Security Assessment Research Papers - Academia.edu (original) (raw)
Geological carbon dioxide storage (CCS) has the potential to make a significant contribution to the decarbonisation of the UK. Amid concerns over maintaining security, and hence diversity, of supply, CCS could allow the continued use of... more
Geological carbon dioxide storage (CCS) has the potential to make a significant contribution to the decarbonisation of the UK. Amid concerns over maintaining security, and hence diversity, of supply, CCS could allow the continued use of coal, oil and gas whilst avoiding the CO 2 emissions currently associated with fossil fuel use. This project has explored some of the geological, environmental, technical, economic and social implications of this technology. The UK is well placed to exploit CCS with a large offshore storage capacity, both in disused oil and gas fields and saline aquifers. This capacity should be sufficient to store CO 2 from the power sector (at current levels) for a least one century, using well understood and therefore likely to be lower-risk, depleted hydrocarbon fields and contained parts of aquifers. It is very difficult to produce reliable estimates of the (potentially much larger) storage capacity of the less well understood geological reservoirs such as non-confined parts of aquifers. With the majority of its large coal fired power stations due to be retired during the next 15 to 20 years, the UK is at a natural decision point with respect to the future of power generation from coal; the existence of both national reserves and the infrastructure for receiving imported coal makes clean coal technology a realistic option. The notion of CCS as a 'bridging' or 'stop-gap' technology (i.e. whilst we develop 'genuinely' sustainable renewable energy technologies) needs to be examined somewhat critically, especially given the scale of global coal reserves. If CCS plant is built, then it is likely that technological innovation will bring down the costs of CO 2 capture, such that it could become increasingly attractive. As with any capitalintensive option, there is a danger of becoming 'locked-in' to a CCS system. The costs of CCS in our model for UK power stations in the East Midlands and Yorkshire to reservoirs in the North Sea are between £25 and £60 per tonne of CO 2 captured, transported and stored. This is between about 2 and 4 times the current traded price of a tonne of CO 2 in the EU Emissions Trading Scheme. In addition to the technical and economic requirements of the CCS technology, it should also be socially and environmentally acceptable. Our research has shown that, given an acceptance of the severity and urgency of addressing climate change, CCS is viewed favourably by members of the public, provided it is adopted within a portfolio of other measures. The most commonly voiced concern from the public is that of leakage and this remains perhaps the greatest uncertainty with CCS. It is not possible to make general statements concerning storage security; assessments must be site specific. The impacts of any potential leakage are also somewhat uncertain but should be balanced against the deleterious effects of increased acidification in the oceans due to uptake of elevated atmospheric CO 2 that have already been observed. Provided adequate long term monitoring can be ensured, any leakage of CO 2 from a storage site is likely to have minimal localised impacts as long as leaks are rapidly repaired. A regulatory framework for CCS will need to include risk assessment of potential environmental and health and safety impacts, accounting and 1 monitoring and liability for the long term. In summary, although there remain uncertainties to be resolved through research and demonstration projects, our assessment demonstrates that CCS holds great potential for significant cuts in CO 2 emissions as we develop long term alternatives to fossil fuel use. CCS can contribute to reducing emissions of CO 2 into the atmosphere in the near term (i.e. peak-shaving the future atmospheric concentration of CO 2 ), with the potential to continue to deliver significant CO 2 reductions over the long term.
Power grid's traditional security assessment approach -based on SCADA data and off-line studies conducted long in advance of real time operationsare becoming increasingly problematic for real time operations because they cannot fully... more
Power grid's traditional security assessment approach -based on SCADA data and off-line studies conducted long in advance of real time operationsare becoming increasingly problematic for real time operations because they cannot fully anticipate all the conditions faced by operators. New technologies that rely on accurate, high-resolution, real-time monitoring of actual (not hypothesized) system conditions using synchronized measurement technologies are needed to support the real-time operations. The purpose of these tools and systems is to monitor, assess, enable, and ultimately, automatically take the necessary control action to prevent or mitigate problems in real time.
In this paper, an advanced control system for the optimal operation and management of isolated power systems with increased renewable power integration is presented. The control system minimises the production costs through on-line... more
In this paper, an advanced control system for the optimal operation and management of isolated power systems with increased renewable power integration is presented. The control system minimises the production costs through on-line optimal scheduling of the power units, taking into account short-term forecasts of the load and the renewable resources. The power system security is supervised via on-line security assessment modules, which emulate the power system frequency changes caused by pre-selected disturbances. For each of the above functions, a number of techniques have been applied, both conventional and AI based. The system has been installed in the dispatch center of Crete since June 1999, and is under evaluation
The paper critically analyzes the state of the art of the procedures to ensure the security of power system operation with respect to the introduction of Interruptible Loads. A short overview of the existing international approaches is... more
The paper critically analyzes the state of the art of the procedures to ensure the security of power system operation with respect to the introduction of Interruptible Loads. A short overview of the existing international approaches is presented. The potentiality of load curtailment as an ancillary service is underlined. The benefits for the power system in terms of increased exploitation of the network capability -with particular attention to the increase of Total Transfer Capacity (TTC) across network sectionsare emphasized. A new definition of security is discussed as a consequence of the use of Interruptible Loads not only into emergency conditions but also during normal and alert operation, in order to guarantee the N-1 criterion satisfaction. The consequences of the introduction of Interruptible Loads are detailed and some preliminary hints for the specific situations of the Italian Power System are presented. The results of a research activity on the possibility to use the load curtailment approach to increase the TTC in the Italy-Europe section are reported.
Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many... more
Security of wireless sensor network (WSN) remained an open research area throughout the current decade. New research and developments seems protecting sensor networks from various security threats but at the same time raise many questions, confusions and conflicts regarding their own viability. Such viability issues become major hindrances in security assessment of WSNs against posed security threats. This results in less reliable sensor networks and applications. In our strong opinion, there are two root-causes of this problem; 1) a comprehensive list of security threats is overlooked as researchers' work appear limited in classification of security threats and, 2) security threats are not associated with security frameworks. In this paper, we perform classification of security threats comprehensively whereas, associating these threats to a security framework; we lead in this direction. We find that specifically to assess the impact of these threats.
The rapid development phases and extremely short turnaround time of Web applications make it difficult to eliminate their vulnerabilities. Here we study how software testing techniques such as fault injection and runtime monitoring can be... more
The rapid development phases and extremely short turnaround time of Web applications make it difficult to eliminate their vulnerabilities. Here we study how software testing techniques such as fault injection and runtime monitoring can be applied to Web applications. We implemented our proposed mechanisms in the Web Application Vulnerability and Error Scanner (WAVES)-a black-box testing framework for automated Web application security assessment. Real-world situations are used to test WAVES and to compare it with other tools. Our results show that WAVES is a feasible platform for assessing Web application security.
King Abdullah Medical Complex in Jeddah (KAMCJ) is a 500-bed hospital with highly qualified staff, advanced equipment’s and technologies. The hospital provides a wide range of medical services round the clock. Equipped with the latest... more
King Abdullah Medical Complex in Jeddah (KAMCJ) is a 500-bed hospital with highly qualified
staff, advanced equipment’s and technologies. The hospital provides a wide range of medical services round
the clock. Equipped with the latest technologies and state of the art information and communication systems,
the hospital has the ability and the resilience to operate at full capacity and withstand the different
operational conditions. At the heart of its technological infrastructure comes the computer network, which is
one of the biggest networks in Jeddah. The hospital’s Information and Communication Technology (ICT)
runs different services and systems that automate most of the operations in all divisions. However, making
the operations fully automated comes with a major security challenge. That is, in a fully integrated systems,
compromising one component could cause the failure of the system partially or entirely not to mention the
reputation damage that security breaches could inflict if sensitive patients’ information were compromised.
As such, it is imperative to implement rigorous security measures to safeguard the hospital’s digital assets
against the cyber-attacks. It is also crucial to revise the security policies regularly to make sure that these
measures are always relevant. To this end, this study is devoted to assessing the security measures currently
applied in the hospital’s network and give recommendations on how to consolidate the security of the
hospital’s data and the underlying digital infrastructure. The study starts by conducting a series of semistructured
interviews involving group of end users in addition to IT staff and information security personnel.
Based on the data collected from the interviews, network architecture discovery was carried out in order to
understand the structure and identify the critical components in hospital’s network. By utilizing the data
acquired during the discovery process, the existing security controls are identified, and the adequacy of these
controls are evaluated. In light of these controls, the vulnerabilities of each of these components are
determined. Based on the identified vulnerabilities, the prepositions and recommendations to improve
security controls as well as the plan on how to deploy these recommendations in the hospital’s network are
proposed. By incorporating the proposed recommendations into the hospital’s IT services and infrastructure,
the security of digital assets will be improved and the risk of losing data or disrupting business operations will
be significantly decreased.
- by IJCSMC Journal and +2
- •
- Mathematics, Computer Science, Algorithms, Information Technology
This study determines various threat vectors of cyber-attacks on smart grid of the United States. The smart grid relatively a new initiative by the Department of Energy. It started in 2007 (DOE 2007). In December 2007, Congress passed,... more
This study determines various threat vectors of cyber-attacks on smart grid of the United States. The smart grid relatively a new initiative by the Department of Energy. It started in 2007 (DOE 2007). In December 2007, Congress passed, and the President approved, Title XIII of the Energy Independence and Security Act of 2007 (EISA, Congress, 2007). This initiative received full support from almost all agencies across the United States. Most recent examples of attacks on smart grid are Ukraine and Iran's power plants that are connected to the internet. They were attacked using basic viruses that were delivered via employees. As the security becomes tighter, the attackers also become more aggressive, and therefore it requires an analysis of threat vectors. A smart grid includes any power plant or power generating facility. The smart grid is an electricity supply network that uses digital communications technology to detect and react to local changes in usage. An electricity supply network that uses digital communications technology to identify and respond to local changes in usage (DOE, 2007). The electric grid is more than just generation and transmission infrastructure. The smart grid is an ecosystem of asset owners, manufacturers, service providers, and government officials at Federal, state, and local levels, all working together to run one of the most reliable electrical grids in the world. The study will be focused on various scenarios similar to those used previously and those that an attacker can use.
Security Assessment Pada Jaringan Private Wireless LAN
Power grid's traditional security assessment approach -based on SCADA data and off-line studies conducted long in advance of real time operationsare becoming increasingly problematic for real time operations because they cannot fully... more
Power grid's traditional security assessment approach -based on SCADA data and off-line studies conducted long in advance of real time operationsare becoming increasingly problematic for real time operations because they cannot fully anticipate all the conditions faced by operators. New technologies that rely on accurate, high-resolution, real-time monitoring of actual (not hypothesized) system conditions using synchronized measurement technologies are needed to support the real-time operations. The purpose of these tools and systems is to monitor, assess, enable, and ultimately, automatically take the necessary control action to prevent or mitigate problems in real time.
ystem stability analysis results have been part of electric utilities' operating guidelines for more than a decade. Today, these guidelines are compiled from offline stability studies conducted jointly with other utilities and... more
ystem stability analysis results have been part of electric utilities' operating guidelines for more than a decade. Today, these guidelines are compiled from offline stability studies conducted jointly with other utilities and independently by each utility. The offline study results are adjusted for actual generation patterns derived from the offline studies also require extensive engineering analysis trying t o anticipate conditions which may never occur.
The paper presents the actual situation and the ongoing development concerning load participation to power system security in Italy. It is intended as a contribution to a panel session organized by the Fast-Acting Load Control for System... more
The paper presents the actual situation and the ongoing development concerning load participation to power system security in Italy. It is intended as a contribution to a panel session organized by the Fast-Acting Load Control for System and Price Stability Task Force of the IEEE Power System Dynamic Performance Committee.
Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from... more
Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls.
Objective: Caring for a spouse with cancer can be challenging on many levels. How caregivers adjust to this challenge may be influenced both by their personal orientation to the relationship and by their motives for providing care. In... more
Objective: Caring for a spouse with cancer can be challenging on many levels. How caregivers adjust to this challenge may be influenced both by their personal orientation to the relationship and by their motives for providing care. In this study we examined the prediction of caregiver well-being from the relationship qualities specified by attachment theory and from motives specified by self-determination theory. Design: Cross-sectional data reported here are from the American Cancer Society's Quality of Life Survey for Caregivers. Main Outcome Measures: Three measures were included as indicators of the caregiver's psychological adjustment: benefit finding in cancer caregiving experience, life satisfaction, and depressive symptoms. Results: In structural equation models, among both husband (n ϭ 154) and wife (n ϭ 160) caregivers, attachment security (assessed with respect to the spouse) related positively to autonomous motives for and finding benefit in caregiving; attachment anxiety related to introjected motives for caregiving and more depression. Among husbands (but not wives), autonomous motives also related to less depression, and introjected motives related to less life satisfaction and more depression. Among wives (but not husbands), autonomous motives related to greater benefit finding. Conclusion: Variations in attachment orientations and in reasons for providing care are important elements in understanding the psychological well-being of cancer caregivers.
