期刊文献+
共找到30篇文章
< 1 2 >
每页显示 20 50 100
Fortifying Smart Grids: A Holistic Assessment Strategy against Cyber Attacks and Physical Threats for Intelligent Electronic Devices
1
作者 Yangrong Chen June Li +4 位作者 Yu Xia Ruiwen Zhang Lingling Li Xiaoyu Li Lin Ge 《Computers, Materials & Continua》 SCIE EI 2024年第8期2579-2609,共31页
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightene... Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication protocols.Smart grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for IEDs.Hence,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for IEDs.Initially,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security assessment.Subsequently,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal behaviors.This index system contains 18 indicators in 3 categories.Additionally,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and 5.The higher the level,the greater the security risk.Finally,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by IEDs.The results show that calculated security risk level based on the proposed assessment method are consistent with actual simulation.Thus,the reasonableness and effectiveness of the proposed index system and assessment method are validated. 展开更多
关键词 Smart grid intelligent electronic device security assessment abnormal behaviors network traffic running states
下载PDF
Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS
2
作者 Kenian Wang YuanHong Chunxiao Li 《Computers, Materials & Continua》 SCIE EI 2024年第7期1123-1142,共20页
With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental ... With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental security elements,such as assets,threats,and vulnerabilities,due to the confidentiality of airborne networks,resulting in cognitive uncertainty.Therefore,the Pythagorean fuzzy Analytic Hierarchy Process(AHP)Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks.First,Pythagorean fuzzy AHP is employed to construct an index system and quantify the pairwise comparison matrix for determining the index weights,which is used to solve the expert cognitive uncertainty in the process of evaluating the index system weight of airborne networks.Second,Pythagorean fuzzy the TOPSIS to an Ideal Solution is utilized to assess the risk prioritization of airborne networks using the Pythagorean fuzzy weighted distance measure,which is used to address the cognitive uncertainty in the evaluation process of various indicators in airborne network threat scenarios.Finally,a comparative analysis was conducted.The proposed method demonstrated the highest Kendall coordination coefficient of 0.952.This finding indicates superior consistency and confirms the efficacy of the method in addressing expert cognition during information security risk assessment for airborne networks. 展开更多
关键词 Airborne networks information security risk assessment cognitive uncertainty Pythagorean fuzzy sets
下载PDF
A Quantitative Security Metric Model for Security Controls:Secure Virtual Machine Migration Protocol as Target of Assessment 被引量:1
3
作者 Tayyaba Zeb Muhammad Yousaf +1 位作者 Humaira Afzal Muhammad Rafiq Mufti 《China Communications》 SCIE CSCD 2018年第8期126-140,共15页
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the... Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol. 展开更多
关键词 attack resiliency measure cost-benefit measure performance improvement factor security assessment formal verification security controls security metrics virtual machine migration protocol
下载PDF
A New Model for Network Security Situation Assessment of the Industrial Internet 被引量:1
4
作者 Ming Cheng Shiming Li +3 位作者 Yuhe Wang Guohui Zhou Peng Han Yan Zhao 《Computers, Materials & Continua》 SCIE EI 2023年第5期2527-2555,共29页
To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First... To address the problem of network security situation assessment in the Industrial Internet,this paper adopts the evidential reasoning(ER)algorithm and belief rule base(BRB)method to establish an assessment model.First,this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge.Second,the evaluation indicators are fused with expert knowledge and the ER algorithm.According to the fusion results,a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established,and the projection covariance matrix adaptive evolution strategy(P-CMA-ES)is used to optimize the model parameters.This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion.Moreover,it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data.Finally,a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method.The research results showthat this method has strong applicability to the network security situation assessment of complex Industrial Internet systems.It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures,thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet. 展开更多
关键词 Industrial internet network security situation assessment evidential reasoning belief rule base projection covariance matrix adaptive evolution strategy
