Study the structure and how to use information technology in Electric Power networks

Publish Year: 1390
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,861

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ROUDSARIT01_239

تاریخ نمایه سازی: 19 مرداد 1390

Abstract:

The electric sector liberalization is creating structural and technological changes in the utilities, pushing the classical SCADA models and other utility systems to an evolving process. There are new needs to be provided, namely data exchange between companies and between different sectors of the same company, remote maintenance, remote equipment configuration, telemetering, Demand Side Management, Distributed Generation, House/Building Automation, etc., which will create new challenges to utility SCADA and communication engineers.A proposed architecture solution is presented which is able to provide the required flexibility to cope with all the above mentioned requirements in a cost-effective way

Authors

Hossein Shahin zadeh

Department of Electrical Engineering - Islamic Azad University Khomeini Shahr Branch

Parastoo Azizyan

Department of Electrical Engineering - Islamic Azad University Najaf Abad Branch

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • " IT - ISMS _ Requirements ", Standard ISO/IEC 27001, ...
  • Falco, Joe, et al., IT Security for Industrial Control 6859, ...
  • Andrews, M., The state of web security. IEEE Security & ...
  • Steven, J., Adopting _ enterprise software security framework. IEEE Security ...
  • International Standard ISO/IEC 17799:2000 Code of Practice for Information Security ...
  • Sanz, R., Arzen, K. E., Trends in software and control. ...
  • Steven, J., Adopting an enterprise software security framework. IEEE Security ...
  • Saydjari, O. S., Defending cyberspace. IEEE Computer, Vol. 35, No. ...
  • Holzmann, G. J., The power of 10: Rules for ...
  • developing safety-critical code. IEEE Computer Vol. 39, No. 6, 2006, ...
  • Stoneburner, G., Toward a unified security/safety model. IEEE Computer, Vol. ...
  • Canada, France, Germany, Netherlands, United Kingdom, and United States, "Common ...
  • "Nmap - Free Security Scanner For Network Audits", ...
  • http ://www. insecure .org/nmap/, April, 2005. ...
  • Beitel, George, Alessi, Sam, "Control Systems Risk Decision Methodology", INL/EXT ...
  • نمایش کامل مراجع