نمایش مختصر رکورد

dc.contributor.authorHojjati Kermani, Mohammad Aminen_US
dc.contributor.authorAliakbar Golkar, Masouden_US
dc.contributor.authorZokaei, Sadaanen_US
dc.date.accessioned1399-07-08T19:30:39Zfa_IR
dc.date.accessioned2020-09-29T19:30:39Z
dc.date.available1399-07-08T19:30:39Zfa_IR
dc.date.available2020-09-29T19:30:39Z
dc.date.issued2019-06-01en_US
dc.date.issued1398-03-11fa_IR
dc.date.submitted2018-10-11en_US
dc.date.submitted1397-07-19fa_IR
dc.identifier.citationHojjati Kermani, Mohammad Amin, Aliakbar Golkar, Masoud, Zokaei, Sadaan. (2019). Providing a Model for a Cyber-Attack to a Special Protection Scheme Based on Timed Petri Net. Journal of Energy Management and Technology, 3(2), 26-33. doi: 10.22109/jemt.2019.151970.1131en_US
dc.identifier.issn2588-3372
dc.identifier.urihttps://dx.doi.org/10.22109/jemt.2019.151970.1131
dc.identifier.urihttp://www.jemat.org/article_82749.html
dc.identifier.urihttps://iranjournals.nlai.ir/handle/123456789/68209
dc.description.abstractIn order to enhance the reliability of the power transmission grid, planning and employing regional protection along with traditional local protection is necessary. Both regional and wide area protection is contingent upon communication and data networking infrastructure and hence prone to cyber-attacks.  Moreover, since this kind of protection maintains network integrity while taking into account the specified combinatorial parameters; its output is not necessarily consistent with the output of local protection mechanisms. In other words, applying regional protection alters the arrangement of the whole network for maintaining the interests of all consumers. On the contrary, the local manager of transmission or distribution network may find this in conflict with his/her interests and may even take actions against it via cyber-attacks.<br />The primary step to analyze these types of cyber-attacks is the ability to define the attacks in an adjustable way in a parametric model so that one can explicitly test different forms of attacks and subsequently offer methods to deal with them.<br />In the present study, a multi-stage attack has been extracted and modeled with a timed Petri net, and then the results are compared with those of similar articles.en_US
dc.format.extent574
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoen_US
dc.publisherIran Energy Association (IEA)en_US
dc.relation.ispartofJournal of Energy Management and Technologyen_US
dc.relation.isversionofhttps://dx.doi.org/10.22109/jemt.2019.151970.1131
dc.subjectCyber Attacken_US
dc.subjectSpecial Protection Schemeen_US
dc.subjectTimed Petrineten_US
dc.subjectEnergy managementen_US
dc.titleProviding a Model for a Cyber-Attack to a Special Protection Scheme Based on Timed Petri Neten_US
dc.typeTexten_US
dc.typeReview Articleen_US
dc.contributor.departmentFaculty of electrical engineering, K.N.Toosi university of technology, Tehran, Iranen_US
dc.contributor.departmentFaculty of electrical engineering, K.N.Toosi university of technology, Tehran, Iranen_US
dc.contributor.departmentFaculty of computer engineering, K. N. Toosi University of Technology, Tehran, Iranen_US
dc.citation.volume3
dc.citation.issue2
dc.citation.spage26
dc.citation.epage33


فایل‌های این مورد

Thumbnail

این مورد در مجموعه‌های زیر وجود دارد:

نمایش مختصر رکورد