下载PDF
Integrity Assessment of Medical Devices for Improving Hospital Services 被引量:3
5
作者 Fahad A.Alzahrani Masood Ahmad +2 位作者 Mohd Nadeem Rajeev Kumar Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第6期3619-3633,共15页
The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended obj... The present study examines the various techniques being used to maintain the integrity of the medical devices,and develops a quantitative framework to list these in the sequence of priority.To achieve the intended objective,the study employs the combined procedure of Fuzzy Analytic Network Process(ANP)and Fuzzy Technical for Order Preference by Similarities to Ideal Solution(TOPSIS).We selected fuzzy based decision making techniques for assessing the integrity of medical devices.The suggested methodology was then used for classifying the suitable techniques used to evaluate the integrity of medical devices.Different techniques or the procedures of integrity assessment were ranked according to their satisfaction weights.The rating of the options determined the order of priority for the procedures.As per the findings of the study,among all the options,A1 was assessed to be the most likely option.This means that the integrity of medical devices of A2 is the highest amongst all the chosen alternatives.This analysis will be a corroborative guideline for manufacturers and developers to quantitatively test the integrity of medical devices in order to engineer efficacious devices.The evaluations undertaken with the assistance of the planned procedure are accurate and conclusive.Hence instead of conducting a manual valuation,this experimental study is a better and reliable option for assessing the integrity of the medical devices. 展开更多
关键词 Integrity of the medical devices fuzzy-ANP.TOPSIS security assessment
下载PDF
Synthetic security assessment based on variable consistency dominance-based rough set approach 被引量:3
6
作者 赵亮 Xue Zhi 《High Technology Letters》 EI CAS 2010年第4期413-421,共9页
Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain univers... Security assessment can help understand the security conditions of an information system and yield results highly conducive to the solution of security problems in it. Taking the computer networks in a certain university as samples, this paper, with the information system security assessment model as its foundation, proposes a multi-attribute group decision-making (MAGDM) security assessment method based on a variable consistency dominance-based rough set approach (VC-DRSA). This assessment method combines VC-DRSA with the analytic hierarchy process (AHP), uncovers the inherent information hidden in data via the quality of sorting (QoS), and makes a synthetic security assessment of the information system after determining the security attribute weight. The sample findings show that this method can effectively remove the bottleneck of MAGDM, thus assuming practical significance in information system security assessment. 展开更多
关键词 multi-attribute group decision-making (MAGDM) security assessment variable consistency dominance-based rough set approach (VC-DRSA)
下载PDF
Resource Allocation for Network Security Risk Assessment:A Non-Cooperative Differential Game Based Approach 被引量:1
7
作者 XU Haitao LIN Ruijie 《China Communications》 SCIE CSCD 2016年第4期131-135,共5页
In this paper, we propose a non-cooperative differential game theory based resource allocation approach for the network security risk assessment. For the risk assessment, the resource will be used for risk assess, inc... In this paper, we propose a non-cooperative differential game theory based resource allocation approach for the network security risk assessment. For the risk assessment, the resource will be used for risk assess, including response cost and response negative cost. The whole assessment process is considered as a differential game for optimal resource control. The proposed scheme can be obtained through the Nash Equilibrium. It is proved that the game theory based algorithm is applicable and the optimal resource level can be achieved based on the proposed algorithm. 展开更多
关键词 resource allocation security risk assessment differential game NON-COOPERATIVE Nash Equilibrium
下载PDF
Hybrid Computational Modeling for Web Application Security Assessment 被引量:1
8
作者 Adil Hussain Seh Jehad F.Al-Amri +4 位作者 Ahmad F.Subahi Md Tarique Jamal Ansari Rajeev Kumar Mohammad Ubaidullah Bokhari Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2022年第1期469-489,共21页
Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the so... Transformation from conventional business management systems to smart digital systems is a recurrent trend in the current era.This has led to digital revolution,and in this context,the hardwired technologies in the software industry play a significant role However,from the beginning,software security remains a serious issue for all levels of stakeholders.Software vulnerabilities lead to intrusions that cause data breaches and result in disclosure of sensitive data,compromising the organizations’reputation that translates into,financial losses as well.Most of the data breaches are financially motivated,especially in the healthcare sector.The cyber invaders continuously penetrate the E-Health data because of the high cost of the data on the dark web.Therefore,security assessment of healthcare web-based applications demands immediate intervention mechanisms to weed out the threats of cyber-attacks.The aim of this work is to provide efficient and effective healthcare web application security assessment.The study has worked with the hybrid computational model of Multi-Criteria Decision Making(MCDM)based on Analytical Hierarchy Process(AHP)and Technique for Order of Preference by Similarity to Ideal-Solutions(TOPSIS)under the Hesitant Fuzzy(HF)environment.Hesitant fuzzy sets provide effective solutions to address decision making problems where experts counter hesitation to make a decision.The proposed research endeavor will support designers and developers in identifying,selecting and prioritizing the best security attributes for web applications’development.The empirical analysis concludes that Robustness got highest priority amongst the assessed security attributes set followed by Encryption,Authentication,Limit Access,Revoke Access,Data Validation,and Maintain Audit Trail.The results of this research endeavor depict that this proposed computational procedure would be the most conversant mechanism for determining the web application security.The study also establishes guidelines which the developers can refer for the identification and prioritization of security attributes to build more secure and trustworthy web-based applications. 展开更多
关键词 Healthcare web application security assessment hesitant fuzzy sets AHP-TOPSIS
下载PDF
Synthetic security assessment for incomplete interval-valued information system 被引量:1
9
作者 赵亮 Xue Zhi 《High Technology Letters》 EI CAS 2012年第2期160-166,共7页
In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group dec... In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group decision- making (MAGDM) security assessment method based on the technique for order performance by similarity to ideal solution (TOPSIS). For IllS with preference information, combining with dominance-based rough set approach (DRSA), the effect of incomplete interval-valued information on decision results is discussed. For the imprecise judgment matrices, the security attribute weight can be obtained using Gibbs sampling. A numerical example shows that the proposed method can acquire some valuable knowledge hidden in the incomplete interval-valued information. The effectiveness of the proposed method in the synthetic security assessment for IIIS is verified. 展开更多
关键词 security assessment incomplete interval-valued information system(IIIS) multi-attribute group decision-making(MAGDM) technique for order performance by similarity to ideal solution(TOPSIS) dominance- based rough set approach(DRSA) Gibbs sampling
下载PDF
Water Security-based Hydrological Regime Assessment Method for Lakes with Extreme Seasonal Water Level Fluctuations:A Case Study of Poyang Lake,China 被引量:2
10
作者 WAN Rongrong YANG Guishan +2 位作者 DAI Xue ZHANG Yanhui LI Bing 《Chinese Geographical Science》 SCIE CSCD 2018年第3期456-469,共14页
Extreme seasonal water level fluctuations characterize natural floodplain lakes in monsoon regions, which are crucial for ensuring lake water security, including flood prevention water supply and health of aquatic eco... Extreme seasonal water level fluctuations characterize natural floodplain lakes in monsoon regions, which are crucial for ensuring lake water security, including flood prevention water supply and health of aquatic ecosystem. In order to achieve this goal, we established a hydrological regime assessment method based on a set of hydrological indicators for lakes with heavy seasonal water level fluctuations. The results suggest that time-sensitive hydrological indicators and specific time scales for various water security aspects must be considered. We discovered that it is more practical and meaningful to combine the water level classification derived from statistical analyses with characteristic hydrological values linked to water security. The case study of Poyang Lake results show that there are no discernable trends of Poyang Lake water regime status over the last 35 years, and the two periods of poor status are in accordance with climate variation in the lake basin area. Scholars and policy makers should focus on both floods and droughts, which are the main water security problems for Poyang Lake. It is hoped that this multi-scale and multi-element hydrological regime assessment method will provide new guidelines and methods for other international scholars of river and lake water assessment. 展开更多
