找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Securing Electricity Supply in the Cyber Age; Exploring the Risks Zofia Lukszo,Geert Deconinck,Margot P. C. Weijnen Book 2010 Springer Sci

[復制鏈接]
查看: 35652|回復: 45
樓主
發(fā)表于 2025-3-21 16:32:30 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Securing Electricity Supply in the Cyber Age
副標題Exploring the Risks
編輯Zofia Lukszo,Geert Deconinck,Margot P. C. Weijnen
視頻videohttp://file.papertrans.cn/864/863339/863339.mp4
概述Provides a coherent view of problems and solutions for the security of current and future electricity infrastructures
叢書名稱Topics in Safety, Risk, Reliability and Quality
圖書封面Titlebook: Securing Electricity Supply in the Cyber Age; Exploring the Risks  Zofia Lukszo,Geert Deconinck,Margot P. C. Weijnen Book 2010 Springer Sci
描述.The electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of trade within and between electricity systems, the associated market restructuring and an increasing share of decentralized generation. At the same time, there is a shift in public goals towards low-carbon and sustainable power generation. This requires a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation as well as for facilitating markets. A recent example is demand-side management, which requires detailed metering of consumption and decentralized electricity generation...The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether acc
出版日期Book 2010
關鍵詞communication; complexity; control; cyber; information; integrated circuit; management; networks; organizati
版次1
doihttps://doi.org/10.1007/978-90-481-3594-3
isbn_softcover978-94-007-3156-1
isbn_ebook978-90-481-3594-3Series ISSN 1566-0443 Series E-ISSN 2215-0285
issn_series 1566-0443
copyrightSpringer Science+Business Media B.V. 2010
The information of publication is updating

書目名稱Securing Electricity Supply in the Cyber Age影響因子(影響力)




書目名稱Securing Electricity Supply in the Cyber Age影響因子(影響力)學科排名




書目名稱Securing Electricity Supply in the Cyber Age網(wǎng)絡公開度




書目名稱Securing Electricity Supply in the Cyber Age網(wǎng)絡公開度學科排名




書目名稱Securing Electricity Supply in the Cyber Age被引頻次




書目名稱Securing Electricity Supply in the Cyber Age被引頻次學科排名




書目名稱Securing Electricity Supply in the Cyber Age年度引用




書目名稱Securing Electricity Supply in the Cyber Age年度引用學科排名




書目名稱Securing Electricity Supply in the Cyber Age讀者反饋




書目名稱Securing Electricity Supply in the Cyber Age讀者反饋學科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權限
沙發(fā)
發(fā)表于 2025-3-21 20:35:39 | 只看該作者
板凳
發(fā)表于 2025-3-22 03:43:56 | 只看該作者
Laurens J. de Vries,Marcelo Masera,Henryk Faas führen mithin zwangsl?ufig in dieses empirische Problemfeld und weisen ihm einen zentralen Stellenwert zu: . So lautet aus . Sicht die . Formulierung des Grundproblems, wie sich Identit?t aus Differenz bildet.. Die Bearbeitung dieses Problems liefert auch die Grundlage, auf der Einsicht in die M?gl
地板
發(fā)表于 2025-3-22 07:40:30 | 只看該作者
C. Tranchita,N. Hadjsaid,M. Viziteu,B. Rozel,R. Caire
5#
發(fā)表于 2025-3-22 11:59:31 | 只看該作者
The Future of Electricity Systems: General Trends, Developments,
6#
發(fā)表于 2025-3-22 14:36:09 | 只看該作者
Critical Interrelations Between ICT and Electricity System,
7#
發(fā)表于 2025-3-22 20:58:54 | 只看該作者
Governance: How to Deal with ICT Security in the Power Infrastructure?,
8#
發(fā)表于 2025-3-23 00:11:21 | 只看該作者
9#
發(fā)表于 2025-3-23 02:59:21 | 只看該作者
10#
發(fā)表于 2025-3-23 08:10:33 | 只看該作者
Book 2010ty, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether acc
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結 SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-23 02:54
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
金阳县| 蒙山县| 营山县| 黄平县| 广水市| 平乡县| 托克逊县| 甘孜县| 泰州市| 芮城县| 右玉县| 广西| 论坛| 紫阳县| 离岛区| 博客| 响水县| 柳州市| 琼海市| 视频| 大理市| 根河市| 永吉县| 科尔| 大余县| 龙岩市| 精河县| 蒙自县| 西畴县| 得荣县| 日照市| 孝义市| 方山县| 昭觉县| 闻喜县| 剑河县| 怀安县| 和静县| 全州县| 阜宁县| 慈溪市|