首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19篇
  免费   1篇
  国内免费   3篇
电工技术   13篇
一般工业技术   1篇
自动化技术   9篇
  2024年   2篇
  2023年   3篇
  2022年   6篇
  2021年   4篇
  2020年   1篇
  2019年   3篇
  2017年   1篇
  2016年   3篇
排序方式: 共有23条查询结果,搜索用时 0 毫秒
11.
Due to the tight coupling between the cyber and physical sides of a cyber-physical power system (CPPS), the safe and reliable operation of CPPSs is being increasingly impacted by cyber security. This situation poses a challenge to traditional security defense systems, which considers the threat from only one side, i.e., cyber or physical. To cope with cyber-attacks, this paper reaches beyond the traditional one-side security defense systems and proposes the concept of cyber-physical coordinated situation awareness and active defense to improve the ability of CPPSs. An example of a regional frequency control system is used to show the validness and potential of this concept. Then, the research framework is presented for studying and implementing this concept. Finally, key technologies for cyber-physical coordinated situation awareness and active defense against cyber-attacks are introduced.  相似文献   
12.
    
This work investigates the security sliding mode control problem of uncertain discrete-time systems under an unreliable network, in which denial of service and deception attacks may randomly occur in each sensor-to-controller channel. Two 2-valued variables are introduced to model the available state signals for the controller side under random attacks. Meanwhile, by means of mapping rule, n$$ n $$ independent Markov chains are reformulated into a new Markov chain. And then, a hybrid-attack-probability dependent sliding function is constructed, and a desirable sliding mode controller is designed by adopting compensation strategy and available state signals. Moreover, sufficient conditions are derived, under which the closed-loop system achieve stochastic stability along a quasi sliding mode. Moreover, a cone complementarity linearization (CCL)-based iterative solving algorithm is proposed. Finally, simulation results are provided to verify the proposed security control approach.  相似文献   
13.
    
Recently, Blockchain cryptographic distributed transaction ledger technology finds its usage in many applications. The application's ledgers implemented through Blockchain, ensures tamper-proof transactions, and in turn the applications became robust enough against cyber-attack But still adversaries put forward their efforts in detecting the vulnerabilities in the infrastructure to execute their ill intent. In the literature, many counter measures techniques are presented to address the security breaches on the Blockchain. Detecting as well mitigating from the possible anomalies against on blockchain infrastructure through AI techniques is the greatest attempt of this article, and which is much needed now. Hence, this review article enlightens the readers with the essence of cyber security, the security aspects of Blockchain, its infrastructure vulnerabilities, various Blockchain-enabled use cases along with the their challenges. Primarily, anomaly detection on Blockchain infrastructure through Artificial Intelligence Techniques is focused. A detailed analysis of Artificial Intelligence Techniques in detecting the anomalies with the help of Blockchain and also how these two technologies complement each other was demonstrated with the help of suitable use cases. The merits, challenges along with the possible future directions, while integrating Blockchain with Artificial Intelligence Techniques are presented for the benefit of research community.  相似文献   
14.
针对传统三步迭代滤波算法在遭受网络攻击的情况下无法对系统状态进行估计的问题,提出一种扩展三步递归滤波算法,可以对遭受混合网络攻击的网络化系统进行状态估计.分别将拒绝服务(De-nial of Service,DoS)攻击建模为服从Bernoulli分布的随机变量,将虚假数据注入(False Data Injection,FDI)攻击描述为未知干扰输入项,对混合网络攻击下网络化系统的状态进行估计.通过设计新息对测量方程中的攻击信号进行估计,使用此估计值进一步修正新息,以便对系统状态进行估计.然后采用矩阵增广方式将状态方程中的攻击信号增广入系统状态值,继续设计新息对增广后的状态进行估计,此时可同时得到系统状态和2个攻击信号的估计值,且为最小方差无偏估计值.最后,使用数值仿真和无人机飞行模型仿真验证了滤波算法的有效性.  相似文献   
15.
    