This article reports on the data collected on one of the most ambitious government-sponsored environmental data acquisition projects of all time, the Risk Management Plan (RMP) data collected under section 112(r) of the Clean Air Act... more
This article reports on the data collected on one of the most ambitious government-sponsored environmental data acquisition projects of all time, the Risk Management Plan (RMP) data collected under section 112(r) of the Clean Air Act Amendments of 1990. This RMP Rule 112(r) was triggered by the Bhopal accident in 1984 and led to the requirement that each qualifying facility develop and file with the U.S. Environmental Protection Agency a Risk Management Plan (RMP) as well as accident history data for the five-year period preceding the filing of the RMP. These data were collected in 1999-2001 on more than 15,000 facilities in the United States that store or use listed toxic or flammable chemicals believed to be a hazard to the environment or to human health of facility employees or off-site residents of host communities. The resulting database, RMP*Info, has become a key resource for regulators and researchers concerned with the frequency and severity of accidents, and the underlying facility-specific factors that are statistically associated with accident and injury rates. This article analyzes which facilities actually filed under the Rule and presents results on accident frequencies and severities available from the RMP*Info database. This article also presents summaries of related results from RMP*Info on Offsite Consequence Analysis (OCA), an analytical estimate of the potential consequences of hypothetical worst-case and alternative accidental releases on the public and environment around the facility. The OCA data have become a key input in the evaluation of site security assessment and mitigation policies for both government planners as well as facility managers and their insurers. Following the survey of the RMP*Info data, we discuss the rich set of policy decisions that may be informed by research based on these data.
Component-based software engineering (CBSE) endeavors to enable software developers to develop quality software systems with less time and resources than traditional development approaches. Software components must be identified and... more
Component-based software engineering (CBSE) endeavors to enable software developers to develop quality software systems with less time and resources than traditional development approaches. Software components must be identified and evaluated in order to determine if they provide required functionality for systems being developed. Consideration of security requirements for component selection is of interest. This research considers how the Common Criteria
précarité à la mobilité, vers une sécurité sociale professionnelle, La Documentation française, Paris. CErC (2005), La sécurité de l'emploi face aux défis des transformations économiques, rapport n° 5, la Documentation française, Paris.... more
précarité à la mobilité, vers une sécurité sociale professionnelle, La Documentation française, Paris. CErC (2005), La sécurité de l'emploi face aux défis des transformations économiques, rapport n° 5, la Documentation française, Paris. CNiS (2008), Emploi, chômage, précarité. Mieux mesurer pour mieux débattre et mieux agir, rapport sous la présidence de J. B. de Foucauld. Conseil de l'Union européenne (2007), Vers des principes communs de flexicurité : des emplois plus nombreux et de meilleure qualité en combinant flexibilité et sécurité, Bruxelles, 4 juillet. Delarre S. et Duhautois r. (2003), « La mobilité intra-groupe des salariés : le poids de la proximité géographique et structurale », Économie et Statistique, n° 369-370, pp. 173-190.
In recent years, voltage instability has become a major threat for the operation of many power systems. This paper presents an artificial neural network (ANN)-based approach for on-line voltage security assessment. The proposed approach... more
In recent years, voltage instability has become a major threat for the operation of many power systems. This paper presents an artificial neural network (ANN)-based approach for on-line voltage security assessment. The proposed approach uses radial basis function (RBF) networks to estimate the voltage stability level of the system under contingency state. Maximum L-index of the load buses in the system is taken as the indicator of voltage stability. Pre-contingency state power flows are taken as the input to the neural network. The key feature of the proposed method is the use of dimensionality reduction techniques to improve the performance of the developed network. Mutual information based technique for feature selection is proposed to enhance overall design of neural network. The effectiveness of the proposed approach is demonstrated through voltage security assessment in IEEE 30-bus system and Indian practical 76 bus system under various operating conditions considering single and double line contingencies and is found to predict voltage stability index more accurate than feedforward neural networks trained by back propagation algorithm and AC load flow. Experimental results show that the proposed method reduces the training time and improves the generalization capability of the network than the multilayer perceptron networks.
The paper proposes a method based on different security-related factors to dynamically calculate the validity period of digital certificates. Currently validity periods are most often defined statically without scientific justification.... more
The paper proposes a method based on different security-related factors to dynamically calculate the
validity period of digital certificates. Currently validity periods are most often defined statically without
scientific justification. This approach is not sufficient to objectively consider the actual need for security.
