Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Más filtros











Base de datos
Intervalo de año de publicación
1.
Sensors (Basel) ; 22(10)2022 May 23.
Artículo en Inglés | MEDLINE | ID: mdl-35632342

RESUMEN

Distributed Energy Resources (DERs) are growing in importance Power Systems. Battery Electrical Storage Systems (BESS) represent fundamental tools in order to balance the unpredictable power production of some Renewable Energy Sources (RES). Nevertheless, BESS are usually remotely controlled by SCADA systems, so they are prone to cyberattacks. This paper analyzes the vulnerabilities of BESS and proposes an anomaly detection algorithm that, by observing the physical behavior of the system, aims to promptly detect dangerous working conditions by exploiting the capabilities of a particular neural network architecture called the autoencoder. The results show the performance of the proposed approach with respect to the traditional One Class Support Vector Machine algorithm.


Asunto(s)
Algoritmos , Redes Neurales de la Computación , Suministros de Energía Eléctrica , Electricidad , Máquina de Vectores de Soporte
2.
Sensors (Basel) ; 21(21)2021 Oct 20.
Artículo en Inglés | MEDLINE | ID: mdl-34770277

RESUMEN

Critical Infrastructures (CIs) are sensible targets. They could be physically damaged by natural or human actions, causing service disruptions, economic losses, and, in some extreme cases, harm to people. They, therefore, need a high level of protection against possible unintentional and intentional events. In this paper, we show a logical architecture that exploits information from both physical and cybersecurity systems to improve the overall security in a power plant scenario. We propose a Machine Learning (ML)-based anomaly detection approach to detect possible anomaly events by jointly correlating data related to both the physical and cyber domains. The performance evaluation showed encouraging results-obtained by different ML algorithms-which highlights how our proposed approach is able to detect possible abnormal situations that could not have been detected by using only information from either the physical or cyber domain.


Asunto(s)
Seguridad Computacional , Sistemas de Información , Algoritmos , Computadores , Humanos
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA