Information Technology in Electric Power Networks
Abstract
The electric sector liberalization is creating structural and technological changes in the utilities, pushing the classical SCADA models and other utility systems to an evolving process. There are new needs to be provided, namely data exchange between companies and between different sectors of the same company, remote maintenance, remote equipment configuration, telemetering, Demand Side Management, Distributed Generation, House/Building Automation, etc., which will create new challenges to utility SCADA and communication engineers. A proposed architecture solution is presented which is able to provide the required flexibility to cope with all the above mentioned requirements in a cost-effective way.
Download Full Text
References
- IT - ISMS - Requirements , Standard ISO/IEC 27001, Version 9.2008
- Falco, Joe, et al., IT Security for Industrial Control Systems, NIST IR 6859, 2003, http://www.isd.mel.nist.gov/documents/falco/ITSecurityProc ess.pdf.
- Andrews, M., The state of web security. IEEE Security Privacy, Vol. 4, No. 4, 2006, pp. 14.
- Steven, J., Adopting an enterprise software security framework. IEEE Security Privacy, Vol. 4, No. 2, 2006, pp. 84- 87.
- International Standard ISO/IEC 17799:2000 Code of Practice for Information Security Management, Frequently Asked Questions, What is ISO/IEC 17799:2000?, November 2002, http://csrc.nist.gov/publications/secpubs/otherpub/reviso-faq.pd
- Ghassemi, M., Barzkar, A., Saghafi, M. (2022). All-electric NASA N3-X aircraft electric power systems. IEEE Transactions on Transportation Electrification. (link)
- Arabali, A., Khajehzadeh, M., Keawsawasvong, S., Mohammed, A. H., Khan, B. (2022). An Adaptive Tunicate Swarm Algorithm for Optimization of Shallow Foundation. IEEE Access, 10, 39204-39219. doi:10.1109/ACCESS.2022.3164734 (link)
- Sanz, R., Arzen, K. E., Trends in software and control. IEEE Control Systems Magazine, Vol. 23, No. 3, 2003, pp. 12-15.
- Steven, J., Adopting an enterprise software security framework. IEEE Security Privacy, Vol. 4, No. 2, 2006, pp. 84- 87.
- Saydjari, O. S., Defending cyberspace. IEEE Computer, Vol. 35, No. 12, 2002, pp. 125.
- Holzmann, G. J., The power of 10: Rules for developing safety-critical code. IEEE Computer Vol. 39, No. 6, 2006, pp. 95-97.
- Stoneburner, G., Toward a unified security/safety model. IEEE Computer, Vol. 39, No. 8, 2006, pp. 96-97.
- Canada, France, Germany, Netherlands, United Kingdom, and United States, Common Criteria for Information Technology Security Evaluation , Version 2.1, August, 1999.
- Nmap – Free Security Scanner For Network Exploration Security Audits , http://www.insecure.org/nmap/, April, 2005.
- Beitel, George, Alessi, Sam, Control Systems Risk Decision Methodology , INL/EXT 05-02585, Rev. 1, US Department of Homeland Security, Idaho Falls, Idaho, March, 2005.
- Ali Pourramezan Fard, M. H. M. (2022). ACR Loss: Adaptive Coordinate-based Regression Loss for Face Alignment. International Conference on Pattern Recognition (ICPR).
- Asgari, G. R., Arabali, A., Babaei, M., Asemi, K. (2022). Dynamic Instability of Sandwich Beams Made of Isotropic Core and Functionally Graded Graphene Platelets-Reinforced Composite Face Sheets. International Journal of Structural Stability and Dynamics, 2250092. doi:10.1142/S0219455422500924 (link)
- Fard, A. P., Mahoor, M. H. (2022). Ad-Corre: Adaptive Correlation-Based Loss for Facial Expression Recognition in the Wild. IEEE Access, 10, 26756-26768. doi:10.1109/ACCESS.2022.3156598
- Ghassemi, M., Saghafi, M. (2022). Optimal electric power system architectures for wide body all electric aircraft. Paper presented at the IEEE Aerosp. Conf., accepted. (link)
- Ghazanfari, A. (2021). Regional Patterns for the Retail Petrol Prices. International Journal of Energy Economics and Policy, 11(4), 383-397. Retrieved from https://econjournals.com/index.php/ijeep/article/view/10132 (link)
- Hamidreza Jalili, S. K. (2022). Recent Advances in Water Resource Engineering: Rose Publication Melbourne.
- Jafarpour, V. (2022a). Numerical Stress Analysis of Creep-Feed Grinding Through Finite Element Method in Inconel Alloy X-750. Mapta Journal of Mechanical and Industrial Engineering, 6(1), 01-09.
- Jafarpour, V. (2022b). Parameter Optimization of Spot-Welded Aluminum Plates Using the Adaptive Neuro-Fuzzy System with Genetic Algorithm. Mapta Journal of Mechanical and Industrial Engineering, 6(1), 10–17.
- E. Adeli, L. Sun, J. Wang, A. A. Taflanidis. An advanced spatio-temporal convolutional recurrent neural network for storm surge predictions. ArXiv abs/2204.09501 (2022), https://arxiv.org/abs/2204.09501