1,217,107 Hits in 4.6 sec

System of Systems Characterisation assisting Security Risk Assessment

Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams
2018 2018 13th Annual Conference on System of Systems Engineering (SoSE)  
By identifying key stakeholders, systems, management and control, this approach supports the initial steps of a SoS security risk assessment approach using a tool-supported framework that supports operational  ...  System of Systems (SoS) is a term often used to describe the coming together of independent systems, collaborating to achieve a new or higher purpose.  ...  A system may also have visibility of another system, but have limited knowledge in which to base a security risk assessment.  ... 
doi:10.1109/sysose.2018.8428765 dblp:conf/sysose/Ki-AriesFDW18 fatcat:oq4i4kjgo5fjrdyp4yqmnvmf3u

Automated Assessment of Secure Search Systems

Mayank Varia, Benjamin Price, Nicholas Hwang, Ariel Hamlin, Jonathan Herzog, Jill Poland, Michael Reschly, Sophia Yakoubov, Robert K. Cunningham
2015 ACM SIGOPS Operating Systems Review  
This work presents the results of a three-year project that assessed nine different privacy-preserving data search systems.  ...  We detail the design of a software assessment framework that focuses on low system footprint, repeatability, and reusability.  ...  ACKNOWLEDGEMENTS The authors would like to acknowledge Oliver Dain for his design of the test harness architecture and knots data structure.  ... 
doi:10.1145/2723872.2723877 fatcat:qlmcyycmyjhhjnwcmf2ddkmzhu

Quantitative Assessment of Enterprise Security System

Ruth Breu, Frank Innerhofer-Oberperfler, Artsiom Yautsiukhin
2008 2008 Third International Conference on Availability, Reliability and Security  
In this paper we extend a model-based approach to security management with concepts and methods that provide a possibility for quantitative assessments.  ...  We measure numbers of attack of certain threats and estimate their likelihood of propagation along the dependencies in the underlying model.  ...  This approach helps domain owners to conduct a fine-graded assessment and find out the causes of failures (the weakest places in the security system).  ... 
doi:10.1109/ares.2008.164 dblp:conf/IEEEares/BreuIY08 fatcat:qkuyamnpqneonhuds6geso3l64

Security Assessment of System Frequency Response

Francisco Sanchez, Francisco Gonzalez-Longatt, Jose Luis Rueda
2019 2019 IEEE Power & Energy Society General Meeting (PESGM)  
This paper develops an analysis of the closed-loop transfer function of a single-area power system model for frequency response (FR).  ...  A numeric example of the impact of system inertia and frequency controllers in the UK power system is then developed in MATLAB, and minimum values for Primary and Fast Frequency Response (FFR) power injections  ...  of aggregated system inertia and disturbances of different magnitudes.  ... 
doi:10.1109/pesgm40551.2019.8973555 fatcat:c7h3jwc7b5f2tfcukmvyzwwc5i

Assessing Security Risk and Requirements for Systems of Systems

Duncan Ki-Aries
2018 2018 IEEE 26th International Requirements Engineering Conference (RE)  
risks with use of a tool-support for assessing security risk in the SoS context.  ...  From this, security requirements can provide a systematic means to identify constraints and related risks of the SoS, mitigated by humanuser and system requirements.  ...  System of Systems and Systems Risk Before exploring where SoS security risk assessment is challenged, it is useful to consider how the term System of Systems applies, and the context in which System is  ... 
doi:10.1109/re.2018.00061 dblp:conf/re/Ki-Aries18 fatcat:muxfzgtf7bgopkvf3ujlq3gxua

Mega Watt Security Assessment of Power Systems

Amit Kumar Chowdhury, Surajit Mondal, Mainak Mukherjee, Pabitra Kumar Biswas
2015 International Letters of Chemistry, Physics and Astronomy  
This paper deals with the security aspects of power system by evaluating the severity of transmission line outage.  ...  The severity of line is evaluated and compared using these load flow methods. A new method is proposed to avoid Masking problems in MW security assessment.  ...  Restorative control Security Enhancement Determine preventive control Action to make the system secure Security Assessment: Determine w.r.t a next Set of contingencies the system Is secure  ... 
doi:10.18052/ fatcat:niudzofrp5bsnlrhqph5rys3xi

Assessing System of Systems Security Risk and Requirements with OASoSIS

Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams
2018 2018 IEEE 5th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE)  
When independent systems come together as a System of Systems (SoS) to achieve a new purpose, dealing with requirements conflicts across systems becomes a challenge.  ...  Moreover, assessing and modelling security risk for independent systems and the SoS as a whole is challenged by a gap in related research and approaches within the SoSs domain.  ...  an example security risk assessment using the MMN from the view of one independent system, Bravo and their interaction with the SoS, then later repeating the process for other system assessments.  ... 
doi:10.1109/espre.2018.00009 dblp:conf/re/Ki-AriesFDW18 fatcat:5b2yavg7u5aednkqtu52mthnfe

Efficient Database Generation for Data-driven Security Assessment of Power Systems [article]

Florian Thams, Andreas Venzke, Robert Eriksson, Spyros Chatzivasileiadis
2019 arXiv   pre-print
Power system security assessment methods require large datasets of operating points to train or test their performance.  ...  Our method accommodates numerous definitions of power system security. Here we focus on the combination of N-k security and small-signal stability.  ...  It can be easily seen that security assessment of large systems can very fast result in an intractable problem.  ... 
arXiv:1806.01074v4 fatcat:ztexqcjnhbcqhcn4uat7mkosg4

Analytic assessment of the power system frequency security

Ping Ju, Yi Zheng, Yuqing Jin, Chuan Qin, Yefeng Jiang, Lu Cao
2021 IET Generation, Transmission & Distribution  
However, the existing approaches to assess the system frequency security are not reliable.  ...  Finally, the New England 10-unit 39-bus power system and East China Power Grid are considered to demonstrate the key features of the proposed method.  ...  ACKNOWLEDGMENTS This work is jointly supported by the National Natural Science Foundation of China (51837004, U2066601, 52077059, 52077061). ORCID Yi Zheng  ... 
doi:10.1049/gtd2.12171 fatcat:k7zi6mooknhqlk3vkp4kmeoruu

Assessing the status of library information systems security

Roesnita Ismail, Awang Ngah Zainab
2013 Journal of Librarianship and Information Science  
This study proposes an instrument to assess the current information system security status in libraries.  ...  The instrument is based on a model named LISSAM (library information systems security assessment model), which comprises five components: technological security foundation, information security policy,  ...  Awang Ngah Zainab is a professor teaching on the Master of Library and information Science programme offered at the Faculty of Computer Science and Information Technology, University of Malaya since 1994  ... 
doi:10.1177/0961000613477676 fatcat:jawh3jlp7zasrceertj3urnyva

Availability Assessment of Embedded Systems with Security Vulnerabilities

Andrew J. Kornecki, Janusz Zalewski, Wendy F. Stevenson
2011 2011 IEEE 34th Software Engineering Workshop  
The paper discusses modeling assessment aspects of incorporating security into an embedded system.  ...  The results of the study obtained for availability assessment due to security lapses show that a modeling technique may be used to evaluate the need for appropriate mitigation mechanisms allowing the system  ...  on the level of security to be applied.  ... 
doi:10.1109/sew.2011.12 dblp:conf/sew/KorneckiZS11 fatcat:jtbnsss6gfgx3lmnq6jid6ws6u

Security Assessment of Distribution System with Distributed Photovoltaic

Weiping Zhu, Zhicheng Wang, Xiaodong Yuan, Ruonan Fan
2015 Journal of Power and Energy Engineering  
On the basis of electricity supply security, voltage quality and network losses, the index system of static security is established.  ...  In order to evaluate the safe and stable operation of distribution network with the distributed photovoltaic (PV), the security of distribution network is researched.  ...  The peak capacity of distributed PV source with constraint of over-voltage is researched in [4] . Firstly, the paper proposes an index system of static security assessment.  ... 
doi:10.4236/jpee.2015.34034 fatcat:7cfvnb4ymnhebbkyyuvakgruge

Security Risk Assessment in Internet of Things Systems

Jason R.C. Nurse, Sadie Creese, David De Roure
2017 IT Professional Magazine  
Information security risk assessment methods have served us well over the past two decades.  ...  These risks could be related to the high degrees of connectivity present or the coupling of digital, cyber-physical, and social systems.  ...  Acknowledgments This research was conducted as a part of the PETRAS Internet of Things Research Hub, a consortium of nine UK universities.  ... 
doi:10.1109/mitp.2017.3680959 fatcat:zyk4yrtjabh3hefjy54ivdg5ey

Security assessment of four open source software systems

Faraz Idris Khan, Yasir Javed, Mamdouh Alenezi
2019 Indonesian Journal of Electrical Engineering and Computer Science  
For the analysis of each system, security vulnerabilities and weakness were identified, threat models were modeled,and code inspection was performed. The findings are discussed in more details.</p>  ...  With the advantages of OSS comes disadvantages in terms of security vulnerabilities. Therefore, in this paper, we analyzed four famous open source software tools (i.e.  ...  assessment of four open source software systems (Faraz Idris Khan) Threat model Flask 875 Figure 15 . 87515 Security assessment of four open source software systems (Faraz Idris Khan) Threat model VLC  ... 
doi:10.11591/ijeecs.v16.i2.pp860-881 fatcat:lvrtpjhdlnguhipsr6yz4peraa

Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment

O. Klevtsov, A. Symonov, S. Trubchaninov
2020 Nuclear and Radiation Safety  
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs).  ...  The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied  ...  computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs).  ... 
doi:10.32918/nrs.2020.4(88).09 fatcat:yvkuu7jo5ndi3aygrb5lckbmbi
« Previous Showing results 1 — 15 out of 1,217,107 results