关键词 lake water regime assessment water security seasonal water level fluctuations natural lakes Poyang Lake
下载PDF
Crucial problems on security assessment of a building site adjacent to an excavated high slope
11
作者 文海家 ZHANG +1 位作者 Jialan 《Journal of Chongqing University》 CAS 2002年第2期38-41,共4页
The subject of this work is the assessment on the stability of an excavated high slope in order to insure the security of the building site adjacent to the slope, which is frequently encountered in town construction i... The subject of this work is the assessment on the stability of an excavated high slope in order to insure the security of the building site adjacent to the slope, which is frequently encountered in town construction in mountainous areas due to terrain limit. On the base of some typical engineering cases in Chongqing, several crucial problems on security assessment of building site adjacent to an excavated high slope, including the natural geological conditions and man-destroyed degree, engineering environment, potential failure pattern of the high slope, calculation parameters and analysis methods, are roundly discussed. It is demonstrated that the conclusion of security assessment can be determined according to the aspects above-mentioned, and the security assessment is one of the fundamental data to insure the safety of the related construction, site and buildings. 展开更多
关键词 excavated slope engineering environment geological condition security assessment
下载PDF
Ecological Security Assessment of Red River Basin in Guangxi
12
作者 CHEN Wu-kai HUANG Wan-chang ZHOU Xing 《Meteorological and Environmental Research》 CAS 2011年第9期56-61,共6页
[Objective] The study aimed at assessing the ecological security of Red River basin in Guangxi. [Method] Firstly, the ecological security assessment index system of Red River basin was established based on the framewo... [Objective] The study aimed at assessing the ecological security of Red River basin in Guangxi. [Method] Firstly, the ecological security assessment index system of Red River basin was established based on the framework of 'pressure-state-response' model, and index information of ecological security assessment was extracted by using RS and GIS technology; afterwards, the ecological security of Red River basin was divided into five grades according to ecological security index, and the distribution and characteristics of ecological security at various levels were analyzed; finally, the measures to maintain the ecological security of Red River basin were put forward on the basis of problems in ecological security. [Result] Most areas of Red River basin in Guangxi were in generally safe state, especially Lingyun County, Fengshan County, Du'an County, Dahua County, Shanglin County, Binyang County, Guiping City, etc., and the area accounted for 74.25% of total area; next came safer state (12.74%), the regions in the two states above were the most important environmental areas of Red River basin. The ecological security problems of Red River basin were mainly related to fragile ecological environment, lagging economic development, rapid population growth, excessive development and utilization of natural resources and so forth. [Conclusion] The research could provide scientific references for the rational development and utilization of land resources, protection and construction of ecological environment in Red River basin. 展开更多
关键词 Red River basin Ecological security assessment assessment index system Ecological security evaluation index Protection countermeasure China
下载PDF
Ecological Investigation and Ecological Security Assessment of Xizhijiang River Basin in Huizhou City of Guangdong Province
13
作者 Jianqiao QIN Zifeng HE +3 位作者 Jianmei CHEN Xiaoping HUANG Dongni YU Shaoli WU 《Asian Agricultural Research》 2021年第2期12-18,共7页
In addition to such ecological problems as the pollution of the water system,the unreasonable structure of the upstream Basin and the insufficient water conservation forests,the Xizhi River Basin also faces human deci... In addition to such ecological problems as the pollution of the water system,the unreasonable structure of the upstream Basin and the insufficient water conservation forests,the Xizhi River Basin also faces human decision-making problems such as imperfect ecological compensation mechanism.In view of the above problems,using the DPSIR model(Drivers,Pressures,States,Impacts,Responses),this paper analyzed eucalyptus forest in Xizhi River Basin to assess the security of the Xizhi River ecological Basin,and finally concluded that the ecological status of Xizhi River Basin remains safe. 展开更多
关键词 Xizhi River Basin Ecological security assessment DPSIR model
下载PDF
A Website Security Risk Assessment Method Based on the I-BAG Model
14
作者 Lin Liu Liang Liu +2 位作者 Cheng Huang Zhao Zhang Yong Fang 《China Communications》 SCIE CSCD 2016年第5期172-181,共10页
