Power systems cybersecurity: methods, concepts, and best practices
This book covers power systems cybersecurity.In order to enhance overall stability and security in wide-area cyber-physical power systems and defend against cyberattacks, new resilient operation, control, and protection methods are required. The cyberattack-resilient control methods improve overall...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , , |
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2023]
|
Ausgabe: | 1st ed. 2023 |
Schriftenreihe: | Power systems
|
Schlagworte: | |
Zusammenfassung: | This book covers power systems cybersecurity.In order to enhance overall stability and security in wide-area cyber-physical power systems and defend against cyberattacks, new resilient operation, control, and protection methods are required. The cyberattack-resilient control methods improve overall cybersecurity and stability in normal and abnormal operating conditions. By contrast, cyberattack-resilient protection schemes are important to keep the secure operation of a system under the most severe contingencies and cyberattacks. The main subjects covered in the book are: 1) proposing new tolerant and cyberattack-resilient control and protection methods against cyberattacks for future power systems, 2) suggesting new methods for cyberattack detection and cybersecurity assessment, and 3) focusing on practical issues in modern power systems |
Beschreibung: | Chapter 1. A comprehensive review on cyber-attack detection and control of microgrid systems.- Chapter 2. Cyber Vulnerabilities of Modern Power Systems.- Chapter 3. Cyber-Physical Security in Smart Power Systems from a Resilience Perspective: Concepts and Possible Solutions.- Chapter 4. Cybersecurity Challenges in Microgrids: Inverter-Based Resources and Electric Vehicles.- Chapter 5. Improving Cybersecurity Situational Awareness in Smart Grid Environments.- Chapter 6. Hybrid Physics-Based and Data-driven Mitigation Strategy for Automatic Generation Control Under Cyber Attack.- Chapter 7. Data Driven Cybr Resilient Control of Wide Area Power Systems.- Chapter 8. Cyberattack-Resilient Control in Multi-Area Power Generation.- Chapter 9. Cyber-Security of Protection System in Power Grids - Part 1: Vulnerabilities and Counter-Measures.- Chapter 10. Cyber-Security of Protection System in Power Grids - Part 2: Case Studies on Securing Line Current Differential Relays.- Chapter 11. Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids.- Chapter 12. Vertical approach Anomaly Detection using Local Outlier Factor.- Chapter 13. A modular infrastructure for the validation of cyberattack detection systems.- Chapter 14. A novel self-learning cybersecurity system for smart grids.- Chapter 15. Cyber-resilience enhancement framework in smart grids.- Chapter 16. SOAR4DER: Security Orchestration, Automation, and Response for Distributed Energy Resources.- Chapter 17. A Study on Cyber-Physical System Architecture for Smart Grids and Its Cyber Vulnerability.- Chapter 18. A Study on Cybersecurity Standards for Power Systems. |
Beschreibung: | xviii, 450 Seiten Illustrationen, Diagramme 988 gr |
ISBN: | 9783031203596 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049671295 | ||
003 | DE-604 | ||
005 | 20240625 | ||
007 | t | ||
008 | 240430s2023 a||| |||| 00||| eng d | ||
020 | |a 9783031203596 |9 978-3-031-20359-6 | ||
024 | 3 | |a 9783031203596 | |
035 | |a (OCoLC)1443582013 | ||
035 | |a (DE-599)BVBBV049671295 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
245 | 1 | 0 | |a Power systems cybersecurity |b methods, concepts, and best practices |c Hassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong, editors |
264 | 1 | |a Cham |b Springer |c [2023] | |
300 | |a xviii, 450 Seiten |b Illustrationen, Diagramme |c 988 gr | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Power systems | |
500 | |a Chapter 1. A comprehensive review on cyber-attack detection and control of microgrid systems.- Chapter 2. Cyber Vulnerabilities of Modern Power Systems.- Chapter 3. Cyber-Physical Security in Smart Power Systems from a Resilience Perspective: Concepts and Possible Solutions.- Chapter 4. Cybersecurity Challenges in Microgrids: Inverter-Based Resources and Electric Vehicles.- Chapter 5. Improving Cybersecurity Situational Awareness in Smart Grid Environments.- Chapter 6. Hybrid Physics-Based and Data-driven Mitigation Strategy for Automatic Generation Control Under Cyber Attack.- Chapter 7. Data Driven Cybr Resilient Control of Wide Area Power Systems.- Chapter 8. Cyberattack-Resilient Control in Multi-Area Power Generation.- Chapter 9. Cyber-Security of Protection System in Power Grids - Part 1: Vulnerabilities and Counter-Measures.- Chapter 10. Cyber-Security of Protection System in Power Grids - Part 2: Case Studies on Securing Line Current Differential Relays.- Chapter 11. Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids.- Chapter 12. Vertical approach Anomaly Detection using Local Outlier Factor.- Chapter 13. A modular infrastructure for the validation of cyberattack detection systems.- Chapter 14. A novel self-learning cybersecurity system for smart grids.- Chapter 15. Cyber-resilience enhancement framework in smart grids.- Chapter 16. SOAR4DER: Security Orchestration, Automation, and Response for Distributed Energy Resources.- Chapter 17. A Study on Cyber-Physical System Architecture for Smart Grids and Its Cyber Vulnerability.- Chapter 18. A Study on Cybersecurity Standards for Power Systems. | ||
520 | |a This book covers power systems cybersecurity.In order to enhance overall stability and security in wide-area cyber-physical power systems and defend against cyberattacks, new resilient operation, control, and protection methods are required. The cyberattack-resilient control methods improve overall cybersecurity and stability in normal and abnormal operating conditions. By contrast, cyberattack-resilient protection schemes are important to keep the secure operation of a system under the most severe contingencies and cyberattacks. The main subjects covered in the book are: 1) proposing new tolerant and cyberattack-resilient control and protection methods against cyberattacks for future power systems, 2) suggesting new methods for cyberattack detection and cybersecurity assessment, and 3) focusing on practical issues in modern power systems | ||
650 | 4 | |a bicssc | |
650 | 4 | |a bicssc | |
650 | 4 | |a bicssc | |
650 | 4 | |a bicssc | |
650 | 4 | |a bicssc | |
650 | 4 | |a bisacsh | |
650 | 4 | |a bisacsh | |
650 | 4 | |a bisacsh | |
650 | 4 | |a bisacsh | |
650 | 4 | |a Cooperating objects (Computer systems) | |
650 | 4 | |a Computer networks—Security measures | |
650 | 4 | |a Risk management | |
650 | 4 | |a Electric power production | |
653 | |a Hardcover, Softcover / Technik/Elektronik, Elektrotechnik, Nachrichtentechnik | ||
700 | 1 | |a Haes Alhelou, Hassan |d 1988- |0 (DE-588)1184437963 |4 edt | |
700 | 1 | |a Chatzēargyriu, Nikos |d 1954- |0 (DE-588)135758009 |4 edt | |
700 | 1 | |a Dong, Zhao Yang |4 edt | |
775 | 0 | 8 | |i Äquivalent |n Druck-Ausgabe, Paperback |z 978-3-031-20362-6 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-031-20360-2 |
Datensatz im Suchindex
_version_ | 1805083843569385472 |
---|---|
adam_text | |
any_adam_object | |
author | Haes Alhelou, Hassan |
author2 | Haes Alhelou, Hassan 1988- Chatzēargyriu, Nikos 1954- Dong, Zhao Yang |
author2_role | edt edt edt |
author2_variant | a h h ah ahh n c nc z y d zy zyd |
author_GND | (DE-588)1184437963 (DE-588)135758009 |
author_facet | Haes Alhelou, Hassan Haes Alhelou, Hassan 1988- Chatzēargyriu, Nikos 1954- Dong, Zhao Yang |
author_role | aut |
author_sort | Haes Alhelou, Hassan |
author_variant | a h h ah ahh |
building | Verbundindex |
bvnumber | BV049671295 |
ctrlnum | (OCoLC)1443582013 (DE-599)BVBBV049671295 |
edition | 1st ed. 2023 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049671295</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240625</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240430s2023 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031203596</subfield><subfield code="9">978-3-031-20359-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783031203596</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1443582013</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049671295</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Power systems cybersecurity</subfield><subfield code="b">methods, concepts, and best practices</subfield><subfield code="c">Hassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong, editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xviii, 450 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">988 gr</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Power systems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 1. A comprehensive review on cyber-attack detection and control of microgrid systems.