UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27200%2F14%3A86091607" target="_blank" >RIV/61989100:27200/14:86091607 - isvavai.cz</a>
Výsledek na webu
<a href="http://dx.doi.org/10.5604/18984509.1140884" target="_blank" >http://dx.doi.org/10.5604/18984509.1140884</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.5604/18984509.1140884" target="_blank" >10.5604/18984509.1140884</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID
Popis výsledku v původním jazyce
This paper describes way how to use graph theory in security analysis. As an environment is used network of power lines and devices which are included here. Power grid is considered as a system of nodes which make together graph (network). On the simpleexample is applied Fiedler?s theory which is able to select the most important power lines of whole network. Components related to these lines are logicly ordered and considered by author´s modified analysis. This method has been improved and optimalizedfor risks related with illegal acts. Each power grid component has been connected with possible kind of attack and every of this device was gradually evaluated by five coefficients which takes values from 1 to 10. On the coefficient basis was assessed the level of risk. In the last phase the most risky power grid components have been selected. On the selected devices have been proposed security measures.
Název v anglickém jazyce
UTILIZATION OF GRAPH THEORY IN SECURITY ANALYSIS OF POWER GRID
Popis výsledku anglicky
This paper describes way how to use graph theory in security analysis. As an environment is used network of power lines and devices which are included here. Power grid is considered as a system of nodes which make together graph (network). On the simpleexample is applied Fiedler?s theory which is able to select the most important power lines of whole network. Components related to these lines are logicly ordered and considered by author´s modified analysis. This method has been improved and optimalizedfor risks related with illegal acts. Each power grid component has been connected with possible kind of attack and every of this device was gradually evaluated by five coefficients which takes values from 1 to 10. On the coefficient basis was assessed the level of risk. In the last phase the most risky power grid components have been selected. On the selected devices have been proposed security measures.
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
AP - Městské, oblastní a dopravní plánování
OECD FORD obor
—
Návaznosti výsledku
Projekt
<a href="/cs/project/VG20102015059" target="_blank" >VG20102015059: Vliv teroristického útoku na vybrané průmyslové technologie s nebezpečím výbuchu prachu</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2014
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
Securitology
ISSN
1898-4509
e-ISSN
—
Svazek periodika
2014/20
Číslo periodika v rámci svazku
2
Stát vydavatele periodika
PL - Polská republika
Počet stran výsledku
14
Strana od-do
87-99
Kód UT WoS článku
—
EID výsledku v databázi Scopus
—