期刊文献+
共找到306篇文章
< 1 2 16 >
每页显示 20 50 100
Cyber Resilience through Real-Time Threat Analysis in Information Security
1
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information security Network security Cyber Resilience Real-Time Threat analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation risk Assessment Vulnerability Management Incident Response security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling security Architecture
下载PDF
A Study on Quantitative Methodology to Assess Cyber Security Risk of Smart Grid
2
作者 Pil Sung Woo Byung-Hyun Ko +1 位作者 Dong-Joo Kang Balho H. Kim 《Energy and Power Engineering》 2013年第4期1312-1316,共5页
This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The SCADA system and other communication networks interact with the power system on a real ti... This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid. The SCADA system and other communication networks interact with the power system on a real time basis, so it is important to understand the interaction between two layers to protect the power system from potential cyber threats. This paper has shown the risks of the open architecture SCADA in a quantitative method and proposed effective security measures through case studies. 展开更多
关键词 smart grid CYBER security OPEN Architecture SCADA Power System VULNERABILITY risk Assessment
下载PDF
SOA Information Engineering System Based on Knowledge Grid Applications in Smart Grids
3
作者 Wang Jingmin Dong Bo 《Electricity》 2012年第4期16-19,共4页
Smart grids have the characteristics of being observable,controllable,adaptive,self-healing,embedded independent processing,and real-time analysis.With the development of smart grids,constructing a grid to cover globa... Smart grids have the characteristics of being observable,controllable,adaptive,self-healing,embedded independent processing,and real-time analysis.With the development of smart grids,constructing a grid to cover global,unified information systems,which should be adapted to fulf ill the requirements of the characteristics,is essential.This paper presents an service-oriented architecture(SOA)for smart grid information-engineering systems based on knowledge grid,which could form as a service-oriented architecture through business,technology and management;it would extract potentially valuable information from the massive amount of information on the generation side,the grid side,and the electricity side,then share the useful information to improve availability,security and stability. 展开更多
关键词 knowledge grid smart grid service-oriented architecture (SOA) information security
下载PDF
New “Intellectual Networks” (Smart Grid) for Detecting Electrical Equipment Faults, Defects and Weaknesses
4
作者 Alexander Yu. Khrennikov 《Smart Grid and Renewable Energy》 2012年第3期159-164,共6页
