All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27200%2F14%3A86091607" target="_blank" >RIV/61989100:27200/14:86091607 - isvavai.cz</a>

  • Result on the web

    <a href="http://dx.doi.org/10.5604/18984509.1140884" target="_blank" >http://dx.doi.org/10.5604/18984509.1140884</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.5604/18984509.1140884" target="_blank" >10.5604/18984509.1140884</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID

  • Original language description

    This paper describes way how to use graph theory in security analysis. As an environment is used network of power lines and devices which are included here. Power grid is considered as a system of nodes which make together graph (network). On the simpleexample is applied Fiedler?s theory which is able to select the most important power lines of whole network. Components related to these lines are logicly ordered and considered by author´s modified analysis. This method has been improved and optimalizedfor risks related with illegal acts. Each power grid component has been connected with possible kind of attack and every of this device was gradually evaluated by five coefficients which takes values from 1 to 10. On the coefficient basis was assessed the level of risk. In the last phase the most risky power grid components have been selected. On the selected devices have been proposed security measures.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)

  • CEP classification

    AP - Municipal, regional and transportation planning

  • OECD FORD branch

Result continuities

  • Project

    <a href="/en/project/VG20102015059" target="_blank" >VG20102015059: The influence of terrorist attack on select industrial technology with dust detonation hazard</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Securitology

  • ISSN

    1898-4509

  • e-ISSN

  • Volume of the periodical

    2014/20

  • Issue of the periodical within the volume

    2

  • Country of publishing house

    PL - POLAND

  • Number of pages

    14

  • Pages from-to

    87-99

  • UT code for WoS article

  • EID of the result in the Scopus database