the impact of security shortcomings in their automated systems. A high le...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Smart Grid
سال: 2015
ISSN: 1949-3053,1949-3061
DOI: 10.1109/tsg.2015.2396994