期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Max-Min Security Rate Optimization in STAR-RIS Aided Secure MIMO Systems
1
作者 HUANG Jinhao MIAO Ling +1 位作者 SUO Long ZHOU Wen 《电讯技术》 北大核心 2025年第10期1657-1664,共8页
The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-inpu... The simultaneous transmitting and reflecting reconfigurable intelligent surface(STAR-RIS)can independently adjust surface’s reflection and transmission coefficients so as to enhance space coverage.For a multiple-input multiple-output(MIMO)communication system with a STAR-RIS,a base station(BS),an eavesdropper,and multiple users,the system security rate is studied.A joint design of the power allocation at the transmitter and phase shift matrices for reflection and transmission at the STAR-RIS is conducted,in order to maximize the worst achievable security data rate(ASDR).Since the problem is nonconvex and hence challenging,a particle swarm optimization(PSO)based algorithm is developed to tackle the problem.Both the cases of continuous and discrete phase shift matrices at the STAR-RIS are considered.Simulation results demonstrate the effectiveness of the proposed algorithm and shows the benefits of using STAR-RIS in MIMO mutliuser systems. 展开更多
关键词 multiple-input multiple-output(MIMO) reflecting reconfigurable intelligent surface(STAR-RIS) particle swarm optimization(PSO) max-min security rate optimization
在线阅读 下载PDF
The Effective Enhancement of Power System Security by Flexible Transmission Line Impedance with Minimal Rescheduling of Generators
2
作者 Karuppasamy Muthulakshmi R.M. Sasiraja Selvarajan Mukesh Muthu 《Circuits and Systems》 2016年第4期381-389,共9页
After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper pre... After the digital revolution, the power system security becomes an important issue and it urges the power producers to maintain a well secured system in order to supply a quality power to the end users. This paper presents an integrated Corrective Security Constrained Optimal Power Flow (CSCOPF) with Flexible Transmission Line Impedance (FTLI) to enhance the power system security. The corrective approach of SCOPF is chosen, because it allows the corrective equipment to bring back the system to a stable operating point and hence, it offers high flexibility and better economics. The concept of FTLI arises from the ability of FACTS devices such as Thyristor Controlled Series Capacitor (TCSC), which can vary the line reactance to a certain extent. An enhanced security can be achieved by incorporating FTLI into the CSCOPF problem, since the power flow in a system is highly dependent on the line reactance. FTLI based CSCOPF can reduce the amount of rescheduling of generators, but it will result in an increased number of variables and thus, the complexity to the optimization process is increased. This highly complex problem is solved by using nonlinear programming. The AC based OPF model is preferred, since the corrective security actions require highly accurate solutions. IEEE 30 bus system is used to test the proposed scheme and the results are compared with the traditional CSCOPF. It can be seen that the proposed idea provides a notable improvement in the reduction of cost incurred for restoring the system security. 展开更多
关键词 Flexible Transmission Line Impedance Power System security security Constrained Optimal
在线阅读 下载PDF
The “Iterated Weakest Link” Model of Adaptive Security Investment
3
作者 Rainer Böhme Tyler Moore 《Journal of Information Security》 2016年第2期81-102,共22页
We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakest link. Using the model, we derive and compare o... We devise a model for security investment that reflects dynamic interaction between a defender, who faces uncertainty, and an attacker, who repeatedly targets the weakest link. Using the model, we derive and compare optimal security investment over multiple periods, exploring the delicate balance between proactive and reactive security investment. We show how the best strategy depends on the defender’s knowledge about prospective attacks and the recoverability of costs when upgrading defenses reactively. Our model explains why security under-investment is sometimes rational even when effective defenses are available and can be deployed independently of other parties’ choices. Finally, we connect the model to real-world security problems by examining two case studies where empirical data are available: computers compromised for use in online crime and payment card security. 展开更多
关键词 Optimal security Investment under Uncertainty Return on security Investment
在线阅读 下载PDF
Machine Learning Enabled Novel Real-Time IoT Targeted DoS/DDoS Cyber Attack Detection System
4
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Mohamed Aashiq 《Computers, Materials & Continua》 SCIE EI 2024年第9期3655-3683,共29页
The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential... The increasing prevalence of Internet of Things(IoT)devices has introduced a new phase of connectivity in recent years and,concurrently,has opened the floodgates for growing cyber threats.Among the myriad of potential attacks,Denial of Service(DoS)attacks and Distributed Denial of Service(DDoS)attacks remain a dominant concern due to their capability to render services inoperable by overwhelming systems with an influx of traffic.As IoT devices often lack the inherent security measures found in more mature computing platforms,the need for robust DoS/DDoS detection systems tailored to IoT is paramount for the sustainable development of every domain that IoT serves.In this study,we investigate the effectiveness of three machine learning(ML)algorithms:extreme gradient boosting(XGB),multilayer perceptron(MLP)and random forest(RF),for the detection of IoTtargeted DoS/DDoS attacks and three feature engineering methods that have not been used in the existing stateof-the-art,and then employed the best performing algorithm to design a prototype of a novel real-time system towards detection of such DoS/DDoS attacks.The CICIoT2023 dataset was derived from the latest real-world IoT traffic,incorporates both benign and malicious network traffic patterns and after data preprocessing and feature engineering,the data was fed into our models for both training and validation,where findings suggest that while all threemodels exhibit commendable accuracy in detectingDoS/DDoS attacks,the use of particle swarmoptimization(PSO)for feature selection has made great improvements in the performance(accuracy,precsion recall and F1-score of 99.93%for XGB)of the ML models and their execution time(491.023 sceonds for XGB)compared to recursive feature elimination(RFE)and randomforest feature importance(RFI)methods.The proposed real-time system for DoS/DDoS attack detection entails the implementation of an platform capable of effectively processing and analyzing network traffic in real-time.This involvesemploying the best-performing ML algorithmfor detection and the integration of warning mechanisms.We believe this approach will significantly enhance the field of security research and continue to refine it based on future insights and developments. 展开更多
关键词 Machine learning Internet of Things(IoT) DoS DDoS CYBERsecurity intrusion prevention network security feature optimization sustainability
在线阅读 下载PDF
Ecosystem Service Value Evolution and Security Pattern Optimization in Huaihai Economic Zone 被引量:4
5
作者 CAO Yuhong CAO Yuandan +1 位作者 CHEN Zhiyu YU Dailiang 《Journal of Resources and Ecology》 CSCD 2022年第6期977-985,共9页
The ecological and environmental effects caused by land use change have attracted global attention.Huaihai Economic Zone, as the core of the Huaihe River ecological economic belt, has experienced a reciprocal evolutio... The ecological and environmental effects caused by land use change have attracted global attention.Huaihai Economic Zone, as the core of the Huaihe River ecological economic belt, has experienced a reciprocal evolution of land use, ecological security and regional economic development. Based on multi-stage land use data extracted by Google Earth Engine(GEE), the spatio-temporal differentiation characteristics of ecosystem service value(ESV) evolution in Huaihai Economic Zone from 1998 to 2018 were analyzed with the help of ESV assessment and a minimum accumulated resistance model(MCR), and the regional ecological security pattern(ESP) was optimized. The results show that ESV intensity has obvious spatial differentiation, which is higher in northeastern China and lower in southwestern China. The median ESV area accounted for the largest proportion, while the high and low ESV areas accounted for a small proportion. The characteristics of EVS temporal and spatial differentiation show decreasing and increasing grades. From the perspective of development period, the ESV grade changes show a positive trend. In the optimization of the ecological security pattern, 26 important ecological sources, 22main landscape ecological corridors, and 65 ecological strategic nodes were optimized and identified, and the middle-level ecological security zone accounted for the largest proportion. The main reasons for the changes in the ESV and ESP are closely related to the changes in local natural resources and the changes and adjustments in government protection policies. These research results can provide a reference for inter-provincial territorial space protection and the formulation of a sustainable development strategy. 展开更多
