Details

Resilient Control Architectures and Power Systems


Resilient Control Architectures and Power Systems


IEEE Press Series on Power and Energy Systems 1. Aufl.

von: Craig Rieger, Ronald Boring, Brian Johnson, Timothy McJunkin

114,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 02.12.2021
ISBN/EAN: 9781119660422
Sprache: englisch
Anzahl Seiten: 336

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>Master the fundamentals of resilient power grid control applications with this up-to-date resource from four industry leaders</b> <p><i>Resilient Control Architectures and Power Systems</i> delivers a unique perspective on the singular challenges presented by increasing automation in society. In particular, the book focuses on the difficulties presented by the increased automation of the power grid. The authors provide a simulation of this real-life system, offering an accurate and comprehensive picture of a how a power control system works and, even more importantly, how it can fail. <p>The editors invite various experts in the field to describe how and why power systems fail due to cyber security threats, human error, and complex interdependencies. They also discuss promising new concepts researchers are exploring that promise to make these control systems much more resilient to threats of all kinds. Finally, resilience fundamentals and applications are also investigated to allow the reader to apply measures that ensure adequate operation in complex control systems. <p>Among a variety of other foundational and advanced topics, you'll learn about: <ul> <li>The fundamentals of power grid infrastructure, including grid architecture, control system architecture, and communication architecture</li> <li>The disciplinary fundamentals of control theory, human-system interfaces, and cyber security</li> <li>The fundamentals of resilience, including the basis of resilience, its definition, and benchmarks, as well as cross-architecture metrics and considerations</li> <li>The application of resilience concepts, including cyber security challenges, control challenges, and human challenges</li> <li>A discussion of research challenges facing professionals in this field today</li> </ul> <p>Perfect for research students and practitioners in fields concerned with increasing power grid automation, <i>Resilient Control Architectures and Power Systems</i> also has a place on the bookshelves of members of the Control Systems Society, the Systems, Man and Cybernetics Society, the Computer Society, the Power and Energy Society, and similar organizations.
<p>Foreword xv</p> <p>Preface xvii</p> <p>Acknowledgments xxiii</p> <p>Editors Biography xxv</p> <p>List of Contributors xxvii</p> <p><b>Part I Introduction 1</b></p> <p><b>1 Basis, Definition, and Application 3<br /> </b><i>Craig Rieger</i></p> <p>1.1 Introduction 3</p> <p>1.2 Definition and Application 3</p> <p>References 6</p> <p><b>2 General Use Case Introduction 7<br /> </b><i>Brian Johnson</i></p> <p>2.1 Introduction 7</p> <p>2.2 Importance of Resilient Controls for Power Systems 7</p> <p>2.3 Power Systems Operations and Control 7</p> <p>2.4 Summary 9</p> <p>References 9</p> <p><b>Part II Infrastructure Fundamentals 11</b></p> <p><b>3 Power Grid Architecture 13<br /> </b><i>Brian Johnson and Rômulo Bainy</i></p> <p>Objectives 13</p> <p>3.1 Introduction 13</p> <p>3.2 Classical Power System Architectures 14</p> <p>3.3 Emerging Architecture Trends 17</p> <p>3.3.1 Smart Grids 17</p> <p>3.3.2 Microgrids 20</p> <p>3.4 Power Systems Operations and Control 22</p> <p>3.5 Power Systems Planning 24</p> <p>3.5.1 Modeling and Simulation 