The most important elements of “intellectual networks” (Smart Grid) are the systems of monitoring the parameters of electrical equipment. Information-measuring systems (IMS), which described in this paper, were prop... The most important elements of “intellectual networks” (Smart Grid) are the systems of monitoring the parameters of electrical equipment. Information-measuring systems (IMS), which described in this paper, were proposed to use together with rapid digital protection against short-circuit regimes in transformer windings. This paper presents an application’s experience of LVI-testing, some results of the use of Frequency Response Analysis (FRA) to check the condition of transformer windings and infra-red control results of electrical equipment. The LVI method and short-circuit inductive reactance measurements are sensitive for detecting such faults as radial, axial winding deformations, a twisting of low-voltage or regulating winding, a losing of winding’s pressing and others. 展开更多
关键词 INTELLECTUAL NETWORKS smart grid Monitoring SYSTEM Electrical Equipment information-Measuring SYSTEM Frequency Response analysis Transformer WINDING Fault Diagnostic Low Voltage Impulse Method SHORT-CIRCUIT Inductive REACTANCE Measurement
下载PDF
Comprehensive security risk factor identification for small reservoirs with heterogeneous data based on grey relational analysis model 被引量:6
5
作者 Jing-chun Feng Hua-ai Huang +1 位作者 Yao Yin Ke Zhang 《Water Science and Engineering》 EI CAS CSCD 2019年第4期330-338,共9页
Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when ... Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when data are incomplete.The existing grey relational models have some disadvantages in measuring the correlation between categorical data sequences.To this end,this paper introduces a new grey relational model to analyze heterogeneous data.In this study,a set of security risk factors for small reservoirs was first constructed based on theoretical analysis,and heterogeneous data of these factors were recorded as sequences.The sequences were regarded as random variables,and the information entropy and conditional entropy between sequences were measured to analyze the relational degree between risk factors.Then,a new grey relational analysis model for heterogeneous data was constructed,and a comprehensive security risk factor identification method was developed.A case study of small reservoirs in Guangxi Zhuang Autonomous Region in China shows that the model constructed in this study is applicable to security risk factor identification for small reservoirs with heterogeneous and sparse data. 展开更多
关键词 security risk factor identification Heterogeneous data Grey relational analysis model Relational degree information entropy Conditional entropy Small reservoir GUANGXI
下载PDF
Smart Meter Deployment Threat and Vulnerability Analysis and Response
6
作者 Steven Dougherty Takaki Saitoh 《Journal of Energy and Power Engineering》 2015年第2期199-213,共15页
Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabiliti... Advanced intelligent or "smart" meters are being deployed in Asia. A result of deployment of smart meters, with associated equipment, is the electric power industry faced with new and changing threats, vulnerabilities and re-evaluate traditional approaches to cyber security. Protection against emerging cyber-security threats targeting smart meter infrastructures will increase risk to both the utility and customer if not addressed within initial rollouts. This paper will discuss the issues in SMI (smart meter infrastructures) deployments that pertain to cyber security. It will cover topics such as the threats to operations, infrastructure, network and people and organization and their associated risks. SMI deployments include not only the smart meter, but also the interfaces for home energy management systems as well as communication interfaces back to the utility. Utilities must recognize and anticipate the new threat landscape that can attack and compromise the meter and the associated field network collectors. They must also include threats to the WAN (wide-area-network) backhaul networks, smart meter headends, MDMS (meter data management systems) and their interfaces to CIS (customer information systems) and billing and OMS (outage management systems). Lessons learned from SMI implementations from North America, Europe and recently, Japan, will be discussed. How white-box and black-box testing techniques are applied to determine the threat impact to the SMI. Finally, organizational change risk will be discussed and how utilities have responded to re-organizing and developing a security governance structure for the SMI and other smart grid applications. 展开更多
关键词 smart meter infrastructure cyber security risk assessment threat analysis meter vulnerability security operation center privacy.
下载PDF
基于系统论事故分析模型的油气智慧管道系统信息物理风险辨识
7
作者 胡瑾秋 李瑜环 +1 位作者 张来斌 李馨怡 《科学技术与工程》 北大核心 2024年第15期6272-6280,共9页
为了辨识油气智慧管道系统中存在的信息安全风险,通过基于系统论事故分析模型(systems-theoretic accident modeling and process,STAMP)的方法,对油气智慧管道系统的信息物理安全进行全面评估与分析。首先,系统综合分析了油气智慧管道... 为了辨识油气智慧管道系统中存在的信息安全风险,通过基于系统论事故分析模型(systems-theoretic accident modeling and process,STAMP)的方法,对油气智慧管道系统的信息物理安全进行全面评估与分析。首先,系统综合分析了油气智慧管道涉及的设备、设施、工艺、元件,评估其安全性。其次,通过建立STAMP模型,深入分析了各层级、元件之间的反馈信息与控制动作,形成了明确的控制反馈回路,突显了元件之间的关联与控制关系。在此基础上,系统辨识出了潜在的信息风险因素,推导并构建了可能发生的系统失效场景。以天然气输气首站油气智慧管道系统为例,研究验证了基于STAMP模型的可行性和有效性。结果显示,该方法不仅直观地描述了元件之间的关联与控制关系,而且从物理层功能安全的角度全面考虑了信息风险,特别凸显了过程控制系统(process control systems,PCS)及易受攻击的操作员站。与传统方法相比,本研究所提出的方法将信息物理安全风险因素的识别率提升至80%以上,提高了40%以上,有助于避免不必要的安全措施冗余设计,提高了安全风险管控的准确性。 展开更多
关键词 油气智慧管道系统 信息物理安全 智能化风险辨识 STAMP 天然气输气首站
下载PDF
智慧城市网络信息安全风险评估模型及应用研究
8
作者 胡柳 《科技创新与生产力》 2024年第9期70-72,共3页
为了有效解决智慧城市建设过程中的网络信息安全风险带来危害的问题,在分析了国内学者对相关安全风险评估模型及指标研究的基础上,本文提出一种基于证据理论的“管理-技术-人员-评估-管理”闭环迭代的网络信息安全风险评估模型,为智慧... 为了有效解决智慧城市建设过程中的网络信息安全风险带来危害的问题,在分析了国内学者对相关安全风险评估模型及指标研究的基础上,本文提出一种基于证据理论的“管理-技术-人员-评估-管理”闭环迭代的网络信息安全风险评估模型,为智慧城市建设提供可借鉴的依据。 展开更多
关键词 智慧城市 信息安全 风险评估
下载PDF
基于TOPSIS和GRA的信息安全风险评估
9
作者 马冬青 崔涛 《信息安全研究》 CSCD 北大核心 2024年第5期474-480,共7页
信息安全风险评估是一项非常重要的信息安全保障活动.依据信息安全相关标准,可从资产、威胁和脆弱性3方面识别出重要的风险因素,并确定相应的信息安全风险评估指标.参考等保2.0确定风险评估指标是一种可行的方法.在进行信息安全风险评估... 信息安全风险评估是一项非常重要的信息安全保障活动.依据信息安全相关标准,可从资产、威胁和脆弱性3方面识别出重要的风险因素,并确定相应的信息安全风险评估指标.参考等保2.0确定风险评估指标是一种可行的方法.在进行信息安全风险评估时,采用熵权法进行客观的指标赋权,并结合优劣解距离法(technique for order preference by similarity to ideal solution,TOPSIS)和灰色关联分析(grey relational analysis,GRA)进行综合评估.实例分析表明,依据信息熵进行客观赋权相对减少了主观因素的影响;基于TOPSIS和GRA进行信息安全风险评估,综合被评价对象整体因素和内部因素,较有效地将多项信息安全风险评估指标综合成单一评分,便于对多个被评对象进行信息安全风险的择优与排序. 展开更多
