Cyber-Security for Smart Grid Control (Record no. 88235)

000 -LEADER
fixed length control field 04071nam a22005895i 4500
001 - CONTROL NUMBER
control field 978-981-97-1302-8
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730172340.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240601s2024 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789819713028
-- 978-981-97-1302-8
082 04 - CLASSIFICATION NUMBER
Call Number 621.38
100 1# - AUTHOR NAME
Author Sreejith, Amulya.
245 10 - TITLE STATEMENT
Title Cyber-Security for Smart Grid Control
Sub Title Vulnerability Assessment, Attack Detection, and Mitigation /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XVI, 147 p. 58 illus., 42 illus. in color.
490 1# - SERIES STATEMENT
Series statement Transactions on Computer Systems and Networks,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Smart Grid Cyber Physical System: An overview -- Smart Grid Control -- Attack Modelling for Smart Grid Control -- Vulnerability Assessment for Multi-Area Load Frequency Control -- MITRE ATT&CK for Smart Grid Cyber-Security -- Signal Processing based Attack Detection -- Machine Learning Based Attack Detection -- Attack Mitigation and Recovery in Smart Grid Control.
520 ## - SUMMARY, ETC.
Summary, etc The book focuses on a very important area of Smart Grids - cyber security. It deals in particular with the tools and techniques for cyber security analysis of the Smart Grid control systems. This includes the standards and guidelines, detailed vulnerability assessment framework, attack detection strategies, and attack mitigation methods. The book is divided into three parts. The smart grid cyber-physical system is discussed in the first part. The second part introduces the attacks in the grid system and a vulnerability assessment framework followed by a tool that can be used to analyze the grid control systems using existing cyber security standards. In the third part, different forms of attack detection methods are discussed along with Python-based implementations for the same. The book also discusses attack mitigation methods with implementation. Detailed illustrations and tables are provided in each section. The book also includes case studies based on standard test systems thushelping students to implement the discussed methods. The case studies are based on MATLAB and Python implementations thus catering to a wide range of audiences. Outputs and screenshots of the tools and programs are included so students can compare their results and improve upon the discussed methods. The book will be useful to a wide variety of audiences such as students and researchers in Smart Grids, power system operators, and device manufacturers.
700 1# - AUTHOR 2
Author 2 Shanti Swarup, K.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-981-97-1302-8
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2024.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cooperating objects (Computer systems).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic circuits.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electric power distribution.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cyber-Physical Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Electronic Circuits and Systems.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Energy Grids and Networks.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2730-7492
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS

No items available.