关键词 land use change ecosystem service value optimization of ecological security pattern Huaihai Economic Zone
原文传递
Multi-objective Robust Optimal Secure Operation Model of Large-scale Power Grid with Multiple Back-to-back Voltage Source Converter Based Systems Considering Short-circuit Current Limitation
6
作者 Weikun Liang Shunjiang Lin +2 位作者 Yuerong Yang Ziqing Yang Mingbo Liu 《Journal of Modern Power Systems and Clean Energy》 2025年第4期1151-1166,共16页
With the load growth and the power grid expansion,the problem of short-circuit current(SCC)exceeding the secure limit in large-scale power grids has become more serious,which poses great challenge to the optimal secur... With the load growth and the power grid expansion,the problem of short-circuit current(SCC)exceeding the secure limit in large-scale power grids has become more serious,which poses great challenge to the optimal secure operation.Aiming at the SCC limitations,we use multiple back-toback voltage source converter based(B2B VSC)systems to separate a large-scale AC power grid into two asynchronous power grids.A multi-objective robust optimal secure operation model of large-scale power grid with multiple B2B VSC systems considering the SCC limitation is established based on the AC power flow equations.The decision variables include the on/off states of synchronous generators,power output,terminal voltage,transmission switching,bus sectionalization,and modulation ratios of B2B VSC systems.The influence of inner current sources of renewable energy generators on the system SCC is also considered.To improve the computational efficiency,a mixedinteger convex programming(MICP)framework based on convex relaxation methods including the inscribed N-sided approximation for the nonlinear SCC limitation constraints is proposed.Moreover,combined with the column-and-constraint generation(C&CG)algorithm,a method to directly solve the compromise optimal solution(COS)of the multi-objective robust optimal secure operation model is proposed.Finally,the effectiveness and computational efficiency of the proposed solution method is demonstrated by an actual 4407-bus provincial power grid and the modified IEEE 39-bus power grid,which can reduce the consumed CPU time of solving the COS by more than 90%and obtain a better COS. 展开更多
关键词 Large-scale power grid optimal secure operation short-circuit current(SCC)limitation BACK-TO-BACK voltage source converter convex relaxation multi-objective robust optimization
原文传递
Review of Key Problems Related to Integrated Energy Distribution Systems 被引量:62
7
作者 Dan Wang Liu Liu +4 位作者 Hongjie Jia Weiliang Wang Yunqiang Zhi Zhengji Meng Bingyu Zhou 《CSEE Journal of Power and Energy Systems》 SCIE 2018年第2期130-145,共16页
Integrated energy distribution system(IEDS)is one of the integrated energy and power system forms,which involves electricity/gas/cold/heat and other various energy forms.The energy coupling relationship is close and c... Integrated energy distribution system(IEDS)is one of the integrated energy and power system forms,which involves electricity/gas/cold/heat and other various energy forms.The energy coupling relationship is close and complex.IEDS is the focus of regional energy internet research and development at home and abroad.Compared with the traditional power distribution system,IEDS through the multi-energy coupling link comprehensive utilization,effectively improve the distribution system economy,safety,reliability,flexibility and toughness,but also to ease the regional energy system environmental pressure.IEDS is an important direction for the future development of energy systems,and its related research and practice on China’s energy system development also has important practical and strategic significance.This paper summarizes the related researches of the IEDS and explores the energy operation characteristics and coupling mechanisms.What’s more,the integrated model of IEDS is summarized.On these bases,this paper discusses and prospects some key issues such as joint planning,optimization control and security analysis,state estimation and situational awareness and generalized demand side management. 展开更多
关键词 Energy internet generalized demand side management integrated energy distribution system(IEDS) integrated modeling joint planning optimization control and security analysis state estimation and situational awareness
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部