A fuzzy set-based approach for model-based Internet-banking System security risk assessment

2006 ◽  
Vol 11 (6) ◽  
pp. 1869-1872 ◽  
Author(s):  
Li Hetian ◽  
Liu Yun ◽  
He Dequan
Processes ◽  
2019 ◽  
Vol 7 (12) ◽  
pp. 900
Author(s):  
Shiwei Xia ◽  
Liangyun Song ◽  
Yi Wu ◽  
Zhoujun Ma ◽  
Jiangping Jing ◽  
...  

Large-scale wind power integrated into power grids brings serious uncertainties and risks for power system safe operation, and it is imperative to evaluate power system security risk pertinent to high-level of uncertainties. In this paper, a comprehensive source–network–load probabilistic model, representing the typical uncertainties penetrated in power generation transmission consumption portion, is firstly set for power system operation. Afterwards an integrated LHS–CD approach based on the Latin hypercube sampling (LHS) and Cholesky decomposition (CD) is tailored to effectively conduct the security risk assessment, in which the LHS is utilized to stratified sample the uncertainties of wind power and thermal power, transmission line outage, and load demands, while the CD part is adopted to address the correlations of uncertainties by rearranging the sampled matrix generated by LHS. Moreover, static voltage risk and transmission line overloaded risk index are properly defined for quantitatively evaluating power system operational security risk. Simulation results of a modified New England 39-bus system confirm that the proposed integrated LHS–CD approach is effective and efficient for power system security risk assessment with consideration of source–network–load demand uncertainties.


2011 ◽  
Vol 403-408 ◽  
pp. 1483-1486
Author(s):  
Chi Xu ◽  
Wen Fang Zhang

The research of this dissertation focuses on the quantitative methodologies of the network security assessment. So the dissertation gives the term “Model-based network security risk assessment” a more meaningful definition. The methodology called a model-based will use one network security analysis model to design the scenarios of threatens according to the Patterns behaviors of vulnerabilities and threatens in the network. And then the risk assessment will be done under those scenarios. Following this new definition. The dissertation Proposes a Component-centric Access Graph Based Network Security Risk Assessment Model (Oc-AGNSRAM).


Sign in / Sign up

Export Citation Format

Share Document