000 04071nam a22005895i 4500
001 978-981-97-1302-8
003 DE-He213
005 20240730172340.0
007 cr nn 008mamaa
008 240601s2024 si | s |||| 0|eng d
020 _a9789819713028
_9978-981-97-1302-8
024 7 _a10.1007/978-981-97-1302-8
_2doi
050 4 _aTK7895.E42
050 4 _aTK5105.8857
072 7 _aTJF
_2bicssc
072 7 _aGPFC
_2bicssc
072 7 _aTEC008000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aGPFC
_2thema
082 0 4 _a621.38
_223
100 1 _aSreejith, Amulya.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9103222
245 1 0 _aCyber-Security for Smart Grid Control
_h[electronic resource] :
_bVulnerability Assessment, Attack Detection, and Mitigation /
_cby Amulya Sreejith, K. Shanti Swarup.
250 _a1st ed. 2024.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2024.
300 _aXVI, 147 p. 58 illus., 42 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTransactions on Computer Systems and Networks,
_x2730-7492
505 0 _aSmart Grid Cyber Physical System: An overview -- Smart Grid Control -- Attack Modelling for Smart Grid Control -- Vulnerability Assessment for Multi-Area Load Frequency Control -- MITRE ATT&CK for Smart Grid Cyber-Security -- Signal Processing based Attack Detection -- Machine Learning Based Attack Detection -- Attack Mitigation and Recovery in Smart Grid Control.
520 _aThe book focuses on a very important area of Smart Grids - cyber security. It deals in particular with the tools and techniques for cyber security analysis of the Smart Grid control systems. This includes the standards and guidelines, detailed vulnerability assessment framework, attack detection strategies, and attack mitigation methods. The book is divided into three parts. The smart grid cyber-physical system is discussed in the first part. The second part introduces the attacks in the grid system and a vulnerability assessment framework followed by a tool that can be used to analyze the grid control systems using existing cyber security standards. In the third part, different forms of attack detection methods are discussed along with Python-based implementations for the same. The book also discusses attack mitigation methods with implementation. Detailed illustrations and tables are provided in each section. The book also includes case studies based on standard test systems thushelping students to implement the discussed methods. The case studies are based on MATLAB and Python implementations thus catering to a wide range of audiences. Outputs and screenshots of the tools and programs are included so students can compare their results and improve upon the discussed methods. The book will be useful to a wide variety of audiences such as students and researchers in Smart Grids, power system operators, and device manufacturers.
650 0 _aCooperating objects (Computer systems).
_96195
650 0 _aElectronic circuits.
_919581
650 0 _aElectric power distribution.
_97116
650 1 4 _aCyber-Physical Systems.
_932475
650 2 4 _aElectronic Circuits and Systems.
_9103224
650 2 4 _aEnergy Grids and Networks.
_935327
700 1 _aShanti Swarup, K.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_9103226
710 2 _aSpringerLink (Online service)
_9103229
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819713011
776 0 8 _iPrinted edition:
_z9789819713035
776 0 8 _iPrinted edition:
_z9789819713042
830 0 _aTransactions on Computer Systems and Networks,
_x2730-7492
_9103231
856 4 0 _uhttps://doi.org/10.1007/978-981-97-1302-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c88235
_d88235