About: UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
rdfs:seeAlso
Description
  • This paper describes way how to use graph theory in security analysis. As an environment is used network of power lines and devices which are included here. Power grid is considered as a system of nodes which make together graph (network). On the simple example is applied Fiedler’s theory which is able to select the most important power lines of whole network. Components related to these lines are logicly ordered and considered by author´s modified analysis. This method has been improved and optimalized for risks related with illegal acts. Each power grid component has been connected with possible kind of attack and every of this device was gradually evaluated by five coefficients which takes values from 1 to 10. On the coefficient basis was assessed the level of risk. In the last phase the most risky power grid components have been selected. On the selected devices have been proposed security measures.
  • This paper describes way how to use graph theory in security analysis. As an environment is used network of power lines and devices which are included here. Power grid is considered as a system of nodes which make together graph (network). On the simple example is applied Fiedler’s theory which is able to select the most important power lines of whole network. Components related to these lines are logicly ordered and considered by author´s modified analysis. This method has been improved and optimalized for risks related with illegal acts. Each power grid component has been connected with possible kind of attack and every of this device was gradually evaluated by five coefficients which takes values from 1 to 10. On the coefficient basis was assessed the level of risk. In the last phase the most risky power grid components have been selected. On the selected devices have been proposed security measures. (en)
Title
  • UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID
  • UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID (en)
skos:prefLabel
  • UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID
  • UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID (en)
skos:notation
  • RIV/61989100:27200/14:86091607!RIV15-MV0-27200___
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • P(VG20102015059)
http://linked.open...iv/cisloPeriodika
  • 2
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 52613
http://linked.open...ai/riv/idVysledku
  • RIV/61989100:27200/14:86091607
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • Security, matrix, power grid, graph (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...odStatuVydavatele
  • PL - Polská republika
http://linked.open...ontrolniKodProRIV
  • [28F21FE085C9]
http://linked.open...i/riv/nazevZdroje
  • Securitology
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...vavai/riv/projekt
http://linked.open...UplatneniVysledku
http://linked.open...v/svazekPeriodika
  • 2014/20
http://linked.open...iv/tvurceVysledku
  • Ščurek, Radomír
  • Válek, Dalibor
issn
  • 1898-4509
number of pages
http://bibframe.org/vocab/doi
  • 10.5604/18984509.1140884
http://localhost/t...ganizacniJednotka
  • 27200
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 67 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software