国产熟妇勾子乱视频,免费看男阳茎进女阳道试看,夫の目の前侵犯新婚人妻在线,少女大人第五集免费观看

Suzhou Electric Appliance Research Institute
期刊號: CN32-1800/TM| ISSN1007-3175

Article retrieval

文章檢索

首頁 >> 文章檢索 >> 最新索引

電力系統安全一體化戰略發展研究

來源:電工電氣發布時間:2025-04-28 16:28 瀏覽次數:0

電力系統安全一體化戰略發展研究

趙中原
(南京南瑞繼保電氣有限公司,江蘇 南京 211102)
 
    摘 要:網絡安全和物理安全是電力系統可靠性和彈性的重要方面。針對海量電網信息數據和間歇性分布式能源帶來的電力系統網絡物理挑戰,特別是智能信息化對輸電系統穩定性以及大數據應用和分布能源控制,闡述了網絡信息輸電規劃、云技術、分布能源聚合和零信任范式等技術措施手段,并積極開發和改進與安全合規相關的包括安規指南、操作指導、最佳實踐等內容的產品,以確保電力系統的可靠和安全運行。
    關鍵詞: 電力系統安全;網絡物理系統;一體化;網絡安全;物理安全;分布式能源;零信任安全
    中圖分類號:TM712     文獻標識碼:A     文章編號:1007-3175(2025)04-0001-07
 
Research on the Development of Security Integration
Strategies for Power Systems
 
ZHAO Zhong-yuan
(NR Electric Co., Ltd, Nanjing 211102, China)
 
    Abstract: Cyber and physical security are important aspects of power system reliability and resilience. In response to the cyber-physical challenges of the power system brought about by massive grid information data and intermittent distributed energy sources, especially the impact of smart information technology on the stability of the transmission system as well as the application of big data and the control of distributed energy sources, the means of technological measures such as cyber-information transmission planning, cloud technology, aggregation of distributed energy sources, and the zero-trust paradigm are elaborated, and the active development and improvement of security compliance-related products, including safety guides, operational guidance, best practices, and other content products to ensure reliable and secure operation of the power system.
    Key words: power system security; cyber and physical system; integration; cyber security; physical security; distributed energy; zero-trust security
 
參考文獻
[1] DU Dajun, ZHU Minggao, LI Xue, et al.A Review on Cybersecurity Analysis, Attack Detection,and Attack Defense Methods in Cyber-Physical Power Systems[J].Journal of Modern Power Systems and Clean Energy,2023,11(3) :727-743.
[2] DUO Wenli, ZHOU Meng, ABUSORRAH A.A Survey of Cyber Attacks on Cyber Physical Systems :Recent Advances and Challenges[J].IEEE/CAA Journal of Automatica Sinica,2022,9(5) :784-800.
[3] SURYA S, SRINIVASAN M K, WILLIAMSON S. Technological Perspective of Cyber Secure Smart Inverters Used in Power Distribution System :State of the Art Review[J].Applied Sciences,2021,11(18) :8780.
[4] KISHORE P K, RAMAMOORTHY S, RAJAVARMAN V N.ARTP :Anomaly Based Real Time Prevention of Distributed Denial of Service Attacks on the Web Using Machine Learning Approach[J].International Journal of Intelligent Networks,2023,4 :38-45.
[5] ALSUWIAN T, SHAHID B A, AMIN A A.Smart Grid Cyber Security Enhancement :Challenges and Solutions—A Review[J].Sustainability,2022,14 :14226.
[6] ABDELMALAK M, VENKATARAMANAN V, MACWAN R.A Survey of Cyber-Physical Power System Modeling Methods for Future Energy Systems[J].IEEE Access,2022,10 :99875-99896.
[7] WANG X, ZHOU Yuhao, LUO Biao, et al.Event-Triggered Adaptive Finite-Time Control for SwitchedCyberphysical Systems with Uncertain Deception Attack[J].IEEE Transactions on Industrial Cyber-Physical System,2023,1(1) :136-146.
[8] YEMINI M , NEDIC A , GOLDSMITH A , et al.Characterizing Trust and Resilience in Distributed Consensus for Cyberphysical Systems[J].IEEE Transactions on Robotics,2022,38(1) :71-91.
[9] GHIASI M , WANG Z , MEHRANDEZH M , et al . A Comprehensive Review of Cyber-Attacks and Defense Mechanisms for Improving Security in Smart Grid Energy Systems :Past,Present and Future[J].ElectrIc Power Systems Research,2023,215 :108975.
[10] DAVIDSON C, ANDEL T, YAMPOLSKIY M, et al.On SCADA PLC and Fieldbus Cyber-Security[C]//13th International Conference on Cyber Warfare and Security, 2018 :140-148.
[11] SAJID A, ABBAS H, SALEEM K.Cloud-Assisted IoTBased SCADA Systems Security :A Review of the State of the Art and Future Challenges[J].IEEE Access,2016,4 :1375-1384.
[12] VENKATARAMANAN V, HAHN A, SRIVASTAVA A.CP-SAM :Cyber-Physical Security Assessment Metric for Monitoring Microgrid Resiliency[J].IEEE Transactions on Smart Grid,2020,11(2):1055-1065.
[13] YANG Yue, HUANG Jiangshuai, SU Xiaojie, et al.Adaptive Control of Second Order Nonlinear Systems with Injection and Deception Attacks[J].IEEE Transactions on Systems,Man,and Cybernetics Systems,2022,52(1) :574-581.
[14] ABDEL-BASSET M, MOUSTAFA N, HAWASH H.Privacy-Preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids :A Federated Semisupervised Approach[J].IEEE Transactions on Industrial Informatics, 2022,19(1) :995-1005.
[15] TAKIDDIN A, ISMAIL M, ZAFAR U, et al.Deep Autoencoder-Based Anomaly Detection of Electricity Theft Cyberattacks in Smart Grids[J].IEEE Systems Journal,2022,16(3) :4106-4117.

 

主站蜘蛛池模板: 武定县| 泸溪县| 兴山县| 南川市| 六安市| 玛沁县| 砚山县| 五原县| 泰和县| 合川市| 塔城市| 新巴尔虎右旗| 大新县| 二连浩特市| 博乐市| 改则县| 丹寨县| 浏阳市| 余干县| 睢宁县| 贡山| 红河县| 闽侯县| 正定县| 广南县| 遂昌县| 唐山市| 固始县| 临江市| 离岛区| 茂名市| 南汇区| 城固县| 长春市| 楚雄市| 翁牛特旗| 阿图什市| 思南县| 连云港市| 玉门市| 宁晋县|