نتایج جستجو برای: power system security

تعداد نتایج: 2696271  

ذوالفقاری, مهدی, عمرانی, ابوذر,

Any crisis in the Middle East both affects the countries of the region and forces the international system to react. In recent years, ISIS Islamic fundamentalism and their actions have affected the Middle East and the entire international system. Particularly, the Islamic Republic of Iran, due to its Shiite and non-Arab identity, is directly exposed to ISIS threats. The purpose of this study is...

2013
Chao Zhao Ying Han

As a new technology for information gathering and processing, the role that wireless sensor network played in the field of current computer cannot be replaced. It integrates the advantages of sensor technology, communication technology and computer technology into an organic whole and it has great potential and development space. Accordingly, its security problem also becomes the primary consid...

2015
Sudip Halder Debanjan Mukherjee Aniruddha Mukherjee

In today's highly complex and interconnected power systems, sometimes made of thousands of buses and hundreds of generators, there is a great need to improve electric power utilization while still maintaining reliability and security. In order to meet the ever-growing power demand, utilities prefer to rely on already existing generation instead of building new transmission lines that are subjec...

2016
Bhargavi Nisarga Eric Peeters

Security in embedded systems is a topic that is gaining prominence as embedded systems and products are being deployed everywhere to be used in our everyday routines. Security concerns for embedded system developers and its users scales from adversaries having remote to physical access of the system. Increasing security for remote access includes incorporating secure data communication and secu...

Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...

2013
Nelofar Tyagi Ashish Joshi Sangya Singh

Security has always been an important issue in the home and other applications. A remote home security system offers many more benefits apart from keeping home owners, and their property, safe from intruders. The system is a low power consumption security alarm system developed by applying WSN and GSM technology. The system is composed of the microcontroller based wireless sensor network center...

Journal: :IET Information Security 2011
Rafal Leszczyna Igor Nai Fovino Marcelo Masera

This article presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary syste...

Journal: :مطالعات حقوق خصوصی 0
فیروز اصلانی دانشکده حقوق و علوم سیاسی، دانشگاه تهران محمود فرد کاردل دانشکده حقوق و علوم سیاسی، دانشگاه تهران

for each country, national security in the most urgent and significant value and need, so each government tries to justify its policies and strategies in order to reach and preserve national security. acquiring national security is, people should share national interests by haying health, land integrity, independence, power, credits and all the values generally. they should be sure of this secu...

Journal: :Trans. Computational Science 2010
Siddhartha Chhabra Yan Solihin

With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید