UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27200%2F14%3A86091607" target="_blank" >RIV/61989100:27200/14:86091607 - isvavai.cz</a>
Result on the web
<a href="http://dx.doi.org/10.5604/18984509.1140884" target="_blank" >http://dx.doi.org/10.5604/18984509.1140884</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.5604/18984509.1140884" target="_blank" >10.5604/18984509.1140884</a>
Alternative languages
Result language
angličtina
Original language name
UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID
Original language description
This paper describes way how to use graph theory in security analysis. As an environment is used network of power lines and devices which are included here. Power grid is considered as a system of nodes which make together graph (network). On the simpleexample is applied Fiedler?s theory which is able to select the most important power lines of whole network. Components related to these lines are logicly ordered and considered by author´s modified analysis. This method has been improved and optimalizedfor risks related with illegal acts. Each power grid component has been connected with possible kind of attack and every of this device was gradually evaluated by five coefficients which takes values from 1 to 10. On the coefficient basis was assessed the level of risk. In the last phase the most risky power grid components have been selected. On the selected devices have been proposed security measures.
Czech name
—
Czech description
—
Classification
Type
J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)
CEP classification
AP - Municipal, regional and transportation planning
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/VG20102015059" target="_blank" >VG20102015059: The influence of terrorist attack on select industrial technology with dust detonation hazard</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2014
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Securitology
ISSN
1898-4509
e-ISSN
—
Volume of the periodical
2014/20
Issue of the periodical within the volume
2
Country of publishing house
PL - POLAND
Number of pages
14
Pages from-to
87-99
UT code for WoS article
—
EID of the result in the Scopus database
—