Communication plays a vital role in incorporating smartness into the interconnected power system. However, historical records prove that the data transfer has always been vulnerable to cyber-attacks. Unless these cyber-attacks are identified and cordoned off, they may lead to black-out and result in national security issues. This paper proposes an optimal twostage Kalman filter(OTS-KF) for simultaneous state and cyberattack estimation in automatic generation control(AGC) system. Biases/cyber-attacks are modeled as unknown inputs in the AGC dynamics. Five types of cyber-attacks, i.e., false data injection(FDI), data replay attack, denial of service(DoS), scaling,and ramp attacks, are injected into the measurements and estimated using OTS-KF. As the load variations of each area are seldom available, OTS-KF is reformulated to estimate the states and outliers along with the load variations of the system. The proposed technique is validated on the benchmark two-area,three-area, and five-area power system models. The simulation results under various test conditions demonstrate the efficacy of the proposed filter.  相似文献   
16.
刘依晗  王宇飞 《中国电力》2022,55(2):62-72,81
新型电力系统实现了新能源电源与多元负荷的广域互联以及信息流与能量流的动态交互,但亦面临愈加严峻的安全威胁.攻击者可发动网络攻击,在多个电力节点引发一系列时空协同的电力故障,形成跨越信息域与电力域的连锁故障,破坏新型电力系统稳定运行.在此背景下,对跨域连锁故障的演化机理与主动防御机制展开研究.首先,根据新型电力系统的架构...  相似文献   
17.
随着先进通信与信息技术的广泛应用,虚假数据注入攻击已成为威胁自动发电控制系统安全的重要因素之一。网络攻击的检测是防御的首要任务,文中提出了一种基于集员滤波的自动发电控制系统虚假数据注入攻击检测方法。首先,针对自动发电控制系统中虚假数据注入攻击的影响进行了分析,并建立了互联电网自动发电控制系统模型以及虚假数据注入攻击的模型。其次,基于实时自动发电控制系统的控制指令以及测量数据,对自动发电控制系统椭球集进行预测更新和测量更新,通过判断预测更新椭球集与测量更新椭球集之间是否存在交集,检测系统的数据传输中可能存在的虚假数据注入攻击。最后,在IEEE标准双区域互联电网中验证了所提方法的有效性。  相似文献   
18.
    
The construction industry has long faced the challenge of introducing collaborative systems among multiple stakeholders. This challenge creates a high level of rigidity in terms of processing shared information related to different processes, robust holistic regulations, payment actualizations, and resource utilization across different nodes. The need for a digital platform to cross-connect all stakeholders is necessary. A blockchain-based platform is a prime candidate to improve the industry in general and the construction supply chain (CSC) in particular. In this paper, a literature review is presented to establish the main challenges that CSC faces in terms of its effects on productivity and efficiency. In addition, the effect of applying blockchain platforms on a case study is presented and analyzed from performance and security level. The analysis aims to emphasize that blockchain, as presented in this paper, is a viable solution to the challenges in the CSC regardless of the risks associated with the security and robustness of the flow of information and data protection. Moreover, a threat analysis of applying a blockchain model on the CSC industry is introduced. This model indicates potential attacks and possible countermeasures to prevent the attacks. Future work is needed to expand, quantify, and optimize the threat model and conduct simulations considering proposed countermeasures for the different blockchain attacks outlined in this study.  相似文献   
19.
    
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses. This research study draws upon the literature in the areas of information security, incident response, theory of planned behaviour, and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation. The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date, the 2018 SingHealth data breach. The single in-depth case study observed information security awareness, policy, experience, attitude, subjective norms, perceived behavioral control, threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident handling. The data analysis did not support threat severity relationship with conscious care behaviour. The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management.  相似文献   
20.
微电网的分布式控制方法依托稀疏通信网络,在受到网络攻击后可能严重影响控制效果,甚至造成系统失稳。考虑虚假数据注入(FDI)攻击,首先针对分布式控制方式下的孤岛交流微电网建立了FDI攻击的数学模型;其次,分析了系统受到FDI攻击后的脆弱性,并在此基础上,基于自适应控制原理提出了抵御FDI攻击的微电网分布式韧性控制方法,该方法能够在有界或无界的FDI攻击下使微电网实现既定控制目标,并具有良好的动态性能;然后,通过李雅普诺夫理论对分布式韧性控制器进行了严格的收敛性证明;最后,通过时域仿真在多种场景下验证了所提控制方法的有效性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号