- Chapter 2. Cyber Vulnerabilities of Modern Power Systems.- Chapter 3. Cyber-Physical Security in Smart Power Systems from a Resilience Perspective: Concepts and Possible Solutions.- Chapter 4. Cybersecurity Challenges in Microgrids: Inverter-Based Resources and Electric Vehicles.- Chapter 5. Improving Cybersecurity Situational Awareness in Smart Grid Environments.- Chapter 6. Hybrid Physics-Based and Data-driven Mitigation Strategy for Automatic Generation Control Under Cyber Attack.- Chapter 7. Data Driven Cybr Resilient Control of Wide Area Power Systems.- Chapter 8. Cyberattack-Resilient Control in Multi-Area Power Generation.- Chapter 9. Cyber-Security of Protection System in Power Grids - Part 1: Vulnerabilities and Counter-Measures.- Chapter 10. Cyber-Security of Protection System in Power Grids - Part 2: Case Studies on Securing Line Current Differential Relays.- Chapter 11. Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids.- Chapter 12. Vertical approach Anomaly Detection using Local Outlier Factor.- Chapter 13. A modular infrastructure for the validation of cyberattack detection systems.- Chapter 14. A novel self-learning cybersecurity system for smart grids.- Chapter 15. Cyber-resilience enhancement framework in smart grids.- Chapter 16. SOAR4DER: Security Orchestration, Automation, and Response for Distributed Energy Resources.- Chapter 17. A Study on Cyber-Physical System Architecture for Smart Grids and Its Cyber Vulnerability.- Chapter 18. A Study on Cybersecurity Standards for Power Systems.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book covers power systems cybersecurity.In order to enhance overall stability and security in wide-area cyber-physical power systems and defend against cyberattacks, new resilient operation, control, and protection methods are required. The cyberattack-resilient control methods improve overall cybersecurity and stability in normal and abnormal operating conditions. By contrast, cyberattack-resilient protection schemes are important to keep the secure operation of a system under the most severe contingencies and cyberattacks. The main subjects covered in the book are: 1) proposing new tolerant and cyberattack-resilient control and protection methods against cyberattacks for future power systems, 2) suggesting new methods for cyberattack detection and cybersecurity assessment, and 3) focusing on practical issues in modern power systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cooperating objects (Computer systems)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electric power production</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hardcover, Softcover / Technik/Elektronik, Elektrotechnik, Nachrichtentechnik</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Haes Alhelou, Hassan</subfield><subfield code="d">1988-</subfield><subfield code="0">(DE-588)1184437963</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chatzēargyriu, Nikos</subfield><subfield code="d">1954-</subfield><subfield code="0">(DE-588)135758009</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dong, Zhao Yang</subfield><subfield code="4">edt</subfield></datafield><datafield tag="775" ind1="0" ind2="8"><subfield code="i">Äquivalent</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-031-20362-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-031-20360-2</subfield></datafield></record></collection> |
id | DE-604.BV049671295 |
illustrated | Illustrated |
indexdate | 2024-07-20T07:55:00Z |
institution | BVB |
isbn | 9783031203596 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035014292 |
oclc_num | 1443582013 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | xviii, 450 Seiten Illustrationen, Diagramme 988 gr |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Springer |
record_format | marc |
series2 | Power systems |
