Technological video survaillance as protective tool of smart electricity meters from unauthorized access
نویسندگان
چکیده
منابع مشابه
From Smart Meters to Smart Products: Reviewing Big Data driven Product Innovation in the European Electricity Retail Market
This paper tries to provide a perspective on energy informatics that goes beyond solely technical research. Combining the viewpoints of energy informatics and information systems in a review of top-ranked literature, we aim to start the discussion how to bridge the gap between a technology-driven focus on big data possibilities (such as smart grid, smart metering, etc.) and a business model-dri...
متن کاملIs Feedforward Learning more Efficient than Feedback Learning in Smart Meters of Electricity Consumption?
The most popular way to improve consumers’ control over their electricity cost is by providing frequent and detailed feedback with “in-home displays” (IHD). In this study, we examined alternative ways to train experimental participants to control and optimize their use of electricity by “feedforward” training to map energy consuming behaviors to costs. The participants were trained in one of fo...
متن کاملCan Smart Meters Create Smart Behaviour?
Intelligent technologies are increasingly facilitating sustainable water management strategies in Australia. While this innovation can present clear cost benefits to utilities through immediate leak detection and deference of capital costs, the impact of this technology on households is less distinct. By offering real-time engagement and detailed end-use consumption breakdowns, there is signifi...
متن کاملRobust Detection of Unauthorized Wireless Access Points
Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...
متن کاملProtecting Online Documents from an Unauthorized External Access (in Bulgarian)
The modern multi-tier web applications and information systems store and process various types of data. Some of them are stored in a database, controlled by an external database management system, while other data are stored directly within the server’s file system. The database is secured by the database management system itself, but it is a programmer’s responsibility to design and develop a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Vestnik of Astrakhan State Technical University
سال: 2020
ISSN: 1812-9498
DOI: 10.24143/1812-9498-2020-2-7-13