Therefore the approach proposed in this paper considers relevant security criteria in order to calculate a
meaningful validity period for digital certificates. This kind of security assessment can be executed
periodically in order to dynamically respond to changing conditions. Especially in the context of complex
systems and infrastructures that have an increased need for security, privacy and availability this issue is
highly relevant
- by Uri Kanonov and +1
- •
- Risk Analysis, Mobile Device, Mobile Devices, Security Assessment
Two techniques based respectively on the transient energy injected by the disturbance into the grid and the tracking damping level of the resulting oscillatory responses are investigated for quickly assessing the post-event vulnerability... more
Two techniques based respectively on the transient energy injected by the disturbance into the grid and the tracking damping level of the resulting oscillatory responses are investigated for quickly assessing the post-event vulnerability status of a multi-area power system from a Wide-area measurement systems (WAMS) record. The "Transient Energy" approach using the so-called Wide Area Severity Index (WASI) was originally developed to suit a highly reliable Dynamic Security Assessment (DSA) system which is currently being tested in actual operations. The WASI concept is extended here to provide the necessary attributes for ranking the dynamic strength of the grid after an arbitrary contingency, giving the full 10 to 60-s record from an ensemble of strategically located PMUs. It is shown that Wide Area Severity Indices over short and long windows timeframe allow for a very effective clustering of dynamic events into various categories of phenomena with embedded type and level of grid vulnerabilities. For comprehensiveness, a tracking modal analysis using the ERA method is also implemented to provide additional insight into the grid signal responses, in terms of the evolving damping level throughout the observation window. The proposed approaches are illustrated on detailed simulations of the Hydro-Quebec grid and confirmed on actual measurements recorded with the existing WAMS.
The rise of the private military industry has become an important and controversial issue in international politics. This article reviews the contributions of four books that analyse the rise and consequences of the privatization of... more
The rise of the private military industry has become an important and controversial issue in international politics. This article reviews the contributions of four books that analyse the rise and consequences of the privatization of force. Placing military privatization in a broader political context shows how a fuller understanding of these developments requires a global focus and an emphasis on their relationship both to global capital and to shifting state forms where the public and the private, the domestic and the international, are being rearticulated.
- by Clair Gough and +1
- •
- Climate Change, Renewable Energy, Carbon Dioxide, Integrated assessment
Google's Android is a comprehensive software framework for mobile communication devices (i.e., smartphones, PDAs). The Android framework includes an operating system, middleware and a set of key applications. The incorporation of... more
Google's Android is a comprehensive software framework for mobile communication devices (i.e., smartphones, PDAs). The Android framework includes an operating system, middleware and a set of key applications. The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various types of malware. This paper provides a comprehensive security assessment of the Android framework and the security mechanisms incorporated into it. A methodological qualitative risk analysis that we conducted identifies the high-risk threats to the framework and any potential danger to information or to the system resulting from vulnerabilities that have been uncovered and exploited. Our review of current academic and commercial solutions in the area of smartphone security yields a list of applied and recommended defense mechanisms for hardening mobile devices in general and the Android in particular. Lastly, we present five major (high-risk) threats to the Android framework and propose security solutions to mitigate them. We conclude by proposing a set of security mechanisms that should be explored and introduced into Android-powered devices.
This paper presents a particle swarm optimization (PSO) for reactive power and voltage control (Volt/Var Control: VVC) considering voltage security assessment (VSA). VVC can be formulated as a mixed-integer nonlinear optimization problem... more
This paper presents a particle swarm optimization (PSO) for reactive power and voltage control (Volt/Var Control: VVC) considering voltage security assessment (VSA). VVC can be formulated as a mixed-integer nonlinear optimization problem (MINLP). The proposed method expands the original PSO to handle a MINLP and determines an on-line VVC strategy with continuous and discrete control variables such as automatic voltage regulator (AVR) operating values of generators, tap positions of on-load tap changer (OLTC) of transformers, and the number of reactive power compensation equipment. The method considers voltage security using a continuation power flow and a contingency analysis technique. The feasibility of the proposed method is demonstrated and compared with reactive tabu search (RTS) and the enumeration method on practical power system models with promising results.
Innocent Kamwa (S'83-M'88-SM'98) has been with the Hydro-Québec research institute, IREQ, since 1988. He is an associate professor of electrical engineering at Laval University in Québec, Canada. Kamwa received the B.Eng. and Ph.D.... more
Innocent Kamwa (S'83-M'88-SM'98) has been with the Hydro-Québec research institute, IREQ, since 1988. He is an associate professor of electrical engineering at Laval University in Québec, Canada. Kamwa received the B.Eng. and Ph.D. degrees in electrical engineering from Laval University in 1984 and 1988, respectively. A member of the IEEE Power Engineering and Control System societies, Kamwa is a registered professional engineer. Robert Grondin (S'77-M'80-SM'99) received the B.A.Sc. degree (electrical engineering, University of Sherbrooke, Québec) in 1976 and the M.Sc. degree (INRS Energie, Varennes, Québec) in 1979. He then joined the Hydro-Québec research institute, IREQ, where he is involved in power system monitoring, modeling and identification and in the development of real-time computer-based systems applied to power system control and protection. Member of the IEEE Power Engineering and Signal Processing societies and of CIGRÉ, he is also a registered professional engineer in the province of Québec. Lester Loud (M'97) received, in electrical engineering, the B.Eng. and M.Eng. degrees from Concordia University in 1985 and 1988, respectively, and the Ph.D. degree from McGill University in 1996. He has been with Hydro-Québec research institute, IREQ, since 1994.
