International Journal of Critical Infrastructure Protection最新文献

筛选
英文 中文
Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies 具有不同拓扑结构的弹性相互依赖关键基础设施的网络扩展决策评估
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100623
Achara Tiong, Hector A. Vergara
{"title":"Evaluation of network expansion decisions for resilient interdependent critical infrastructures with different topologies","authors":"Achara Tiong, Hector A. Vergara","doi":"10.1016/j.ijcip.2023.100623","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100623","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100623"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM) 电网对故障或攻击的鲁棒性分析:澳大利亚国家电力市场(NEM)的案例
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100600
Wensheng Wang , Faezeh Karimi , Kaveh Khalilpour , David Green , Manos Varvarigos
{"title":"Robustness analysis of electricity networks against failure or attack: The case of the Australian National Electricity Market (NEM)","authors":"Wensheng Wang ,&nbsp;Faezeh Karimi ,&nbsp;Kaveh Khalilpour ,&nbsp;David Green ,&nbsp;Manos Varvarigos","doi":"10.1016/j.ijcip.2023.100600","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100600","url":null,"abstract":"<div><p>This study explores network science algorithms for the robustness analysis of electricity networks. We first investigate the characteristics of key network models including random graphs, small-world, and scale-free networks. Then, various measures are explored for the robustness of such networks against failure or attack, utilizing topological features<span> and percolation theory. Both weighted and unweighted scenarios are studied, with network voltage considered as the edge weight. For a case study, we investigate the network characteristics as well as the robustness of the Australian National Electricity Market (NEM) network on the basis of these models and theories.</span></p><p><span>The NEM is the world's longest interconnected power system, with an end-to-end distance of over 5000 km between the state of Queensland in the north and the state of South Australia. Our data contains 2375 transmission lines and 1538 nodes as generators or large demand customers. Our study shows that the NEM as an </span>unweighted network is a small-world network (with exponential degree distribution). However, as a weighted network (considering the voltage capacity of nodes), it has a scale-free topology (following a power-law degree distribution). Robustness analysis revealed that the NEM presents relatively stronger robustness when facing random errors than when facing intentional attacks to nodes with a high degree centrality. It also revealed the sensitivity of the scale-free network to deliberate attacks directed toward important “hubs” (interconnected nodes).</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100600"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks 队长:基于社区的IT网络高级持续威胁分析
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100620
Ali Ahmadian Ramaki, A. G. Bafghi, Abbas Rasoolzadegan Barforoush
{"title":"CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks","authors":"Ali Ahmadian Ramaki, A. G. Bafghi, Abbas Rasoolzadegan Barforoush","doi":"10.1016/j.ijcip.2023.100620","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100620","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100620"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerable underground entrance understanding for visual surveillance systems 基于视觉监控系统的脆弱地下入口理解
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100589
Luping Wang , Hui Wei , Yun Hao
{"title":"Vulnerable underground entrance understanding for visual surveillance systems","authors":"Luping Wang ,&nbsp;Hui Wei ,&nbsp;Yun Hao","doi":"10.1016/j.ijcip.2023.100589","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100589","url":null,"abstract":"<div><p><span>Protecting critical infrastructure through visual surveillance is of vital importance, especially in underground entrance environments where large chunks of sloping glass ceilings are particularly susceptible to various types of terrorist activity. However, owing to the diversity of underground entrance environments, understanding them remains a challenge. Traditional 3D layout and object pose estimation that are evaluated on 3D point clouds or RGB-D data are energy-consuming and difficult to account for semantic information in environments. In this study, we present a methodology to understand underground entrance environments, and to recover their </span>3D reconstruction<span> from a monocular camera. Clusters of sloping angle projections are extracted. Through their corresponding vanishing points (VPs), surfaces of sloping structures are estimated. Relative geometric constraints of different planes are built to bridge the gap between 2D sloping surfaces and 3D reconstruction without precise depth or point clouds. An underground entrance scene is approximated by Manhattan and sloping non-Manhattan structures in 3D reconstruction. The approach requires no prior training, and it requires neither the camera being calibrated nor the camera internal parameters being constant. Compared to the ground truth, the percentage of incorrectly understood pixels were measured and the results demonstrated that the method can successfully understand underground entrance scenes, meeting the requirements in safety monitoring for critical infrastructures from a resource-constrained surveillance camera.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100589"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering 基于约束谱聚类的电网级联故障系统风险缓解策略
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100622
Mohamed Salama, Wael ElDakhakhni, M. Tait
{"title":"Systemic risk mitigation strategy for power grid cascade failures using constrained spectral clustering","authors":"Mohamed Salama, Wael ElDakhakhni, M. Tait","doi":"10.1016/j.ijcip.2023.100622","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100622","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100622"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial on Protection vs Resilience by Prof. Roberto Setola Roberto Setola教授关于保护与恢复力的社论
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/S1874-5482(23)00021-5
Roberto Setola
{"title":"Editorial on Protection vs Resilience by Prof. Roberto Setola","authors":"Roberto Setola","doi":"10.1016/S1874-5482(23)00021-5","DOIUrl":"https://doi.org/10.1016/S1874-5482(23)00021-5","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100608"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990-2018 攻击电网:哥伦比亚游击队冲突的教训和和平努力:1990-2018