关键词 信息安全 风险评估 优劣解距离法 灰色关联分析 等级保护
下载PDF
智慧城市建设中的网络信息安全风险识别及其应对策略
10
作者 胡柳 《无线互联科技》 2024年第1期122-124,128,共4页
针对智慧城市发展过程中的网络信息安全风险与挑战,保障智慧城市建设健康持续发展,文章从智慧城市架构体系、网络信息安全风险识别、应对策略3个方面进行阐述。文章根据现有智慧城市建设经验现状,提出了智慧城市架构体系由终端数据采集... 针对智慧城市发展过程中的网络信息安全风险与挑战,保障智慧城市建设健康持续发展,文章从智慧城市架构体系、网络信息安全风险识别、应对策略3个方面进行阐述。文章根据现有智慧城市建设经验现状,提出了智慧城市架构体系由终端数据采集层、网络层、数据层和应用层组成,并对4层结构进行了风险分析;研究了如何识别智慧城市中网络信息安全风险,指出从风险因素、风险来源和风险识别过程和方法3个方面进行描述;从智慧城市规划、管理和应用上,采用技术手段有效降低风险及其带来的损失,以提升智慧城市信息安全保障水平和促进智慧城市建设更加稳健发展。 展开更多
关键词 智慧城市 信息安全 风险识别
下载PDF
基于数据挖掘的船舶信息安全风险检测 被引量:1
11
作者 张懿爵 《舰船科学技术》 北大核心 2024年第13期171-174,共4页
信息安全是导致船舶航运安全风险发生的主要原因,为保障船舶航运安全,设计基于数据挖掘的船舶信息安全风险检测方法。采用网络爬虫技术收集船舶基本信息、网络通信信息、技术信息等,并对信息实施清洗、集成与转换等预处理。采用关联分... 信息安全是导致船舶航运安全风险发生的主要原因,为保障船舶航运安全,设计基于数据挖掘的船舶信息安全风险检测方法。采用网络爬虫技术收集船舶基本信息、网络通信信息、技术信息等,并对信息实施清洗、集成与转换等预处理。采用关联分析方法提取船舶信息安全风险特征,考虑船舶信息全生命周期的时序性特征,对提取时船舶信息安全特征进行实时变换处理。利用数据挖掘中的支持向量机模型构建舰船信息安全风险检测模型,利用沙丘猫群算法优化模型参数,仿真实验结果表明,该方法能够有效获取研究对象信息安全风险检测结果,降低各类信息安全风险事件发生的概率70%以上,由此说明该方法能够有效保障船舶航运安全。 展开更多
关键词 数据挖掘 船舶信息 安全风险检测 关联分析 支持向量机 参数优化
下载PDF
基于三角模糊数序贯博弈的电网安全研究
12
作者 洪超 施宇锋 +2 位作者 匡晓云 许爱东 张宇南 《自动化仪表》 CAS 2024年第2期64-68,共5页
智能电网系统面临着复杂性、多样性的网络安全风险。针对电网工艺漏洞攻防双方在博弈分析中无法对信息属性损失作出准确判断的问题,提出了一种三角模糊数序贯博弈模型。以序贯博弈树方法进行智能电网攻防博弈,构建出攻击者和防御者的最... 智能电网系统面临着复杂性、多样性的网络安全风险。针对电网工艺漏洞攻防双方在博弈分析中无法对信息属性损失作出准确判断的问题,提出了一种三角模糊数序贯博弈模型。以序贯博弈树方法进行智能电网攻防博弈,构建出攻击者和防御者的最优策略,实现对智能电网的工控安全防护。通过对智能电网攻击者和防御者构建序贯博弈模型,得到攻防博弈效用。提出运用三角模糊数和概率分布向量的方法来构建非模糊化损失,得到攻防双方清晰化的系统损失值。对三角模糊数序贯博弈算法和贝叶斯序贯算法进行比较,得到智能电网均衡路径中的攻击者和防御者的最优策略,以保障智能电网网络安全运行和防护。该研究为智能电网以及典型工控系统网络安全博弈提供参考。 展开更多
关键词 智能电网 序贯博弈 三角模糊数 逆向归纳法 工控信息安全 攻防效用
下载PDF
电网信息安全下的智能电网漏洞分析与防范策略
13
作者 秦月 申乃芝 +1 位作者 曹晓微 刘瑜 《计算机应用文摘》 2024年第15期153-155,共3页
随着智能电网的推广,电力系统的智能化程度不断提高,然而智能电网所带来的信息安全威胁逐渐显现。文章深入分析了智能电网中存在的漏洞问题,探讨了不同层面的漏洞类型,解析了漏洞对智能电网的潜在影响,并提出一系列防范策略,以确保电力... 随着智能电网的推广,电力系统的智能化程度不断提高,然而智能电网所带来的信息安全威胁逐渐显现。文章深入分析了智能电网中存在的漏洞问题,探讨了不同层面的漏洞类型,解析了漏洞对智能电网的潜在影响,并提出一系列防范策略,以确保电力系统的可靠性和安全性。 展开更多
关键词 智能电网 漏洞分析 信息安全 防范策略 网络安全
下载PDF
汽车远程诊断的信息安全设计与研究
14
作者 王娜 刘旭 +2 位作者 胡琪雯 罗浩 林慧雯 《汽车实用技术》 2024年第18期34-37,49,共5页
智能汽车普遍采用远程诊断技术获取汽车运行状态信息,高效解决汽车故障。为了防止黑客利用远程诊断系统中安全漏洞,进行非授权操作,威胁用户的生命财产安全,文章基于通用的远程诊断系统架构进行信息安全设计与研究。通过详细的安全威胁... 智能汽车普遍采用远程诊断技术获取汽车运行状态信息,高效解决汽车故障。为了防止黑客利用远程诊断系统中安全漏洞,进行非授权操作,威胁用户的生命财产安全,文章基于通用的远程诊断系统架构进行信息安全设计与研究。通过详细的安全威胁和风险分析,对信息安全防护方案和关键技术(如身份认证、安全存储等)进行详细研究,并采取了有效实施方案,通过再次核验威胁分析与风险评估验证,可以大幅度提高远程诊断系统的防护能力,降低信息安全风险。 展开更多
关键词 智能网联汽车 远程诊断 信息安全 安全威胁 风险分析
下载PDF
大数据时代的网络空间安全风险与防御
15
作者 赵一畅 《数字通信世界》 2024年第10期75-77,80,共4页
在海量数据流动与交换的背景下,网络空间安全问题呈现出新的挑战和特征[1]。该文将深入探讨大数据环境下的隐私泄露、数据篡改、恶意攻击等主要安全威胁,并研究相应的防御机制和技术手段,旨在构建一套全面而有效的网络空间安全保障体系... 在海量数据流动与交换的背景下,网络空间安全问题呈现出新的挑战和特征[1]。该文将深入探讨大数据环境下的隐私泄露、数据篡改、恶意攻击等主要安全威胁,并研究相应的防御机制和技术手段,旨在构建一套全面而有效的网络空间安全保障体系,以适应大数据时代的安全需求。 展开更多
关键词 大数据时代 网络空间安全 风险分析 防御策略 信息安全
下载PDF
电网信息安全系统的设计与实现
16
作者 郭东旭 《集成电路应用》 2024年第7期358-359,共2页
阐述针对数字化电网存在的多种信息安全问题,以及用户种类繁多、复杂多变的电网环境进行信息防护。采用数字化电网信息安全技术,对威胁与挑战进行分析,从而设计电网信息安全系统方案。