25</p> <p>3.6 Measures of Performance 26</p> <p>3.7 Summary 29</p> <p>Further Reading 30</p> <p>References 31</p> <p><b>4 Control System Architecture 33<br /> </b><i>Thomas Baldwin</i></p> <p>Objectives 33</p> <p>4.1 Introduction 33</p> <p>4.1.1 Background 33</p> <p>4.1.2 Basic Generator Control Loops 34</p> <p>4.1.3 Load Frequency Control 35</p> <p>4.1.4 The Generator 35</p> <p>4.1.5 The Load 36</p> <p>4.1.6 The Turbine-Based Prime Mover 37</p> <p>4.1.7 The Speed Governor 38</p> <p>4.1.8 The Load Frequency Control Loop 39</p> <p>4.1.9 Multiple Generators Operating with LFC 40</p> <p>4.2 Automatic Generation Control 42</p> <p>4.2.1 Background 42</p> <p>4.2.2 The AGC in Single Area Systems 42</p> <p>4.2.3 The AGC in Multi-Area Systems 43</p> <p>4.2.4 The Tie Line 43</p> <p>4.2.5 Tie Line Control 47</p> <p>4.2.6 AGC with Generation Allocation 47</p> <p>4.3 Reactive Power and Voltage Control 49</p> <p>4.3.1 Background 49</p> <p>4.3.2 Voltage Sensor 51</p> <p>4.3.3 Amplifier 51</p> <p>4.3.4 Exciter 51</p> <p>4.3.5 Generator 51</p> <p>4.3.6 The Voltage Control Loop 52</p> <p>4.4 Excitation System Stabilizer 52</p> <p>4.4.1 Rate Feedback Method 52</p> <p>4.4.2 PID Controller 54</p> <p>4.5 Summary 55</p> <p>Further Reading 56</p> <p><b>5 Communication Architecture 57<br /> </b><i>Chris Dyer</i></p> <p>Objectives 57</p> <p>5.1 Introduction 57</p> <p>5.2 Communication Media 58</p> <p>5.2.1 Copper Wire 59</p> <p>5.2.1.1 Telecommunication Industry Association (TIA)/Electronic Industries Association (EIA) RS- 232 59</p> <p>5.2.1.2 Twisted Pair (TIA RS-485) 59</p> <p>5.2.1.3 Twisted Pair (Ethernet [10Base-T]) 60</p> <p>5.2.2 Fiber-Optic Cable 60</p> <p>5.2.2.1 Optical Ground Wire (OPGW) 61</p> <p>5.2.2.2 All-Dielectric Self-Supporting (ADSS) Cables 62</p> <p>5.2.2.3 Underground Cables 62</p> <p>5.2.2.4 Splice Box 63</p> <p>5.2.2.5 Fiber-optic Terminations 63</p> <p>5.2.3 Patch Panel 65</p> <p>5.2.3.1 Patch Cables 65</p> <p>5.2.3.2 Fiber-optic Loss Calculations 66</p> <p>5.2.4 Radio-Frequency (RF) Communications 66</p> <p>5.2.4.1 Microwave 66</p> <p>5.2.4.2 VHF/UHF Radio 68</p> <p>5.2.4.3 Spread-Spectrum Communication 68</p> <p>5.2.4.4 Mesh Communication Networks 68</p> <p>5.2.4.5 Radio Propagation and Path Studies 68</p> <p>5.2.5 Local Area Networks 68</p> <p>5.2.5.1 Business Enterprise Networks 69</p> <p>5.2.5.2 Operational Enterprise Networks 69</p> <p>5.2.5.3 Remote Outstation Networks 73</p> <p>5.2.6 Backhaul Communications 78</p> <p>5.2.7 Emerging Technologies and Other Considerations 79</p> <p>5.3 Summary 80</p> <p>References 81</p> <p><b>Part III Disciplinary Fundamentals 83</b></p> <p><b>6 Introducing Interdisciplinary Studies 85<br /> </b><i>Craig Rieger</i></p> <p>Objectives 85</p> <p>6.1 Introduction 85</p> <p>6.2 The Pathway to an Interdisciplinary Team 86</p> <p>Further Reading 87</p> <p><b>7 Cybersecurity 89<br /> </b><i>Daniel Conte de Leon, Georgios M. Makrakis, and Constantinos Kolias</i></p> <p>Objectives 89</p> <p>7.1 Introduction 89</p> <p>7.2 Systems and Control Systems 90</p> <p>7.2.1 Systems, Subsystems, and Analysis Boundaries 90</p> <p>7.2.2 System Subjects and Objects 90</p> <p>7.2.3 Subject Communication and Cyber Systems 90</p> <p>7.3 Fundamental Cybersecurity Objectives: The CIA Triad 91</p> <p>7.3.1 Confidentiality 91</p> <p>7.3.2 Integrity 92</p> <p>7.3.3 Availability 93</p> <p>7.4 Fundamental Cybersecurity Techniques 93</p> <p>7.4.1 Cryptography 93</p> <p>7.4.1.1 Symmetric Encryption 94</p> <p>7.4.1.2 Asymmetric Encryption 94</p> <p>7.4.1.3 Digital Signatures 95</p> <p>7.4.2 Authentication and Identity 95</p> <p>7.4.3 Authorization and Access Control 96</p> <p>7.4.4 