Attack path analysis of power monitoring system based on attack graph

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Power Analysis Based Side Channel Attack

Side channel attacks break the secret key of a cryptosystem using channels such as sound, heat, time and power consumption which are originally not intended to leak such information. Power analysis is a branch of side channel attacks where power consumption data is used as the side channel to attack the system. First using a device like an oscilloscope power traces are collected when the crypto...

متن کامل

Analysis of Ottoman Attack on Yemen: Reasons, Consequences and Results

The 10th century AH was very important for Muslim lands, including Yemen in the era of Taherian (858-945 AH), because during this time, Portugal as a colonist country, in order to have access to new maritime routes, to seize Muslim commercial centers, as well as monopoly of Indian medicine trade, was moving eastward, into Yemen. At the same time, the Ottoman Empire, which was one somehow the fl...

متن کامل

Power analysis attack: an approach based on machine learning

In cryptography, a side-channel attack is any attack based on the analysis ofmeasurements related to the physical implementation of a cryptosystem. Nowadays, thepossibility of collecting a large amount of observations paves the way to the adoptionof machine learning techniques, i.e., techniques able to extract information and patternsfrom large datasets. The use of statistical t...

متن کامل

application of upfc based on svpwm for power quality improvement

در سالهای اخیر،اختلالات کیفیت توان مهمترین موضوع می باشد که محققان زیادی را برای پیدا کردن راه حلی برای حل آن علاقه مند ساخته است.امروزه کیفیت توان در سیستم قدرت برای مراکز صنعتی،تجاری وکاربردهای بیمارستانی مسئله مهمی می باشد.مشکل ولتاژمثل شرایط افت ولتاژواضافه جریان ناشی از اتصال کوتاه مدار یا وقوع خطا در سیستم بیشتر مورد توجه می باشد. برای مطالعه افت ولتاژ واضافه جریان،محققان زیادی کار کرده ...

15 صفحه اول

Attack Graph Based Evaluation of Network Security

The perspective directions in evaluating network security are simulating possible malefactor’s actions, building the representation of these actions as attack graphs (trees, nets), the subsequent checking of various properties of these graphs, and determining security metrics which can explain possible ways to increase security level. The paper suggests a new approach to security evaluation bas...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOP Conference Series: Earth and Environmental Science

سال: 2021

ISSN: 1755-1315

DOI: 10.1088/1755-1315/645/1/012064