The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This presentation will update a 2005 Power System Relaying Committee paper on protection issues during power system restoration [1]. The abstract of the original paper as follows is still applicable, but updates due to technological advances will be presented.
This paper details the use of possibilistic decision trees for a lightweight Intrusion Detection System (IDS) to be used in Intelligent Electronic Devices (IEDs) of IEC61850 automated electric substations. Traffic data is captured by performing simulated attacks on IEDs. Data is obtained for two types of genuine user activity and two types of common malicious attacks on IEDs. The genuine user activity...
This paper proposes a new biologically inspired algorithm for optimization. The algorithm, called the Paddy Field Algorithm (PFA) operates by initially scattering seeds at random in the parameter space. The number of seeds of each plant depend on the function value such that a plant closer to the optimum solution produces the most seeds. Out of these, depending on the number of neighbors of the plant,...
This paper presents a case study of the application of security metrics to a computer network. A detailed survey is conducted on existing security metric schemes. The Mean Time to Compromise (MTTC) metric and VEA-bility metric are selected for this study. The input data for both metrics are obtained from a network security tool. The results are used to determine the security level of the network using...
This paper details the use of decision fusion from the outputs of different types of classifiers used for analyzing network traffic to detect masquerading within an IEC61850 automated substation. Data on network traffic is collected under simulated scenarios of a genuine user casually browsing data and an attacker rapidly downloading restricted data. The logarithm of the time difference between two...
This report covers issues concerning the security of electronic communication paths to protection relays. It is the goal of this paper to present the reader with some background material and discussions by which they can become more aware of the concerns associated with electronic communications in the power industry.
This paper presents a bibliography of HVDC transmission technology for the year 2004-2005. It provides a listing of various journal and conference papers in this area
Summary form only given. This paper presents a comprehensive analysis of the impact of TCSC on the protection of transmission lines. The TCSC is considered as a dynamical device and its transient process is modeled in order to have the response to disturbances based on its own control strategy. It is shown that not only the TCSC affects the protection of its line, but also the protection of adjacent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.