Dynamic Security Assessment

نویسندگان

  • Peter W. Sauer
  • Kevin L. Tomsovic
  • Vijay Vittal
چکیده

Vijay Vittal Arizona State University 15.1 Definitions and Historical Perspective ........................ 15-1 15.2 Criteria for Security ...................................................... 15-2 15.3 Assessment and Control ............................................... 15-3 15.4 Dynamic Phenomena of Interest ................................. 15-3 15.5 Timescales ...................................................................... 15-3 15.6 Transient Stability.......................................................... 15-4 15.7 Modeling ........................................................................ 15-4 15.8 Criteria and Methods.................................................... 15-5 Numerical Integration . Direct=Lyapunov Methods . Probabilistic Methods . Expert System Methods . Database or Pattern Recognition Methods 15.9 Recent Activity............................................................... 15-6 15.10 Off-Line DSA................................................................. 15-7 15.11 On-Line DSA ................................................................. 15-8 15.12 Status and Summary ..................................................... 15-8

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SAMARA: Security Architecture Multi-Agent-based Risk Assessment

In this paper, we describe SAMARATM, a Security Agent-Based environment for security process design, management, and execution that integrates aspects of security process modeling, security assessment, and security management. SAMARA is targeted specifically to domains such as engineering security design in which the dynamic and uncertain nature of the security processes present management chal...

متن کامل

Integration of Dynamic Security Assessment and Stability Controls

Dynamic security assessment (DSA) or transient security assessment (TSA) determines a system’s ability to survive contingencies with a safety factor (margin). To ensure that a system remains dynamically secure, preventive or corrective remedial actions are designed. Preventive actions are applied in the pre-contingency system so that after any credible contingency the system remains secure. Exa...

متن کامل

A risk model for cloud processes

Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...

متن کامل

A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directl...

متن کامل

Risk Assessment for Airworthiness Security _last version_

The era of digital avionics is opening a fabulous opportunity to improve aircraft operational functions, airline dispatch and service continuity. But arising vulnerabilities could be an open door to malicious attacks. Necessity for security protection on airborne systems has been officially recognized and new standards are actually under construction. In order to provide development assurance a...

متن کامل

USING jFUZZY LOGIC FOR ANALYSIS OF POWER SYSTEM BASED ON DYNAMIC SECURITY ASSESSMENT

Power system and its security and analysis have been taken a major concern in day to day life. SECURITY evaluation is an important issue in planning and operation stages of an electric power system. This paper proposes a novel fuzzy logic Controller by using Jfuzzy Logic. A fuzzy logic-based classification method is developed to predict the security index of a given power system operating point...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007