spelling | Power systems cybersecurity methods, concepts, and best practices Hassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong, editors Cham Springer [2023] xviii, 450 Seiten Illustrationen, Diagramme 988 gr txt rdacontent n rdamedia nc rdacarrier Power systems Chapter 1. A comprehensive review on cyber-attack detection and control of microgrid systems.- Chapter 2. Cyber Vulnerabilities of Modern Power Systems.- Chapter 3. Cyber-Physical Security in Smart Power Systems from a Resilience Perspective: Concepts and Possible Solutions.- Chapter 4. Cybersecurity Challenges in Microgrids: Inverter-Based Resources and Electric Vehicles.- Chapter 5. Improving Cybersecurity Situational Awareness in Smart Grid Environments.- Chapter 6. Hybrid Physics-Based and Data-driven Mitigation Strategy for Automatic Generation Control Under Cyber Attack.- Chapter 7. Data Driven Cybr Resilient Control of Wide Area Power Systems.- Chapter 8. Cyberattack-Resilient Control in Multi-Area Power Generation.- Chapter 9. Cyber-Security of Protection System in Power Grids - Part 1: Vulnerabilities and Counter-Measures.- Chapter 10. Cyber-Security of Protection System in Power Grids - Part 2: Case Studies on Securing Line Current Differential Relays.- Chapter 11. Semi-supervised deep learning-driven anomaly detection schemes for cyber-attack detection in smart grids.- Chapter 12. Vertical approach Anomaly Detection using Local Outlier Factor.- Chapter 13. A modular infrastructure for the validation of cyberattack detection systems.- Chapter 14. A novel self-learning cybersecurity system for smart grids.- Chapter 15. Cyber-resilience enhancement framework in smart grids.- Chapter 16. SOAR4DER: Security Orchestration, Automation, and Response for Distributed Energy Resources.- Chapter 17. A Study on Cyber-Physical System Architecture for Smart Grids and Its Cyber Vulnerability.- Chapter 18. A Study on Cybersecurity Standards for Power Systems. This book covers power systems cybersecurity.In order to enhance overall stability and security in wide-area cyber-physical power systems and defend against cyberattacks, new resilient operation, control, and protection methods are required. The cyberattack-resilient control methods improve overall cybersecurity and stability in normal and abnormal operating conditions. By contrast, cyberattack-resilient protection schemes are important to keep the secure operation of a system under the most severe contingencies and cyberattacks. The main subjects covered in the book are: 1) proposing new tolerant and cyberattack-resilient control and protection methods against cyberattacks for future power systems, 2) suggesting new methods for cyberattack detection and cybersecurity assessment, and 3) focusing on practical issues in modern power systems bicssc bisacsh Cooperating objects (Computer systems) Computer networks—Security measures Risk management Electric power production Hardcover, Softcover / Technik/Elektronik, Elektrotechnik, Nachrichtentechnik Haes Alhelou, Hassan 1988- (DE-588)1184437963 edt Chatzēargyriu, Nikos 1954- (DE-588)135758009 edt Dong, Zhao Yang edt Äquivalent Druck-Ausgabe, Paperback 978-3-031-20362-6 Erscheint auch als Online-Ausgabe 978-3-031-20360-2 |
spellingShingle | Haes Alhelou, Hassan Power systems cybersecurity methods, concepts, and best practices bicssc bisacsh Cooperating objects (Computer systems) Computer networks—Security measures Risk management Electric power production |
title | Power systems cybersecurity methods, concepts, and best practices |
title_auth | Power systems cybersecurity methods, concepts, and best practices |
title_exact_search | Power systems cybersecurity methods, concepts, and best practices |
title_full | Power systems cybersecurity methods, concepts, and best practices Hassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong, editors |
title_fullStr | Power systems cybersecurity methods, concepts, and best practices Hassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong, editors |
title_full_unstemmed | Power systems cybersecurity methods, concepts, and best practices Hassan Haes Alhelou, Nikos Hatziargyriou, Zhao Yang Dong, editors |
title_short | Power systems cybersecurity |
title_sort | power systems cybersecurity methods concepts and best practices |
title_sub | methods, concepts, and best practices |
topic | bicssc bisacsh Cooperating objects (Computer systems) Computer networks—Security measures Risk management Electric power production |
topic_facet | bicssc bisacsh Cooperating objects (Computer systems) Computer networks—Security measures Risk management Electric power production |
work_keys_str_mv | AT haesalhelouhassan powersystemscybersecuritymethodsconceptsandbestpractices AT chatzeargyriunikos powersystemscybersecuritymethodsconceptsandbestpractices AT dongzhaoyang powersystemscybersecuritymethodsconceptsandbestpractices |