In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesi... In order to protect the website and assess the security risk of website, a novel website security risk assessment method is proposed based on the improved Bayesian attack graph(I-BAG) model. First, the Improved Bayesian attack graph model is established, which takes attack benefits and threat factors into consideration. Compared with the existing attack graph models, it can better describe the website's security risk. Then, the improved Bayesian attack graph is constructed with optimized website attack graph, attack benefit nodes, threat factor nodes and the local conditional probability distribution of each node, which is calculated accordingly. Finally, website's attack probability and risk value are calculated on the level of nodes, hosts and the whole website separately. The experimental results demonstrate that the risk evaluating method based on I-BAG model proposed is a effective way for assessing the website security risk. 展开更多
关键词 web security risk assessment attack graph Bayesian network
下载PDF
Critical Contingencies Ranking for Dynamic Security Assessment Using Neural Networks
15
作者 Gustavo Schweickardt Juan Manuel Gimenez-Alvarez 《Journal of Energy and Power Engineering》 2012年第10期1663-1672,共10页
A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the se... A number of contingencies simulated during dynamic security assessment do not generate unacceptable values of power system state variables, due to their small influence on system operation. Their exclusion from the set of contingencies to be simulated in the security assessment would achieve a significant reduction in computation time. This paper defines a critical contingencies selection method for on-line dynamic security assessment. The selection method results from an off-line dynamical analysis, which covers typical scenarios and also covers various related aspects like frequency, voltage, and angle analyses among others. Indexes measured over these typical scenarios are used to train neural networks, capable of performing on-line estimation of a critical contingencies list according to the system state. 展开更多
关键词 Critical contingencies dynamic security assessment neural networks.
下载PDF
Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method
16
作者 Wenshu Xu Mingwei Lin 《Computers, Materials & Continua》 SCIE EI 2023年第10期199-222,共24页
Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation inform... Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better. 展开更多
关键词 Multi-criteria decision-making distance measure probabilistic linguistic term sets industrial control system information security assessment
下载PDF
Understanding Discrepancy of Power System Dynamic Security Assessment with Unknown Faults: A Reliable Transfer Learning-based Method
17
作者 Chao Ren Han Yu +1 位作者 Yan Xu Zhao Yang Dong 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第1期427-431,共5页
This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown faults.It takes ind... This letter proposes a reliable transfer learning(RTL)method for pre-fault dynamic security assessment(DSA)in power systems to improve DSA performance in the presence of potentially related unknown faults.It takes individual discrepancies into consideration and can handle unknown faults with incomplete data.Extensive experiment results demonstrate high DSA accuracy and computational efficiency of the proposed RTL method.Theoretical analysis shows RTL can guarantee system performance. 展开更多
关键词 Adversarial training dynamic security assessment maximum classifier discrepancy missing data transfer learning
原文传递
Two-stage Transient-stability-constrained Optimal Power Flow for Preventive Control of Rotor Angle Stability and Voltage Sags
18
作者 Jorge Uriel Sevilla-Romero Alejandro Pizano-Martínez +1 位作者 Claudio Rubén Fuerte-Esquivel Reymundo Ramírez-Betancour 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第5期1357-1369,共13页
In practice,an equilibrium point of the power system is considered transiently secure if it can withstand a specified contingency by maintaining transient evolution of rotor angles and voltage magnitudes within set bo... In practice,an equilibrium point of the power system is considered transiently secure if it can withstand a specified contingency by maintaining transient evolution of rotor angles and voltage magnitudes within set bounds.A novel sequential approach is proposed to obtain transiently stable equilibrium points through the preventive control of transient stability and transient voltage sag(TVS)problems caused by a severe disturbance.The proposed approach conducts a sequence of non-heuristic optimal active power re-dispatch of the generators to steer the system toward a transiently secure operating point by sequentially solving the transient-stability-constrained optimal power flow(TSC-OPF)problems.In the proposed approach,there are two sequential projection stages,with the first stage ensuring the rotor angle stability and the second stage removing TVS in voltage magnitudes.In both projection stages,the projection operation corresponds to the TSC-OPF,with its formulation directly derived by adding only two steady-state variable-based transient constraints to the conventional OPF problem.The effectiveness of this approach is numerically demonstrated in terms of its accuracy and computational performance by using the Western System Coordinated Council(WSCC)3-machine 9-bus system and an equivalent model of the Mexican 46-machine 190-bus system. 展开更多