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100621
J. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva, Alvaro Cardenas
{"title":"Attacking the grid: Lessons from a guerrilla conflict and efforts for peace in Colombia: 1990-2018","authors":"J. Holmes, Agustin Palao, Mercedez Callenes, Neil Ortiz Silva, Alvaro Cardenas","doi":"10.1016/j.ijcip.2023.100621","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100621","url":null,"abstract":"","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"42 1","pages":"100621"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54358498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch 基于子网划分和电力调度的多源电网弹性增强策略
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100602
Shuliang Wang, Qiqi Dong
{"title":"A multi-source power grid's resilience enhancement strategy based on subnet division and power dispatch","authors":"Shuliang Wang,&nbsp;Qiqi Dong","doi":"10.1016/j.ijcip.2023.100602","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100602","url":null,"abstract":"<div><p><span><span>A resilience enhancement strategy based on subnetting is proposed to improve the robustness and repair ability of multi-source power grids. Firstly, based on the characteristics of renewable energy and the principle of </span>cascading failure, the network is divided into multiple stable and sustainable subnets by using the power flow data and island operation conditions in the system, and the key nodes in the subnet are identified by the index of interval electrical </span>betweenness<span>. Considering the three stages of the resilience cycle, the nodes that should be protected or repaired are determined at each time scale, and four different attack and repair strategies are established on this basis. To verify the effectiveness of the proposed method, the robustness and resilience of power networks with and without renewable energy are evaluated from different perspectives, and the impact of this method on improving network resilience is quantitatively evaluated. Finally, the improved IEEE 118-bus system is simulated. The results show that the attack and repair strategies based on subnetting have significant effects on both multi-source power grids and traditional power grids. The resilience enhancement method proposed in this paper can identify grid weaknesses and formulate repair measures that can provide support for improving the defense and resilience of the power grid.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100602"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on effective alarm management systems for industrial process control: Barriers and opportunities 工业过程控制有效报警管理系统综述:障碍与机遇
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100599
Faizan E Mustafa , Ijaz Ahmed , Abdul Basit , Um-E-Habiba Alvi , Saddam Hussain Malik , Atif Mahmood , Paghunda Roheela Ali
{"title":"A review on effective alarm management systems for industrial process control: Barriers and opportunities","authors":"Faizan E Mustafa ,&nbsp;Ijaz Ahmed ,&nbsp;Abdul Basit ,&nbsp;Um-E-Habiba Alvi ,&nbsp;Saddam Hussain Malik ,&nbsp;Atif Mahmood ,&nbsp;Paghunda Roheela Ali","doi":"10.1016/j.ijcip.2023.100599","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100599","url":null,"abstract":"<div><p><span>The effective robust management of plant requires the implementation of industrial alarm systems in a very significant capacity. The core objective of alarms is to warn the operator of critical operational deviations and these operational anomalies can sometimes result in operators receiving significantly more alarms in a short period of time than they can manage, which is known as alarm flooding. In the case of any system malfunction, the alarms triggering and operators </span>performance measure<span> together important levels of security. Over the course of the last few decades, there has been a significant acceleration in the development of industrial automation technology, which has resulted in an increase in the total number of process sensors deployed within a specific plant. Moreover, the extensive integration of automation and security-based sensors has increased the system’s complexity and introduced a variety of operational challenges in industrial facilities. Consequently, this extensive integration has led to ineffectual system reliability, which further raised operator load volume and increased the chances of fatal conditions in certain situations. This review paper addresses the history of alarm management including major incidents that occurred in the last five decades, the development of the life cycle of alarm management, standards, and principles adopted for alarm management, techniques and methodologies developed for managing alarms, and current challenges that arise from modern control system integration.</span></p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100599"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A threat modeling language for generating attack graphs of substation automation systems 一种用于生成变电站自动化系统攻击图的威胁建模语言
IF 3.6 3区 工程技术
International Journal of Critical Infrastructure Protection Pub Date : 2023-07-01 DOI: 10.1016/j.ijcip.2023.100601
Engla Rencelj Ling, Mathias Ekstedt
{"title":"A threat modeling language for generating attack graphs of substation automation systems","authors":"Engla Rencelj Ling,&nbsp;Mathias Ekstedt","doi":"10.1016/j.ijcip.2023.100601","DOIUrl":"https://doi.org/10.1016/j.ijcip.2023.100601","url":null,"abstract":"<div><p>The substation automation system consists of many different complex assets and data flows. The system is also often externally connected to allow for remote management. The complexity and remote access to the substation automation system makes it vulnerable to cyber attacks. It also makes it difficult to assess the overall security of the system. One method of assessing the potential threats against a system is threat modeling. In this paper we create a language for producing threat models specifically for the substation automation systems. We focus on the method used to create the language where we review industry designs, build the language based on existing languages and consider attack scenarios from a literature study. Finally we present the language, model two different attack scenarios and generate attack graphs from the threat models.</p></div>","PeriodicalId":49057,"journal":{"name":"International Journal of Critical Infrastructure Protection","volume":"41 ","pages":"Article 100601"},"PeriodicalIF":3.6,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49903698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信