关键词 数字化电网 信息安全 双层加密机制 风险评估
下载PDF
基于物联网的智能电网设备管理系统研究
17
作者 王峰 《通信电源技术》 2024年第12期158-160,共3页
随着物联网技术的发展,智能电网设备管理系统的研究成为电力系统自动化、智能化的关键。通过设计实现设备监测、数据分析、故障诊断以及远程控制等功能,提高电力系统的运行效率和安全性。同时,采用身份认证、数据加密、访问控制以及安... 随着物联网技术的发展,智能电网设备管理系统的研究成为电力系统自动化、智能化的关键。通过设计实现设备监测、数据分析、故障诊断以及远程控制等功能,提高电力系统的运行效率和安全性。同时,采用身份认证、数据加密、访问控制以及安全审计等措施,确保系统的安全性,经过测试,系统运行良好,可以满足电网设备管理需求。 展开更多
关键词 物联网 智能电网 设备管理 需求分析 功能模块设计 安全架构设计
下载PDF
电网安全与网络攻击防范策略研究
18
作者 郭昊城 《移动信息》 2024年第8期214-216,共3页
电力系统是国家基础设施的重要组成部分,电网的安全性对于社会正常运行和国民经济发展至关重要。随着网络技术的发展,电网的运行效率得到了提升,但也面临着日益严峻的网络安全威胁。文中探讨了电网的安全形势,包括网络攻击的主要类型、... 电力系统是国家基础设施的重要组成部分,电网的安全性对于社会正常运行和国民经济发展至关重要。随着网络技术的发展,电网的运行效率得到了提升,但也面临着日益严峻的网络安全威胁。文中探讨了电网的安全形势,包括网络攻击的主要类型、电网系统的潜在脆弱性、现有防护措施及其局限性。通过对比分析,文中提出了一系列创新的网络攻击防范策略,旨在从技术层面、组织管理层面以及政策法规层面全面提升电网的安全防护能力。 展开更多
关键词 电网安全 网络攻击 防范策略 数据分析 信息安全
下载PDF
档案信息安全面临的风险及对策
19
作者 薛春晓 《移动信息》 2024年第4期179-181,共3页
文中综合分析了档案信息安全的特征、面临的主要风险以及有效的防护对策。通过深入探讨档案信息的完整性、可用性和可追踪性,指出了档案信息在介质、信息、环境等方面面临的安全风险。针对这些风险,提出了提高安全防护意识,应用安全防... 文中综合分析了档案信息安全的特征、面临的主要风险以及有效的防护对策。通过深入探讨档案信息的完整性、可用性和可追踪性,指出了档案信息在介质、信息、环境等方面面临的安全风险。针对这些风险,提出了提高安全防护意识,应用安全防护技术,创设安全防护环境,健全安全防护制度等对策,旨在为档案信息安全管理提供实用的参考和建议。 展开更多
关键词 档案信息安全 风险分析 防护对策
下载PDF
An Approach to Assess the Resiliency of Electric Power Grids
20
作者 Navin Shenoy R. Ramakumar 《Journal of Power and Energy Engineering》 2015年第11期1-13,共13页
Modern electric power grids face a variety of new challenges and there is an urgent need to improve grid resilience more than ever before. The best approach would be to focus primarily on the grid intelligence rather ... Modern electric power grids face a variety of new challenges and there is an urgent need to improve grid resilience more than ever before. The best approach would be to focus primarily on the grid intelligence rather than implementing redundant preventive measures. This paper presents the foundation for an intelligent operational strategy so as to enable the grid to assess its current dynamic state instantaneously. Traditional forms of real-time power system security assessment consist mainly of methods based on power flow analyses and hence, are static in nature. For dynamic security assessment, it is necessary to carry out time-domain simulations (TDS) that are computationally too involved to be performed in real-time. The paper employs machine learning (ML) techniques for real-time assessment of grid resiliency. ML techniques have the capability to organize large amounts of data gathered from such time-domain simulations and thereby extract useful information in order to better assess the system security instantaneously. Further, this paper develops an approach to show that a few operating points of the system called as landmark points contain enough information to capture the nonlinear dynamics present in the system. The proposed approach shows improvement in comparison to the case without landmark points. 展开更多
关键词 grid RESILIENCE MACHINE Learning smart grids TIME-DOMAIN analysis Dynamic security Assessment
下载PDF
上一页 1 2 16 下一页 到第
使用帮助 返回顶部