Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Power grid infrastructures have been exposed to several terrorists and cyber attacks from different perspectives and have resulted in critical system failures. Among different attack strategies, simultaneous attack is feasible for the attacker if enough resources are available at the moment. In this paper, vulnerability analysis for simultaneous attack is investigated, using a modified cascading failure...
Due to globalization of IC, hardware is defenseless to new sorts of assaults, for example, counterfeiting, figuring out and IP piracy. Logic locking technique is used for the hardware security. Logic locking conceals the functionality and implementation of a design by inserting additional gates into the original design. The gates inserted for the locking are called key-gates. To display its correct...
In this paper we demonstrate the power and flexibility of extreme model-driven design using C-IME, our integrated modelling environment for C/C++ by showing how easily an application modelled in C-IME can be enhanced with hardware security features. In fact, our approach does not require any changes of the application model. Rather, C-IME provides a dedicated modelling language for code generators...
We present sandbox mining, a technique to confine an application to resources accessed during automatic testing. Sandbox mining first explores software behavior by means of automatic test generation, and extracts the set of resources accessed during these tests. This set is then used as a sandbox, blocking access to resources not used during testing. The mined sandbox thus protects against behavior...
The paper is focused on increasing the security measures against malicious attacks by protecting hardware that exchange data. This is in contrast to studying or improving the existing methods that rely on only securing the data. We consider errors that may appear on a way between transmitting and receiving modules in different microelectronic devices and some of such errors may be injected by potential...
DroidMate is a fully automated GUI execution generator for Android apps. DroidMate explores an app, i.e. (a) repeatedly reads at runtime the device GUI and monitored calls to Android APIs methods and (b) makes a decision what next GUI action (click, long-click, text entry, etc.) to execute, based on that data and provided exploration strategy. The process continues until some termination criterion...
Today's modern information era society imposes great necessity of various software applications which now have an increasingly important impact on human life. The need for software applications and developers is rapidly increasing. To make up that demands enterprises have to make more applications in shorter time frames. Workload of software companies is constantly increasing, as they not only have...
This paper proposes a novel approach for pseudo random ternary sequence over finite field. The sequence is generated from a primitive polynomial over finite field applying trace function and möbius function. This paper further presents some important properties such as period, autocorrelation and cross-correlation of the generated sequence. The proposed approach is experimented on various bit length...
The unit commitment (UC) problem aims to find an optimal schedule of generating units subject to the demand and operating constraints for an electricity grid. The majority of existing algorithms for the UC problem rely on solving a series of convex relaxations by means of branch-and-bound or cutting-planning methods. In this paper, we develop a strengthened semidefinite program (SDP) for the UC problem...
The energy market is continuously emerging from the past few decades. An open access to the energy market has led to the problem of energy market's management. This is aroused due to congestion. Therefore, it becomes prominent to impose some restrictions on it to mitigate congestion problems. Amongst from different available methods like re-scheduling; re-dispatching, etc. some more CM techniques...
In this paper, the authors have proposed a new approach for generating multi-value sequence by utilizing primitive element, trace function, and k-th power residue symbol over odd characteristic field. Let p be an odd prime and Fp be an odd characteristic prime field, m be the degree of the primitive polynomial f(x), and k be a prime factor of p-1. In details, the procedure for generating multi-value...
A matchmaking based day-ahead market mechanism is proposed in this paper, in which daily residual energy quantity is the object of transaction and bidding is based on spread, i.e., the difference compared with the regulated electricity price. To accurately reflect the matchmaking rules and the exact information of the matching-pair, a novel matchmaking algorithm with differentiated weighting coefficients...
The electric power system is one of the most complex engineered systems. It is, thus, a challenge to design a market that is efficient, transparent, and provides the proper incentives to market participants. Existing market models employ constraint relaxations, which enable various constraints to be relaxed (violated) for a high penalty price. This paper examines the practice of allowing transmission...
Credit card transactions are becoming life line for financial transaction. But leads to and develops lots of security issues and concerns about the theft of PIN. To prevent fraud transactions by the third part, OTP has come up as a solution. Online transactions are done using PayPal, Paytm. Temporary credit card numbers can be generated and can be used for online transactions along with the OTP generation,...
Traditional multi-step attack correlation approaches based on intrusion alerts face the challenge of recognizing attack scenarios because these approaches require complex pre-defined association rules as well as a high dependency on expert knowledge. Meanwhile, they barely consider the privacy issues. Under such circumstance, a novel algorithm is proposed to construct multi-step attack scenarios based...
The problem of global positioning system (GPS) spoofing attacks on smart grids endowed with phasor measurement units (PMUs) is addressed, taking into account the dynamical behavior of the states of the system. First, it is shown how GPS spoofing introduces a timing synchronization error in the phasor readings recorded by the PMUs and alters the measurement matrix of the dynamical model. Then, a generalized...
Constraint management is one of the critical tasks for ensuring secure operation of power supply systems and is generally formulated and solved as an optimal power flow (OPF) problem with generation scheduling and voltage set point controls. In case of severe contingencies, conventional OPF methods may fail to converge, i.e. find solution satisfying all constraints. In such cases, network operators/planners...
An ultra-low power true random number generator (TRNG) based on sub-ranging SAR ADC is proposed. The proposed TRNG shares the coarse-ADC circuit with sub-ranging SAR ADC for area reduction. The shared coarse-ADC not only plays the role of discrete-time chaotic circuit or TRNG's entropy source but also reduces overall SAR ADC energy consumption by selectively activating the fine-SAR ADC. Also, the...
Industrial systems are composed of multiple components whose security has not been addressed for a while. Even if recent propositions target to improve it, they are still often exposed to vulnerabilities, since their components are hard to update or replace. In parallel, they tend to be more and more exposed in the public Internet for convenience. Although awareness of such a problem has been raised,...
This paper focuses on the preventive security constrained optimal power flow problems (PSCOPF), comparing full nonlinear AC models to linearized model. Generator participation factors (droop coefficients) are introduced to account for active power imbalance created by component outages under contingencies. Moreover, we propose a novel representation of network elements' electrical behavior, employing...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.