Accountability 97</p> <p>7.4.5 Redundancy and Replication 97</p> <p>7.5 Threats, Vulnerabilities, and Attacks 97</p> <p>7.5.1 Definitions 97</p> <p>7.5.2 Common Types of ICS Vulnerabilities 98</p> <p>7.5.2.1 Human Related 98</p> <p>7.5.2.2 Software or Firmware Based 99</p> <p>7.5.2.3 Policies and Procedures 99</p> <p>7.5.3 Attack Stages and the Cyber Kill Chain 100</p> <p>7.5.3.1 Reconnaissance 100</p> <p>7.5.3.2 Weaponization 100</p> <p>7.5.3.3 Delivery 101</p> <p>7.5.3.4 Exploitation 101</p> <p>7.5.3.5 Installation 101</p> <p>7.5.3.6 Command and Control 101</p> <p>7.5.3.7 Actions on Objectives 101</p> <p>7.5.3.8 ICS Cyber Kill Chain 101</p> <p>7.6 Secure System Design Principles 102</p> <p>7.6.1 Continuous Improvement 102</p> <p>7.6.2 Defense in Depth 102</p> <p>7.6.3 Least Privilege 103</p> <p>7.6.4 Validated Design and Implementation 103</p> <p>7.6.5 Fail-safe Defaults 103</p> <p>7.6.6 Separation of Duties 104</p> <p>7.6.7 Psychological Acceptability 104</p> <p>7.6.8 Modularization 104</p> <p>7.6.9 Accountability 104</p> <p>7.7 Approaches for Threat and Risk Assessment and Mitigation 105</p> <p>7.7.1 Risk Framing, Legal, and Compliance 105</p> <p>7.7.2 Risk Assessment 106</p> <p>7.7.3 Risk Response or Treatment 106</p> <p>7.7.4 Risk Monitoring 106</p> <p>7.7.5 Security Management and Continuous Improvement 107</p> <p>7.8 Approaches for Incident Detection and Response 107</p> <p>7.8.1 Incident and Intrusion Detection 107</p> <p>7.8.1.1 Host-Based IDS 108</p> <p>7.8.1.2 Network-Based IDS 108</p> <p>7.8.1.3 Distributed or Hybrid IDS 108</p> <p>7.8.1.4 Signature Detection 108</p> <p>7.8.1.5 Anomaly Detection 108</p> <p>7.8.2 Incident Response 109</p> <p>7.9 Summary 109</p> <p>7.10 Thoughtful Questions to Ensure Comprehension 109</p> <p>Further Reading 110</p> <p>References 110</p> <p><b>8 Control Theory 113<br /> </b><i>Desineni S. Naidu</i></p> <p>Objectives 113</p> <p>8.1 Introduction 113</p> <p>8.1.1 Formal Statement of Optimal Control Problem 114</p> <p>8.2 Deterministic Linear Systems 114</p> <p>8.2.1 Open-Loop Optimal Control of Linear Systems 114</p> <p>8.2.2 Closed-Loop Optimal Control of Linear Systems 115</p> <p>8.2.3 Finite-Time Linear Quadratic Regulator: Time-Varying Case 116</p> <p>8.2.4 Infinite-Interval Regulator System: Time-Invariant Case 116</p> <p>8.2.5 Linear Quadratic Tracking System: Finite-Time Case 117</p> <p>8.2.6 Gain Margin and Phase Margin 118</p> <p>8.2.7 Gain Margin 118</p> <p>8.2.8 Phase Margin 118</p> <p>8.3 Pontryagin Principle and HJB Equation 119</p> <p>8.3.1 The Hamilton–Jacobi–Bellman (HJB) Equation 119</p> <p>8.4 Stochastic Linear Systems 120</p> <p>8.4.1 Optimal Estimation 120</p> <p>8.4.2 Optimal Control 121</p> <p>8.5 Deterministic Nonlinear Systems 121</p> <p>8.5.1 Finite-Horizon Regulation and Tracking for Nonlinear Systems 122</p> <p>8.5.2 Finite-Horizon Regulator 122</p> <p>8.5.3 Finite-Horizon Tracking for Nonlinear Systems 123</p> <p>8.6 Summary 124</p> <p>8.7 Thoughtful Questions to Ensure Comprehension 124</p> <p>Further Reading 125</p> <p>References 125</p> <p><b>9 Human System Interfaces 127<br /> </b><i>Ronald Boring</i></p> <p>Objectives 127</p> <p>9.1 Introduction 127</p> <p>9.1.1 Control Systems 127</p> <p>9.1.2 History of Humans and Control Systems 128</p> <p>9.1.3 Common Elements of Control System HSIs 128</p> <p>9.1.4 Consequences of Poor HSIs in Control Systems 129</p> <p>9.2 Basic Methods 131</p> <p>9.2.1 Introduction to User-Centered Design 131</p> <p>9.2.2 Design Planning 133</p> <p>9.2.3 Prototyping Process 134</p> <p>9.2.4 Evaluation Process 135</p> <p>9.2.5 Validation versus Verification 138</p> <p>9.3 