关键词 Dynamic security assessment transient stability transient voltage sag(TVS) optimal power flow(OPF)
原文传递
Towards an integrated risk analysis security framework according to a systematic analysis of existing proposals
19
作者 Antonio SANTOS-OLMO Luis Enrique SÁNCHEZ +4 位作者 David G.ROSADO Manuel A.SERRANO Carlos BLANCO Haralambos MOURATIDIS Eduardo FERNÁNDEZ-MEDINA 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第3期199-216,共18页
The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets.The availability of these systems is now vital for the protection and ev... The information society depends increasingly on risk assessment and management systems as means to adequately protect its key information assets.The availability of these systems is now vital for the protection and evolution of companies.However,several factors have led to an increasing need for more accurate risk analysis approaches.These are:the speed at which technologies evolve,their global impact and the growing requirement for companies to collaborate.Risk analysis processes must consequently adapt to these new circumstances and new technological paradigms.The objective of this paper is,therefore,to present the results of an exhaustive analysis of the techniques and methods offered by the scientific community with the aim of identifying their main weaknesses and providing a new risk assessment and management process.This analysis was carried out using the systematic review protocol and found that these proposals do not fully meet these new needs.The paper also presents a summary of MARISMA,the risk analysis and management framework designed by our research group.The basis of our framework is the main existing risk standards and proposals,and it seeks to address the weaknesses found in these proposals.MARISMA is in a process of continuous improvement,as is being applied by customers in several European and American countries.It consists of a risk data management module,a methodology for its systematic application and a tool that automates the process. 展开更多
关键词 information security management security system security risk assessment and management
原文传递
Probabilistic steady-state and dynamic security assessment of power transmission system 被引量:14
20
作者 LIU YanLi YU YiXin 《Science China(Technological Sciences)》 SCIE EI CAS 2013年第5期1198-1207,共10页
Two-level system model based probabilistic steady-state and dynamic security assessment model is introduced in this paper.Uncertainties of nodal power injection caused by wind power and load demand,steady-state and dy... Two-level system model based probabilistic steady-state and dynamic security assessment model is introduced in this paper.Uncertainties of nodal power injection caused by wind power and load demand,steady-state and dynamic security constraints and transitions between system configurations in terms of failure rate and repair rate are considered in the model.Time to insecurity is used as security index.The probability distribution of time to insecurity can be obtained by solving a linear vector differential equation.The coefficients of the differential equation are expressed in terms of configuration transition rates and security transition probabilities.The model is implemented in complex system successfully for the first time by using the following effective measures:firstly,calculating configuration transition rates effectively based on component state transition rate matrix and system configuration array;secondly,calculating the probability of random nodal power injection belonging to security region effectively according to practical parts of critical boundaries of security region represented by hyper-planes;thirdly,locating non-zero elements of coefficient matrix and then implementing sparse storage of coefficient matrix effectively;finally,calculating security region off-line for on-line use.Results of probabilistic security assessment can be used to conduct operators to analyze system security effectively and take preventive control.Test results on New England 10-generators and 39-buses power system verify the reasonableness and effectiveness of the method. 展开更多
关键词 power transmission system probabilistic security assessment time to insecurity security region uncertainties of windpower and load demand
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部