Attack path analysis of power monitoring system based on attack graph
نویسندگان
چکیده
منابع مشابه
Power Analysis Based Side Channel Attack
Side channel attacks break the secret key of a cryptosystem using channels such as sound, heat, time and power consumption which are originally not intended to leak such information. Power analysis is a branch of side channel attacks where power consumption data is used as the side channel to attack the system. First using a device like an oscilloscope power traces are collected when the crypto...
متن کاملAnalysis of Ottoman Attack on Yemen: Reasons, Consequences and Results
The 10th century AH was very important for Muslim lands, including Yemen in the era of Taherian (858-945 AH), because during this time, Portugal as a colonist country, in order to have access to new maritime routes, to seize Muslim commercial centers, as well as monopoly of Indian medicine trade, was moving eastward, into Yemen. At the same time, the Ottoman Empire, which was one somehow the fl...
متن کاملPower analysis attack: an approach based on machine learning
In cryptography, a side-channel attack is any attack based on the analysis ofmeasurements related to the physical implementation of a cryptosystem. Nowadays, thepossibility of collecting a large amount of observations paves the way to the adoptionof machine learning techniques, i.e., techniques able to extract information and patternsfrom large datasets. The use of statistical t...
متن کاملapplication of upfc based on svpwm for power quality improvement
در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...
15 صفحه اولAttack Graph Based Evaluation of Network Security
The perspective directions in evaluating network security are simulating possible malefactor’s actions, building the representation of these actions as attack graphs (trees, nets), the subsequent checking of various properties of these graphs, and determining security metrics which can explain possible ways to increase security level. The paper suggests a new approach to security evaluation bas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Earth and Environmental Science
سال: 2021
ISSN: 1755-1315
DOI: 10.1088/1755-1315/645/1/012064