Challenges in Power System Information Security

被引:1
作者
Dan, Gyorgy [1 ]
Sandberg, Henrik [1 ]
Ekstedt, Mathias [1 ]
Bjoerkman, Gunnar
机构
[1] KTH Royal Inst Technol, Stockholm, Sweden
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Achieving all-encompassing component-level security in power system IT infrastructures is difficult, owing to its cost and potential performance implications.
引用
收藏
页码:62 / 70
页数:9
相关论文
共 50 条
[41]   Internet of Things: information security challenges and solutions [J].
Miloslavskaya, Natalia ;
Tolstoy, Alexander .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (01) :103-119
[42]   The regulatory challenges of Australian information security practice [J].
Burdon, Mark ;
Siganto, Jodie ;
Coles-Kemp, Lizzie .
COMPUTER LAW & SECURITY REVIEW, 2016, 32 (04) :623-633
[43]   Regulating Information and Network Security: Review and Challenges [J].
Bouraffa, Tayssir ;
Hui, Kai-lung .
ACM COMPUTING SURVEYS, 2025, 57 (05)
[44]   Security in information systems: Advances and new challenges [J].
Blanco, Carlos ;
Rosado, David G. ;
Enrique Sanchez, Luis ;
Juerjens, Jan .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) :687-688
[45]   Challenges and Best Practices in Information Security Management [J].
McLaughlin, Mark-David ;
Gogan, Janis .
MIS QUARTERLY EXECUTIVE, 2018, 17 (03) :237-262
[46]   Internet of Things: information security challenges and solutions [J].
Natalia Miloslavskaya ;
Alexander Tolstoy .
Cluster Computing, 2019, 22 :103-119
[47]   Electronic information and digitization - Preservation and security challenges [J].
Anderson, ML .
TO PRESERVE AND PROTECT: THE STRATEGIC STEWARDSHIP OF CULTURAL RESOURCES, 2002, :207-+
[48]   Information security in networkable Windows-based operating system devices: Challenges and solutions [J].
Oshri, Ilan ;
Kotlarsky, Julia ;
Hirsch, Corey .
COMPUTERS & SECURITY, 2007, 26 (02) :177-182
[49]   Research and Design of the Security Area Classification Model of Electric Power Information System [J].
Zhang, Tong ;
Wu, Kehe ;
Li, Wei .
MATERIAL AND MANUFACTURING TECHNOLOGY II, PTS 1 AND 2, 2012, 341-342 :519-523
[50]   Power System Risk Security Assessment Based on Maximum Information Entropy Principle [J].
Zeng, Ke ;
Li, Hua-qiang ;
Zeng, Meng-jie ;
Liu, Pei-qing .
2014 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2014,