Over the last few years, there has been a growing international recognition that the security performance of the maritime industry needs to be reviewed on an urgent basis. A large number of optional maritime security control measures have... more
Over the last few years, there has been a growing international recognition that the security performance of the maritime industry needs to be reviewed on an urgent basis. A large number of optional maritime security control measures have been proposed through various regulations and publications in the post-9/11 era. There is a strong need for a sound and generic methodology, which is capable of taking into account multiple selection criteria such as the cost effectiveness of the measures based on reasonable security assessment. The use of traditional risk assessment and decision-making approaches to deal with potential terrorism threats in a maritime security area reveals two major challenges. They are lack of capability of analyzing security in situations of high-level uncertainty and lack of capability of processing diverse data in a utility form suitable as input to a risk inference mechanism. To deal with such difficulties, this article proposes a subjective security-based assessment and management framework using fuzzy evidential reasoning (ER) approaches. Consequently, the framework can be used to assemble and process subjective risk assessment information on different aspects of a maritime transport system from multiple experts in a systematic way. Outputs of this model can also provide decisionmakers with a transparent tool to evaluate maritime security policy options for a specific scenario in a cost-effective manner.
The increasing integration of embedded systems for monitoring and control of critical infrastructures into enterprise networks has increased system manufacturers' efforts to cover security aspects at the device level for a better "defense... more
The increasing integration of embedded systems for monitoring and control of critical infrastructures into enterprise networks has increased system manufacturers' efforts to cover security aspects at the device level for a better "defense in depth". This paper describes a security assessment method which has been developed in a joint research project with a large system manufacturer. A system's assets and their security objectives as well as the security measures in place are documented. Collaborative reasoning of system and security experts about the rationales and assumptions behind current or planned implementations of a security architecture help to uncover weaknesses and vulnerabilities and to find mitigations.
The authors studied receptive cooperation-a willing, eager stance toward parents-in 15-month-old children (N ϭ 101) in broadly ranging contexts. Children's anger proneness and parents' responsiveness (both observed at 7 months) and... more
The authors studied receptive cooperation-a willing, eager stance toward parents-in 15-month-old children (N ϭ 101) in broadly ranging contexts. Children's anger proneness and parents' responsiveness (both observed at 7 months) and children's attachment security (assessed in Strange Situation at 15 months) were examined as predictors of children's receptive cooperation at 15 months. In mother-child dyads, secure attachment was strongly associated with children's higher receptive cooperation. Maternal responsiveness in infancy also promoted children's future receptive cooperation, but its impact was moderated by child anger: Responsiveness had a positive effect for children who as infants were highly anger prone. In father-child dyads, the negative effect of anger proneness on receptive cooperation with father was significantly amplified for insecure children. Mother's responsiveness and child's secure attachment to the mother promoted child receptive cooperation with the father, but there were no similar effects for fathers.
The free distribution of seeds and tools is the standard approach to agricultural recovery. The predominance of this approach is partly attributable to the: (1) perception that farmer seed quality is poor, (2) insistence on seed... more
The free distribution of seeds and tools is the standard approach to agricultural recovery. The predominance of this approach is partly attributable to the: (1) perception that farmer seed quality is poor, (2) insistence on seed certification, (3) promotion of researcher varieties, (4) misdiagnosis of unavailability, (5) difficulty accessing farmer seed, and (6) support for the commercial seed sector. This paper presents a Seed Security Assessment Framework to distinguish among the causes of seed insecurity and focuses on three principal concepts: seed availability; access to seed; and factors associated with seed utilisation. Using this diagnostic framework, Catholic Relief Services (CRS) has developed a better approach to promoting seed system-based agricultural recovery. It involves a combination of seed voucher distribution and the organisation of seed fairs, which bring together a range of sellers from whom the holders of vouchers may purchase seed. This approach is advantageous because it: strengthens farmer seed procurement systems; is cost efficient; in economic terms, has a multiplier effect in the community; is straightforward to plan and implement; allows commercial sector participation; provides an opportunity to promote improved varieties for farmer evaluation; brings together different communities.