Summary 140</p> <p>Further Reading 142</p> <p>References 142</p> <p><b>Part IV Metrics Fundamentals 145</b></p> <p><b>10 Differentiating Resilience 147<br /> </b><i>Jeffrey D. Taft</i></p> <p>Objectives 147</p> <p>10.1 Introduction 147</p> <p>10.2 Conventional Views of Grid Resilience 150</p> <p>10.3 Grid Characteristics 151</p> <p>10.4 Grid Resilience and the Relationship to Electric Reliability 152</p> <p>10.5 Characterization of Resilience 155</p> <p>10.5.1 Stress and Stressors 156</p> <p>10.5.2 Physical Scale 156</p> <p>10.5.3 Temporal Scale 157</p> <p>10.5.4 Strain 157</p> <p>10.5.5 Resilience Domains 157</p> <p>10.5.5.1 Stress Avoidance 157</p> <p>10.5.5.2 Stress Resistance 158</p> <p>10.5.5.3 Strain Adjustment 159</p> <p>10.5.6 Foundational Support 160</p> <p>10.6 Architectural Principles and Concepts for Resilience 160</p> <p>10.6.1 All Hazards Approach 162</p> <p>10.6.2 Situational Awareness 162</p> <p>10.6.3 ULS Normal Failures Approach 162</p> <p>10.6.4 System Hardness 162</p> <p>10.6.5 Flexibility 162</p> <p>10.6.6 Extensibility 163</p> <p>10.6.7 Agility 163</p> <p>10.6.8 Distributed Versus Centralized Systems 163</p> <p>10.6.9 Buffering 163</p> <p>10.6.10 Structural Resilience 163</p> <p>10.6.11 Redundancy 164</p> <p>10.7 Structural Resilience Quantification and Valuation 164</p> <p>10.8 Summary 166</p> <p>Further Reading 167</p> <p>References 167</p> <p><b>11 Cross-architecture Metrics 169<br /> </b><i>Timothy McJunkin</i></p> <p>Objectives 169</p> <p>11.1 Definition of Resilience 169</p> <p>11.2 Notional Capture of Resilience Adaptive Capacity 173</p> <p>11.3 Response Epoch: Adaptive Capacity on an Asset-Level Development 174</p> <p>11.4 Adaptive Capacity on an Aggregated-Level Development 176</p> <p>Exercises 178</p> <p>Exercises 178</p> <p>11.5 Cybersecurity Considerations 179</p> <p>11.6 Consideration of Resist Epoch (Inertia) 182</p> <p>11.7 Consideration of Recover and Restore Epochs 183</p> <p>References 184</p> <p><b>Part V Resilience Application 185</b></p> <p><b>12 Introducing the Grid Game 187<br /> </b><i>Timothy McJunkin</i></p> <p>Objectives 187</p> <p>12.1 Introduction 187</p> <p>12.2 Download/Install the Game 187</p> <p>12.3 Play the Grid Game 188</p> <p>12.4 Fundamentals 194</p> <p>12.5 Evaluate the Grid Game and Players (Yourself and Others) 196</p> <p>12.6 Play Together 198</p> <p>12.7 Improve the Game 198</p> <p>References 198</p> <p><b>13 Cybersecurity and Resilience for the Power Grid 201<br /> </b><i>xi Qin, Kelvin Mai, Neil Ortiz, Keerthi Koneru, and Alvaro A. Cardenas</i></p> <p>Objectives 201</p> <p>13.1 Introduction 201</p> <p>13.2 Operation Technologies in the Power Grid 201</p> <p>13.3 Cyberattacks to the Power Grid 206</p> <p>13.3.1 Attacks in Ukraine 206</p> <p>13.3.2 Other Potential Attacks 208</p> <p>13.4 Research Efforts 208</p> <p>13.4.1 Classical Power Grid Systems 208</p> <p>13.4.2 Smart Grid Systems 209</p> <p>13.4.3 Grid Simulator 211</p> <p>13.5 Summary 211</p> <p>13.6 Thoughtful Questions to Ensure Comprehension 211</p> <p>Further Reading 212</p> <p>References 212</p> <p><b>14 Control Challenges 215<br /> </b><i>Quanyan Zhu</i></p> <p>Objectives 215</p> <p>14.1 Introduction 215</p> <p>14.2 Resiliency Challenges in Control Systems 216</p> <p>14.3 Resiliency Design Framework 217</p> <p>14.3.1 Control of Autonomous Systems in Adversarial Environment 218</p> <p>14.3.2 Cross-Layer Defense for Cloud-Enabled Internet of Controlled Things 219</p> <p>14.4 Resiliency for Decentralized Control Systems 221</p> <p>14.5 Summary 223</p> <p>14.6 Thoughtful Questions to Ensure Comprehension 223</p> <p>Further Reading 224</p> <p>References 