Dynamic Security Assessment
نویسندگان
چکیده
Vijay Vittal Arizona State University 15.1 Definitions and Historical Perspective ........................ 15-1 15.2 Criteria for Security ...................................................... 15-2 15.3 Assessment and Control ............................................... 15-3 15.4 Dynamic Phenomena of Interest ................................. 15-3 15.5 Timescales ...................................................................... 15-3 15.6 Transient Stability.......................................................... 15-4 15.7 Modeling ........................................................................ 15-4 15.8 Criteria and Methods.................................................... 15-5 Numerical Integration . Direct=Lyapunov Methods . Probabilistic Methods . Expert System Methods . Database or Pattern Recognition Methods 15.9 Recent Activity............................................................... 15-6 15.10 Off-Line DSA................................................................. 15-7 15.11 On-Line DSA ................................................................. 15-8 15.12 Status and Summary ..................................................... 15-8
منابع مشابه
SAMARA: Security Architecture Multi-Agent-based Risk Assessment
In this paper, we describe SAMARATM, a Security Agent-Based environment for security process design, management, and execution that integrates aspects of security process modeling, security assessment, and security management. SAMARA is targeted specifically to domains such as engineering security design in which the dynamic and uncertain nature of the security processes present management chal...
متن کاملIntegration of Dynamic Security Assessment and Stability Controls
Dynamic security assessment (DSA) or transient security assessment (TSA) determines a system’s ability to survive contingencies with a safety factor (margin). To ensure that a system remains dynamically secure, preventive or corrective remedial actions are designed. Preventive actions are applied in the pre-contingency system so that after any credible contingency the system remains secure. Exa...
متن کاملA risk model for cloud processes
Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...
متن کاملA Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directl...
متن کاملRisk Assessment for Airworthiness Security _last version_
The era of digital avionics is opening a fabulous opportunity to improve aircraft operational functions, airline dispatch and service continuity. But arising vulnerabilities could be an open door to malicious attacks. Necessity for security protection on airborne systems has been officially recognized and new standards are actually under construction. In order to provide development assurance a...
متن کاملUSING jFUZZY LOGIC FOR ANALYSIS OF POWER SYSTEM BASED ON DYNAMIC SECURITY ASSESSMENT
Power system and its security and analysis have been taken a major concern in day to day life. SECURITY evaluation is an important issue in planning and operation stages of an electric power system. This paper proposes a novel fuzzy logic Controller by using Jfuzzy Logic. A fuzzy logic-based classification method is developed to predict the security index of a given power system operating point...
متن کامل