The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate ha...The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate hardening strategies against man-made attack or natural hazards. The vulnerability indices are introduced, which return the most vulnerable component in the system based on a tri-level defender-attacker-operator(DAO) interdiction problem which solves iteratively. The output of DAO is the set of hardening strategies that optimally allocated along the network to mitigate the impact of the worst-case damages. By repeating DAO problem based on the proposed algorithm, the various crafted attack is imposed on the system, and the defender's behavior demonstrates how an element is vulnerable to threats. The WSCC 9-bus, IEEE 24-bus, and IEEE 118-bus systems are employed to evaluate the model performance.The counter-intuitive results are proven by the proposed robust hardening strategy, which shows how the hardening strategy should be allocated to improve power network resilience against threats.展开更多
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t...This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].展开更多
The present study aims to delimit protection perimeters around the “Agbo” river in Agboville in order to reduce the risks of pollution of this water resource. The methodological approach consisted first all in asses...The present study aims to delimit protection perimeters around the “Agbo” river in Agboville in order to reduce the risks of pollution of this water resource. The methodological approach consisted first all in assessing the vulnerability of the resource and then in determining the protection perimeters based on the vulnerability map and previous studies. Five parameters (slope, land use, soil type, annual runoff and drainage density) were used. These parameters were then weighted using the Saaty multicriteria analysis method. The vulnerability map reveals four classes (very low, low, medium and high) with a dominance of the low class (41.35% of the area). Three protection perimeters were delineated (immediate, close and remote). The immediate protection perimeter is delimited at a distance of 200 m around the SODECI water intake on the “Agbo” river and covers the areas with a strong influence on the vulnerability to pollution of the river. The closer protection perimeter at a distance of 1000 m, is represented by the zones with strong influence on the vulnerability of the resource and the direction of water flow in the watershed. Finally, the remote protection perimeter covers a large part of the catchment area with a surface area of 510.36 km2 and takes into account the zones that have an influence on the vulnerability to pollution of the resource. These delimited protection perimeters can serve as a guide for the management and protection of the water intake in Agboville as well as for land use planning in this area.展开更多
文摘The significance of modern power grids is acknowledged every time there is a major threat. This paper proposes the novel approaches to aid power system planner to improve power grid resilience by making appropriate hardening strategies against man-made attack or natural hazards. The vulnerability indices are introduced, which return the most vulnerable component in the system based on a tri-level defender-attacker-operator(DAO) interdiction problem which solves iteratively. The output of DAO is the set of hardening strategies that optimally allocated along the network to mitigate the impact of the worst-case damages. By repeating DAO problem based on the proposed algorithm, the various crafted attack is imposed on the system, and the defender's behavior demonstrates how an element is vulnerable to threats. The WSCC 9-bus, IEEE 24-bus, and IEEE 118-bus systems are employed to evaluate the model performance.The counter-intuitive results are proven by the proposed robust hardening strategy, which shows how the hardening strategy should be allocated to improve power network resilience against threats.
文摘This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1].
文摘The present study aims to delimit protection perimeters around the “Agbo” river in Agboville in order to reduce the risks of pollution of this water resource. The methodological approach consisted first all in assessing the vulnerability of the resource and then in determining the protection perimeters based on the vulnerability map and previous studies. Five parameters (slope, land use, soil type, annual runoff and drainage density) were used. These parameters were then weighted using the Saaty multicriteria analysis method. The vulnerability map reveals four classes (very low, low, medium and high) with a dominance of the low class (41.35% of the area). Three protection perimeters were delineated (immediate, close and remote). The immediate protection perimeter is delimited at a distance of 200 m around the SODECI water intake on the “Agbo” river and covers the areas with a strong influence on the vulnerability to pollution of the river. The closer protection perimeter at a distance of 1000 m, is represented by the zones with strong influence on the vulnerability of the resource and the direction of water flow in the watershed. Finally, the remote protection perimeter covers a large part of the catchment area with a surface area of 510.36 km2 and takes into account the zones that have an influence on the vulnerability to pollution of the resource. These delimited protection perimeters can serve as a guide for the management and protection of the water intake in Agboville as well as for land use planning in this area.