Articles with "security assessment" as a keyword



Photo from wikipedia

Forensic analysis and security assessment of Android m-banking apps

Sign Up to like & get
recommendations!
Published in 2018 at "Australian Journal of Forensic Sciences"

DOI: 10.1080/00450618.2016.1182589

Abstract: The increasing popularity and constant evolution of mobile technologies have resulted in an increased focus in mobile device and app security and forensics research. Banking apps appear to be an understudied topic, despite their popularity… read more here.

Keywords: banking apps; android banking; security assessment; apps ... See more keywords
Photo by scottwebb from unsplash

Transient stability based dynamic security assessment indices

Sign Up to like & get
recommendations!
Published in 2017 at "Cogent Engineering"

DOI: 10.1080/23311916.2017.1295506

Abstract: Abstract As power systems become increasingly stability constrained, the need for dynamic security assessment (DSA) becomes important. However, the resources and technology required to achieve on-line DSA at reasonable cost for utility companies are not… read more here.

Keywords: transient stability; security assessment; dynamic security; system ... See more keywords
Photo by tobiastu from unsplash

Examining Impact of Distribution System Characteristics on Transmission Security Assessment of Future Power Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3149571

Abstract: The nature and characteristics of distribution systems are changing continuously with the increased penetration of distributed energy resources. With this, the need for examining the transmission and distribution (T&D) interaction while assessing the voltage security… read more here.

Keywords: system; security assessment; security; power ... See more keywords
Photo by scottwebb from unsplash

Security Assessment for the Islanding Transition of Microgrids

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3150331

Abstract: Grid-connected microgrids pose a risk of unsuccessful transition to islanded operation due to unintentional islanding. The success of this transition is influenced by different factors, such as the operating point, the controls, and the islanding… read more here.

Keywords: security assessment; islanding transition; methodology; assessment islanding ... See more keywords
Photo by lukaszlada from unsplash

Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3190545

Abstract: Cloud computing has become widely adopted by businesses for hosting applications with improved performance at a fraction of the operational costs and complexity. The rise of cloud applications has been coupled with an increase in… read more here.

Keywords: security assessment; security; cloud; cloud computing ... See more keywords
Photo by joakimnadell from unsplash

A Security Assessment of HTTP/2 Usage in 5G Service-Based Architecture

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.001.2200183

Abstract: Fifth generation (5G) networks are designed to bring enhanced network operational efficiency to serve a wide range of emerging services. Toward this purpose, 5G adopts a service-based architecture (SBA) that features web-based technologies such as… read more here.

Keywords: security assessment; based architecture; http; security ... See more keywords
Photo by scottwebb from unsplash

Design, Analysis and Implementation of a Security Assessment/Enhancement Platform for Cyber-Physical Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3085543

Abstract: To support cyber security assessment and enhancement of cyber-physical systems, a cross-layered experimental prototype platform has been developed. In this article, to make the prototype versatile, a modular approach has been taken. There are in… read more here.

Keywords: platform; assessment enhancement; security assessment; security ... See more keywords
Photo by scottwebb from unsplash

Operational Risk Metric for Dynamic Security Assessment of Renewable Generation

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Power Systems"

DOI: 10.1109/tpwrs.2016.2577500

Abstract: The objective of this paper is to explore the efficacy of applying risk-based security assessment (RBSA) to define reliability standards for electricity grids with high penetration of converter-interfaced generation. A novel approach to estimate the… read more here.

Keywords: generation; security assessment; operational risk; security ... See more keywords
Photo from wikipedia

Fast Grid Security Assessment With N − k Contingencies

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Power Systems"

DOI: 10.1109/tpwrs.2016.2608378

Abstract: The challenge of grid security assessment with $N- k$ contingencies lies in a huge amount of transmission security constraints and even for the modest values of N and k, the computational complexity would be very… read more here.

Keywords: security assessment; fast grid; security; representative constraints ... See more keywords
Photo from wikipedia

Implementation of a Massively Parallel Dynamic Security Assessment Platform for Large-Scale Grids

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2016.2606888

Abstract: This paper presents a computational platform for dynamic security assessment (DSA) of large electricity grids, developed as part of the iTesla project. It leverages high performance computing to analyze large power systems, with many scenarios… read more here.

Keywords: implementation; platform; dynamic security; security assessment ... See more keywords
Photo from wikipedia

Ecological security assessment at different spatial scales in central Yunnan Province, China

Sign Up to like & get
recommendations!
Published in 2022 at "PLoS ONE"

DOI: 10.1371/journal.pone.0270267

Abstract: Healthy ecosystems are the basis of social and economic development. It is of great significance to conduct ecological security assessments in rapidly urbanization areas. Based on the driving forces, pressure, state, impact, and response (DPSIR)… read more here.

Keywords: security assessment; security; central yunnan; yunnan province ... See more keywords