Technological video survaillance as protective tool of smart electricity meters from unauthorized access

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

From Smart Meters to Smart Products: Reviewing Big Data driven Product Innovation in the European Electricity Retail Market

This paper tries to provide a perspective on energy informatics that goes beyond solely technical research. Combining the viewpoints of energy informatics and information systems in a review of top-ranked literature, we aim to start the discussion how to bridge the gap between a technology-driven focus on big data possibilities (such as smart grid, smart metering, etc.) and a business model-dri...

متن کامل

Is Feedforward Learning more Efficient than Feedback Learning in Smart Meters of Electricity Consumption?

The most popular way to improve consumers’ control over their electricity cost is by providing frequent and detailed feedback with “in-home displays” (IHD). In this study, we examined alternative ways to train experimental participants to control and optimize their use of electricity by “feedforward” training to map energy consuming behaviors to costs. The participants were trained in one of fo...

متن کامل

Can Smart Meters Create Smart Behaviour?

Intelligent technologies are increasingly facilitating sustainable water management strategies in Australia. While this innovation can present clear cost benefits to utilities through immediate leak detection and deference of capital costs, the impact of this technology on households is less distinct. By offering real-time engagement and detailed end-use consumption breakdowns, there is signifi...

متن کامل

Robust Detection of Unauthorized Wireless Access Points

Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...

متن کامل

Protecting Online Documents from an Unauthorized External Access (in Bulgarian)

The modern multi-tier web applications and information systems store and process various types of data. Some of them are stored in a database, controlled by an external database management system, while other data are stored directly within the server’s file system. The database is secured by the database management system itself, but it is a programmer’s responsibility to design and develop a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Vestnik of Astrakhan State Technical University

سال: 2020

ISSN: 1812-9498

DOI: 10.24143/1812-9498-2020-2-7-13