The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The information security risk assessment of IEC 61850-based power control systems is currently an unsolved problem. One of the reasons is a lack of methodology for asset analysis, which is an important process of risk assessment. In the companion paper (Part I), a specific methodology of asset analysis for the IEC 61850-based power control systems is introduced. To explain and verify the proposed...
Information security risk assessment combined with power control process is not a properly resolve problem, the lack of asset identification method accord with characteristics of power information systems is one of the main factors. Network-based substation automation systems (SAS) are typical power information systems, based on the analysis of difficulties on asset identification, a complete information...
Information security risk assessment combined with power control process is an issue which has not properly solved yet. As substation automation system (SAS) functions as the key link of between implementation of control instructions and the collection of operation information, research on the application of information assets identification method in SAS under network environment, is an important...
The Substation Automation System (SAS) is a crucial element of power system control. The devices of SAS with remote-control functions are one of the main target of cyber attack. The vulnerability assessment for communication network of SASs that supporting the analysis of control process, is an unsolved problem. Combined with the characteristics of SAS and the vulnerability assessment of the distributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.