2019
DOI: 10.1051/e3sconf/201913901029
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the emergency control and relay protection structures approached from the point of view of EPS reliability and survivability by taking into account cybersecurity threats

Abstract: Cyber threats pose an increasing threat to energy objects. It is essential to ensure the cybersecurity of automatic control systems, such as relay protection devices (RP), devices of regime control (RC) and emergency control (EC), automated control systems. At the same time, the issues of cybersecurity include not only the problem of hacker attacks, but also the whole complex of problems relating to adequate functioning of cybernetic systems in the power industry. The authors propose a methodical approach to t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 1 publication
0
9
0
Order By: Relevance
“…The identification of the mesh analogs of Volterra kernels tuned to test signals with amplitudes of 25% of the initial values of 0 0.16 D  kg/s, 0 100 Q  kW was carried out using the technique [42,44] for Additionally, when drafting the initial data for the identification of kernels, we take into account conditions of the form of Equations ( 8)-( 11) following from the necessary and sufficient conditions for the solvability of the corresponding integral equations in the required functions' classes. Note that in this case, we do not consider conditions 25 Q   kW, on which we will carry out the verification of mesh analogs of Equations ( 12) and (13). The responses of the constructed mesh analogs of the quadratic Equation ( 12) and cubic Equation (13) Volterra polynomials Additionally, when drafting the initial data for the identification of kernels, we take into account conditions of the form of Equations ( 8)-( 11) following from the necessary and sufficient conditions for the solvability of the corresponding integral equations in the required functions' classes.…”
Section: Computational Experiments Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The identification of the mesh analogs of Volterra kernels tuned to test signals with amplitudes of 25% of the initial values of 0 0.16 D  kg/s, 0 100 Q  kW was carried out using the technique [42,44] for Additionally, when drafting the initial data for the identification of kernels, we take into account conditions of the form of Equations ( 8)-( 11) following from the necessary and sufficient conditions for the solvability of the corresponding integral equations in the required functions' classes. Note that in this case, we do not consider conditions 25 Q   kW, on which we will carry out the verification of mesh analogs of Equations ( 12) and (13). The responses of the constructed mesh analogs of the quadratic Equation ( 12) and cubic Equation (13) Volterra polynomials Additionally, when drafting the initial data for the identification of kernels, we take into account conditions of the form of Equations ( 8)-( 11) following from the necessary and sufficient conditions for the solvability of the corresponding integral equations in the required functions' classes.…”
Section: Computational Experiments Resultsmentioning
confidence: 99%
“…); (3) Forecasting problems for the technical state of heat and power equipment (shortterm and long-term forecasts of the mode parameters [10,11], planning of repair and maintenance work, development of a strategy for equipment service [12], etc. ); (4) Multicriteria control problems, including emergency control from the point of view of reliability [13], optimization of technical indicators of energy sources depending on their location [14], a hybrid approach for correcting a certain combination of various characteristics [15], and so forth.…”
Section: Introductionmentioning
confidence: 99%
“…By considering only external threats, one overlooks the shortcomings of the design and development of modern automatic and automated control systems. In previous works of the authors [16], an integrated approach was considered for qualitative analysis of the structure of RP, EC, and RC systems from the perspective of cybersecurity.…”
Section: Reliability Of Digital Control Systemsmentioning
confidence: 99%
“…In the future, in the era of total digitalization, the situation may be aggravated by the fact that cyberattacks or other negative ways of affecting the digital infrastructure of critical infrastructure objects and systems, which include the power systems, will become elements of geopolitical and military confrontation [16], which is already publicly spoken about by senior officials of various countries of the world.…”
Section: The Problem Of Targeted External Cyberattacksmentioning
confidence: 99%
See 1 more Smart Citation