225</p> <p><b>15 Human Challenges 231<br /> </b><i>Anshul Rege</i></p> <p>Objectives 231</p> <p>15.1 Introduction 231</p> <p>15.2 Experiential Learning and the Multidisciplinary Grid Game 232</p> <p>15.2.1 Grid Game Case Study 232</p> <p>15.2.2 Grid Operations and Cybersecurity 233</p> <p>15.2.2.1 Grid Operations 233</p> <p>15.2.2.2 Microgrid Stability and Generation Control System 233</p> <p>15.2.2.3 Generator Inertia 233</p> <p>15.2.2.4 Energy Storage 234</p> <p>15.2.3 Cyber Adversarial Decision-Making 234</p> <p>15.2.4 Cyber Defender Decision-Making 236</p> <p>15.2.4.1 Group Dynamics and Divisions of Labor 236</p> <p>15.2.4.2 Cybersecurity Preparations 236</p> <p>15.2.4.3 Response to Cyberattacks 237</p> <p>15.2.5 Cyber-Field Research 237</p> <p>15.2.5.1 Designing and Conducting Research 237</p> <p>15.2.5.2 Weaving Multiple Methods in Real Time 237</p> <p>15.2.5.3 Exposure to All Phases of Research 238</p> <p>15.3 Benefits of Gamifying Cybersecurity 239</p> <p>15.3.1 Discipline-Specific Benefits 239</p> <p>15.3.2 Challenges 239</p> <p>15.4 Summary 239</p> <p>Further Reading 241</p> <p>References 241</p> <p><b>Part VI Additional Design Considerations 243</b></p> <p><b>16 Interdependency Analysis 245<br /> </b><i>Ryan Hruska</i></p> <p>Objectives 245</p> <p>16.1 Introduction 245</p> <p>16.1.1 Dependencies and Interdependencies 245</p> <p>16.1.2 Electric-Grid System Dependencies 246</p> <p>16.2 Approaches to Infrastructure Dependency Analysis 247</p> <p>16.2.1 Engineering Models 247</p> <p>16.2.2 Systems Engineering 248</p> <p>16.2.3 Geospatial Modeling 248</p> <p>16.2.4 All-Hazards Analysis 249</p> <p>16.3 Bulk Power Systems Interdependency Case Studies 249</p> <p>16.3.1 Natural Gas Expansion 249</p> <p>16.3.1.1 Natural Gas Interdependencies for Electric Generation 251</p> <p>16.3.1.2 Seasonal Impacts 252</p> <p>16.3.2 Water Interdependencies 253</p> <p>16.4 Summary 256</p> <p>Further Reading 256</p> <p>References 257</p> <p><b>17 Multi-agent Control Systems 259<br /> </b><i>Craig Rieger</i></p> <p>Objectives 259</p> <p>17.1 Introduction 259</p> <p>17.1.1 What Is an Agent? 259</p> <p>17.1.2 Intelligent Agent 259</p> <p>17.1.3 Resilient Agent 260</p> <p>17.1.4 Multi-agents and Benefit to Resilience 260</p> <p>17.2 Control System Design 261</p> <p>17.2.1 Tiers of Control 261</p> <p>17.2.2 Decomposition of Operational Philosophy into Management and Coordination Layers 261</p> <p>17.2.3 Decomposition of Operational Philosophy into Execution Layer 263</p> <p>17.2.4 Data-driven Methodology for Application of Tiered Control 264</p> <p>17.2.5 Cyber–Physical Degradation Assessment 264</p> <p>17.3 Control System Application 267</p> <p>17.3.1 Human Decision Integration into Management and Execution Layers 267</p> <p>17.3.2 Distributed Control and the Execution Layer Formulation 268</p> <p>17.3.3 Domain Application 269</p> <p>17.4 Summary 272</p> <p>Further Reading 273</p> <p>An overview of a HMADS for power system applications: 273</p> <p>References 273</p> <p><b>18 Other Examples of Resilience Application 275<br /> </b><i>Meghan G. Sahakian and Eric D. Vugrin</i></p> <p>Objectives 275</p> <p>18.1 Introduction 275</p> <p>18.2 Resilient Design Capacities 276</p> <p>18.3 Anticipative Capacity 276</p> <p>18.4 Absorptive Capacity 277</p> <p>18.5 Adaptive Capacity 278</p> <p>18.6 Restorative Capacity 279</p> <p>18.7 Considerations for Resilient Design 279</p> <p>18.8 System of Interest 280</p> <p>18.9 Threat Space 281</p> <p>18.10 Operational Constraints 282</p> <p>18.11 Summary 282</p> <p>Further Reading 283</p> <p>References 283</p> <p><b>Part VII Conclusions 285</b></p> <p><b>19 Summary and Challenge for the Future 287<br /> </b><i>Craig Rieger</i></p> <p>19.1 Introduction 287</p> <p>19.2 Resilience is not a Design Layer, It is a Philosophy 287</p> <p>19.3 Resilience and the Road to Autonomous Systems 288</p> <p>References 288</p> <p>Index 289</p>