Security matters have become a vital part of daily life to people and organizations, such as hospitals, needs to ensure that the information is adequately secured. While in Portugal legislature's remains hanging around to corporate and... more
Security matters have become a vital part of daily life to people and organizations, such as hospitals, needs to ensure that the information is adequately secured. While in Portugal legislature's remains hanging around to corporate and governance laws, more and more businesses are seeking assurance that their hospital providers and partners are properly protecting information assets from security risk. Is imperative to take necessary measures to ensure business continuity. Security management certification provides just such a guarantee, thereby increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (listed by the 11 security domains of ISO/IEC 17799), and describes the security assessment for implementing such controls while the health sector industry is expecting ISO 27799 recently reached has draft stage in development cycle by Technical Committee ISO/TC 215. It's publication is therefore well on track, with a proposed title of 'Health Informatics -Security management in health using ISO/IEC 17799'.
Transient Stability Assessment, preventive control measures and dynamic A X calculations are addressed for the new deregulated EMS system. The combination of time domain analysis, SIME and Optimal Power Flow provide a reliable solution... more
Transient Stability Assessment, preventive control measures and dynamic A X calculations are addressed for the new deregulated EMS system. The combination of time domain analysis, SIME and Optimal Power Flow provide a reliable solution for future transaction requirements and the current operating point.
... Models that predict directly wind power are based on SCADA data and time-series ... Commitment is performed usually once a day or more, and is based solely on ... Control Advice for secure Operation of Isolated Power Systems with... more
... Models that predict directly wind power are based on SCADA data and time-series ... Commitment is performed usually once a day or more, and is based solely on ... Control Advice for secure Operation of Isolated Power Systems with Increased Renewable Energy Penetration and ...
Abstract:[en] The Hellenic Interconnected System pre-sents a structural geographical imbalance between generation sites and load centers. This imbalance leads to bulk power transfers on long electrical distances leading to voltage... more
Abstract:[en] The Hellenic Interconnected System pre-sents a structural geographical imbalance between generation sites and load centers. This imbalance leads to bulk power transfers on long electrical distances leading to voltage stability problems. In order to improve the opera-tional practices aiming at improving the voltage security, an on-line Voltage Security Assessment tool has been installed at the National Control Center of the Hellenic Transmission System Operator that operates and controls the interconnected ...
As part of the IEA Weyburn CO 2 Monitoring and Storage Project, investigations were conducted into the nature of faulting within an area up to 200 x 200 km around the Weyburn Field. This study is an essential element in assessing the... more
As part of the IEA Weyburn CO 2 Monitoring and Storage Project, investigations were conducted into the nature of faulting within an area up to 200 x 200 km around the Weyburn Field. This study is an essential element in assessing the integrity of the geosphere for CO 2 storage. A specific concern is whether faults are present that may penetrate from the Mississippian Midale Beds to shallower levels in a smaller Assessment Area focussed on 10 km beyond the limits of the CO 2 flood. These faults may represent potential conduits for migration of CO 2 in the subsurface.
The paper presents a ready-to-use security assessment framework for wireless sensor networks (WSNs). The parameters in the proposed security assessment framework perform independent security assessment of WSNs and of their applications.... more
The paper presents a ready-to-use security assessment framework for wireless sensor networks (WSNs). The parameters in the proposed security assessment framework perform independent security assessment of WSNs and of their applications. Our proposed framework uses actual responses of the entities (such as nodes, communication link and network response) to assign numerical values for security assessment of WSNs. The method for calculating the optimal values for each security parameter of the framework is also discussed. Our proposed framework is designed to avoid unwanted impacts of the complexities of security algorithms, communication protocols and strong cryptography. Usually, the complexity of algorithms disguises the actual assessment of the WSN, but the independence of the proposed framework from these security-disguising objects makes this framework better than other assessment frameworks in terms of scalability.
This research provides a security assessment of the Android framework-Google's software stack for mobile devices. The authors identify high-risk threats to the framework and suggest several security solutions for mitigating them.
Short-term load forecast is an essential part of electric power system planning and operation. Forecasted values of system load affect the decisions made for unit commitment and security assessment, which have a direct impact on... more
Short-term load forecast is an essential part of electric power system planning and operation. Forecasted values of system load affect the decisions made for unit commitment and security assessment, which have a direct impact on operational costs and system security. Conventional regression methods are used by most power companies for load forecasting. However, due to the nonlinear relationship between load and factors affecting it, conventional methods are not sufficient enough to provide accurate load forecast or to consider the seasonal variations of load. Conventional ANN-based load forecasting methods deal with 24-hour-ahead load forecasting by using forecasted temperature, which can lead to high forecasting errors in case of rapid temperature changes. This paper presents a new neural network based approach for short-term load forecasting that uses the most correlated weather data for training, validating and testing the neural network. Correlation analysis of weather data determines the input parameters of the neural networks. The suitability of the proposed approach is illustrated through an application to the actual load data of the Egyptian Unified System.
