2020
DOI: 10.12700/aph.17.5.2020.5.6
|View full text |Cite
|
Sign up to set email alerts
|

Security Risk Assessment-based Cloud Migration Methodology for Smart Grid OT Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In order to balance the respective advantages and defects of AHP and entropy method and get more objective index weights, it is a better weighting method to combine the empirical advantages of AHP and objective advantages of entropy method by means of comprehensive weighting [26][27][28]. Comprehensive weighting method is to combine the weighting results of analytic hierarchy process and entropy value method.…”
Section: Determination Methods Of Index Weightmentioning
confidence: 99%
“…In order to balance the respective advantages and defects of AHP and entropy method and get more objective index weights, it is a better weighting method to combine the empirical advantages of AHP and objective advantages of entropy method by means of comprehensive weighting [26][27][28]. Comprehensive weighting method is to combine the weighting results of analytic hierarchy process and entropy value method.…”
Section: Determination Methods Of Index Weightmentioning
confidence: 99%
“…The IoT-Hub provides the opportunity to implement a real-time data processing, which is called Stream Analytics (the hot route of data processing). This analysis mode can provide results describing the current state of the system and useable information can be obtained based on the results of the analyses [17], [19].…”
Section: Security Issues Of Iiot Systemsmentioning
confidence: 99%
“…This means that the perpetrator estimates the differences between competencies to be significant, so interventions can be repeated several times without the risk of being discovered. Attacks carried out as continuous intervention, are often implemented to influence strongly safety critical systems by moving system state from safe and secured operational circumstances to a high risk operational domain [39]. These kind of incidents can be implemented for example by denial-of-service attacks in which the attacker aims to make a system resource ineffectual to the regular user for instance by flooding it from different sources [40].…”
Section: Figure 7 Conceptualization Framework Of Cybersecurity Relatementioning
confidence: 99%