首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13篇
  免费   1篇
  国内免费   3篇
电工技术   11篇
一般工业技术   1篇
自动化技术   5篇
  2022年   5篇
  2021年   4篇
  2020年   1篇
  2019年   3篇
  2017年   1篇
  2016年   3篇
排序方式: 共有17条查询结果,搜索用时 0 毫秒
11.
刘依晗  王宇飞 《中国电力》2022,55(2):62-72,81
新型电力系统实现了新能源电源与多元负荷的广域互联以及信息流与能量流的动态交互,但亦面临愈加严峻的安全威胁.攻击者可发动网络攻击,在多个电力节点引发一系列时空协同的电力故障,形成跨越信息域与电力域的连锁故障,破坏新型电力系统稳定运行.在此背景下,对跨域连锁故障的演化机理与主动防御机制展开研究.首先,根据新型电力系统的架构...  相似文献   
12.
随着先进通信与信息技术的广泛应用,虚假数据注入攻击已成为威胁自动发电控制系统安全的重要因素之一。网络攻击的检测是防御的首要任务,文中提出了一种基于集员滤波的自动发电控制系统虚假数据注入攻击检测方法。首先,针对自动发电控制系统中虚假数据注入攻击的影响进行了分析,并建立了互联电网自动发电控制系统模型以及虚假数据注入攻击的模型。其次,基于实时自动发电控制系统的控制指令以及测量数据,对自动发电控制系统椭球集进行预测更新和测量更新,通过判断预测更新椭球集与测量更新椭球集之间是否存在交集,检测系统的数据传输中可能存在的虚假数据注入攻击。最后,在IEEE标准双区域互联电网中验证了所提方法的有效性。  相似文献   
13.
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study observed information security awareness, policy, experience, attitude, subjective norms, perceived behavioral control, threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident handling. The data analysis did not support threat severity relationship with conscious care behaviour. The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management.  相似文献   
14.
The construction industry has long faced the challenge of introducing collaborative systems among multiple stakeholders. This challenge creates a high level of rigidity in terms of processing shared information related to different processes, robust holistic regulations, payment actualizations, and resource utilization across different nodes. The need for a digital platform to cross-connect all stakeholders is necessary. A blockchain-based platform is a prime candidate to improve the industry in general and the construction supply chain (CSC) in particular. In this paper, a literature review is presented to establish the main challenges that CSC faces in terms of its effects on productivity and efficiency. In addition, the effect of applying blockchain platforms on a case study is presented and analyzed from performance and security level. The analysis aims to emphasize that blockchain, as presented in this paper, is a viable solution to the challenges in the CSC regardless of the risks associated with the security and robustness of the flow of information and data protection. Moreover, a threat analysis of applying a blockchain model on the CSC industry is introduced. This model indicates potential attacks and possible countermeasures to prevent the attacks. Future work is needed to expand, quantify, and optimize the threat model and conduct simulations considering proposed countermeasures for the different blockchain attacks outlined in this study.  相似文献   
15.
变电站过程层与SMV安全传输的网络攻击检测与取证设计   总被引:1,自引:0,他引:1  
提出了现有条件下变电站过程层与采样测量值(SMV)安全传输的网络攻击检测与取证策略;设计了SMV数字签名验证、媒体访问控制(MAC)地址异常、SMV不良数据、数据包逻辑检测、数据流量阀值异常、一次故障相似、网络攻击相似、上送SMV伪造、上送SMV篡改等9种异常指示器,用于过程层及SMV变电站内及调控中心间传输的网络攻击在线检测、取证和监视。鉴于目前间隔装置尚无SMV报文认证及网络攻击检测功能,探索了代理认证加密网关以及代理检测的可行性。  相似文献   
16.
从针对电力信息物理系统(电力CPS)网络攻击的检测和保护两个方面,对当前国内外研究进行了梳理和归纳,发掘相关研究问题的本质和目的。在检测方面,介绍了基于偏差和特征的防御检测实现思路及其在信息侧和物理侧的实践方法;在保护方面,介绍了以被动防御为主的信息侧保护方法和基于资源配置和校正控制的物理侧保护方法。在现有研究基础上,对电力CPS网络攻击的检测和保护领域关键技术进行了提炼,并对未来研究方向进行了展望。  相似文献   
17.
黄鑫  陈德成  孙军  付蓉 《电测与仪表》2017,54(23):68-74
随着信息和通信技术的发展,传统电力系统已经转变成一个具有实时感知、动态控制和信息服务等功能的电力信息物理融合系统。信息系统在优化电力系统功能的同时,网络攻击带来的信息安全问题使电力系统的安稳运行敲响了警钟。文中针对电力信息物理融合系统环境下的网络攻击问题展开讨论,基于攻击目标的差异性对网络攻击进行分类。在研究图论攻击建模方式的基础上,提出网络攻击下实现系统综合安全评估的必要性。最后对电力信息物理融合系统的研究工作进行展望。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号