Articles with "security assessment" as a keyword



Photo from wikipedia

Forensic analysis and security assessment of Android m-banking apps

Sign Up to like & get
recommendations!
Published in 2018 at "Australian Journal of Forensic Sciences"

DOI: 10.1080/00450618.2016.1182589

Abstract: The increasing popularity and constant evolution of mobile technologies have resulted in an increased focus in mobile device and app security and forensics research. Banking apps appear to be an understudied topic, despite their popularity… read more here.

Keywords: banking apps; android banking; security assessment; apps ... See more keywords

Transient stability based dynamic security assessment indices

Sign Up to like & get
recommendations!
Published in 2017 at "Cogent Engineering"

DOI: 10.1080/23311916.2017.1295506

Abstract: Abstract As power systems become increasingly stability constrained, the need for dynamic security assessment (DSA) becomes important. However, the resources and technology required to achieve on-line DSA at reasonable cost for utility companies are not… read more here.

Keywords: transient stability; security assessment; dynamic security; system ... See more keywords

Examining Impact of Distribution System Characteristics on Transmission Security Assessment of Future Power Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3149571

Abstract: The nature and characteristics of distribution systems are changing continuously with the increased penetration of distributed energy resources. With this, the need for examining the transmission and distribution (T&D) interaction while assessing the voltage security… read more here.

Keywords: system; security assessment; security; power ... See more keywords

Security Assessment for the Islanding Transition of Microgrids

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3150331

Abstract: Grid-connected microgrids pose a risk of unsuccessful transition to islanded operation due to unintentional islanding. The success of this transition is influenced by different factors, such as the operating point, the controls, and the islanding… read more here.

Keywords: security assessment; islanding transition; methodology; assessment islanding ... See more keywords

Toward Automated Security Analysis and Enforcement for Cloud Computing Using Graphical Models for Security

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3190545

Abstract: Cloud computing has become widely adopted by businesses for hosting applications with improved performance at a fraction of the operational costs and complexity. The rise of cloud applications has been coupled with an increase in… read more here.

Keywords: security assessment; security; cloud; cloud computing ... See more keywords

A Security Assessment of HTTP/2 Usage in 5G Service-Based Architecture

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.001.2200183

Abstract: Fifth generation (5G) networks are designed to bring enhanced network operational efficiency to serve a wide range of emerging services. Toward this purpose, 5G adopts a service-based architecture (SBA) that features web-based technologies such as… read more here.

Keywords: security assessment; based architecture; http; security ... See more keywords

Design, Analysis and Implementation of a Security Assessment/Enhancement Platform for Cyber-Physical Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3085543

Abstract: To support cyber security assessment and enhancement of cyber-physical systems, a cross-layered experimental prototype platform has been developed. In this article, to make the prototype versatile, a modular approach has been taken. There are in… read more here.

Keywords: platform; assessment enhancement; security assessment; security ... See more keywords

Operational Risk Metric for Dynamic Security Assessment of Renewable Generation

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Power Systems"

DOI: 10.1109/tpwrs.2016.2577500

Abstract: The objective of this paper is to explore the efficacy of applying risk-based security assessment (RBSA) to define reliability standards for electricity grids with high penetration of converter-interfaced generation. A novel approach to estimate the… read more here.

Keywords: generation; security assessment; operational risk; security ... See more keywords
Photo from wikipedia

Fast Grid Security Assessment With N − k Contingencies

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Power Systems"

DOI: 10.1109/tpwrs.2016.2608378

Abstract: The challenge of grid security assessment with $N- k$ contingencies lies in a huge amount of transmission security constraints and even for the modest values of N and k, the computational complexity would be very… read more here.

Keywords: security assessment; fast grid; security; representative constraints ... See more keywords

Unsupervised Machine Learning Approach to Enhance Online Voltage Security Assessment Based on Synchrophasor Data

Sign Up to like & get
recommendations!
Published in 2025 at "IEEE Transactions on Power Systems"

DOI: 10.1109/tpwrs.2025.3553736

Abstract: The accuracy and reliability of the Q/V sensitivity for voltage security assessment is influenced by the outliers present in the calculation results. An unsupervised machine learning approach, empirical- cumulative- distribution- based outlier detection (ECOD), is… read more here.

Keywords: unsupervised machine; security assessment; voltage security;

Implementation of a Massively Parallel Dynamic Security Assessment Platform for Large-Scale Grids

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2016.2606888

Abstract: This paper presents a computational platform for dynamic security assessment (DSA) of large electricity grids, developed as part of the iTesla project. It leverages high performance computing to analyze large power systems, with many scenarios… read more here.

Keywords: implementation; platform; dynamic security; security assessment ... See more keywords