<p><b>Craig Rieger, PhD,</B> is Chief Control Systems Research Engineer at the Idaho National Laboratory. His research focus is on next generation resilient control systems.</p> <p><b>Ronald Boring, PhD,</B> is Researcher and Principal Investigator at Idaho National Laboratory. His primary research foci are on human reliability, human factors, and human-computer interaction forums. <p><b>Brian Johnson, PhD, </b>is University Distinguished Professor and Schweitzer Engineering Laboratories Endowed Chair in Power Engineering in the Department of Electrical and Computer Engineering at the University of Idaho. <p><b>Timothy McJunkin</B> is an Electrical Engineer at the Idaho National Laboratory. His primary research foci are on the development of interest resilient control of critical infrastructure, Smart Grid for renewable energy integration, and design of zero carbon microgrids.
<p><b>Master the fundamentals of resilient power grid control applications with this up-to-date resource from four industry leaders</b></p> <p><i>Resilient Control Architectures and Power Systems</i> delivers a unique perspective on the singular challenges presented by increasing automation in society. In particular, the book focuses on the difficulties presented by the increased automation of the power grid. The authors provide a simulation of this real-life system, offering an accurate and comprehensive picture of a how a power control system works and, even more importantly, how it can fail. <p>The editors invite various experts in the field to describe how and why power systems fail due to cyber security threats, human error, and complex interdependencies. They also discuss promising new concepts researchers are exploring that promise to make these control systems much more resilient to threats of all kinds. Finally, resilience fundamentals and applications are also investigated to allow the reader to apply measures that ensure adequate operation in complex control systems. <p>Among a variety of other foundational and advanced topics, you’ll learn about: <ul><li>The fundamentals of power grid infrastructure, including grid architecture, control system architecture, and communication architecture</li> <li>The disciplinary fundamentals of control theory, human-system interfaces, and cyber security</li> <li>The fundamentals of resilience, including the basis of resilience, its definition, and benchmarks, as well as cross-architecture metrics and considerations</li> <li>The application of resilience concepts, including cyber security challenges, control challenges, and human challenges</li> <li>A discussion of research challenges facing professionals in this field today</li></ul> <p>Perfect for research students and practitioners in fields concerned with increasing power grid automation, <i>Resilient Control Architectures and Power Systems</i> also has a place on the bookshelves of members of the Control Systems Society, the Systems, Man and Cybernetics Society, the Computer Society, the Power and Energy Society, and similar organizations.

Diese Produkte könnten Sie auch interessieren:

Ground Penetrating Radar
Ground Penetrating Radar
von: Mohammed Serhir, Dominique Lesselier
EPUB ebook
142,99 €
Computational Imaging for Scene Understanding
Computational Imaging for Scene Understanding
von: Takuya Funatomi, Takahiro Okabe
EPUB ebook
142,99 €