Geological carbon dioxide storage (CCS) has the potential to make a significant contribution to the decarbonisation of the UK. Amid concerns over maintaining security, and hence diversity, of supply, CCS could allow the continued use of... more
Geological carbon dioxide storage (CCS) has the potential to make a significant contribution to the decarbonisation of the UK. Amid concerns over maintaining security, and hence diversity, of supply, CCS could allow the continued use of coal, oil and gas whilst avoiding the CO 2 emissions currently associated with fossil fuel use. This project has explored some of the geological, environmental, technical, economic and social implications of this technology. The UK is well placed to exploit CCS with a large offshore storage capacity, both in disused oil and gas fields and saline aquifers. This capacity should be sufficient to store CO 2 from the power sector (at current levels) for a least one century, using well understood and therefore likely to be lower-risk, depleted hydrocarbon fields and contained parts of aquifers. It is very difficult to produce reliable estimates of the (potentially much larger) storage capacity of the less well understood geological reservoirs such as non-confined parts of aquifers. With the majority of its large coal fired power stations due to be retired during the next 15 to 20 years, the UK is at a natural decision point with respect to the future of power generation from coal; the existence of both national reserves and the infrastructure for receiving imported coal makes clean coal technology a realistic option. The notion of CCS as a 'bridging' or 'stop-gap' technology (i.e. whilst we develop 'genuinely' sustainable renewable energy technologies) needs to be examined somewhat critically, especially given the scale of global coal reserves. If CCS plant is built, then it is likely that technological innovation will bring down the costs of CO 2 capture, such that it could become increasingly attractive. As with any capitalintensive option, there is a danger of becoming 'locked-in' to a CCS system. The costs of CCS in our model for UK power stations in the East Midlands and Yorkshire to reservoirs in the North Sea are between £25 and £60 per tonne of CO 2 captured, transported and stored. This is between about 2 and 4 times the current traded price of a tonne of CO 2 in the EU Emissions Trading Scheme. In addition to the technical and economic requirements of the CCS technology, it should also be socially and environmentally acceptable. Our research has shown that, given an acceptance of the severity and urgency of addressing climate change, CCS is viewed favourably by members of the public, provided it is adopted within a portfolio of other measures. The most commonly voiced concern from the public is that of leakage and this remains perhaps the greatest uncertainty with CCS. It is not possible to make general statements concerning storage security; assessments must be site specific. The impacts of any potential leakage are also somewhat uncertain but should be balanced against the deleterious effects of increased acidification in the oceans due to uptake of elevated atmospheric CO 2 that have already been observed. Provided adequate long term monitoring can be ensured, any leakage of CO 2 from a storage site is likely to have minimal localised impacts as long as leaks are rapidly repaired. A regulatory framework for CCS will need to include risk assessment of potential environmental and health and safety impacts, accounting and 1 monitoring and liability for the long term. In summary, although there remain uncertainties to be resolved through research and demonstration projects, our assessment demonstrates that CCS holds great potential for significant cuts in CO 2 emissions as we develop long term alternatives to fossil fuel use. CCS can contribute to reducing emissions of CO 2 into the atmosphere in the near term (i.e. peak-shaving the future atmospheric concentration of CO 2 ), with the potential to continue to deliver significant CO 2 reductions over the long term.
This paper describes the current status of wind power in wind Greece focusing on the future developments and prospects. The exploitation of the verified wind potential of the country faces significant difficulties (public acceptance... more
This paper describes the current status of wind power in wind Greece focusing on the future developments and prospects. The exploitation of the verified wind potential of the country faces significant difficulties (public acceptance licensing, environmental, financing etc) resulting in considerable delays. Most of the applications for new wind farm installations refer to three specific areas of high wind potential in the Greek mainland. Due to the geographical distribution and the size of wind farms (10 to 40 MW installed capacity), wind integration in these areas will be highly concentrated and the wind farms will be connected mainly to the high voltage network. Since the areas of interest are connected to the bulk transmission system through weak transmission corridors there are specific plans for reinforcing the network in order to alleviate constraints and accommodate future wind farms. The expected impact of the large wind penetration will impact significantly on the ESI and the new challenges arise are also reported.
This paper provides results from the evaluation of the economic and security impacts of wind power production on autonomous, medium-size systems. The power system of Crete, the largest isolated system in Greece, is used as a study case.... more
This paper provides results from the evaluation of the economic and security impacts of wind power production on autonomous, medium-size systems. The power system of Crete, the largest isolated system in Greece, is used as a study case. The analysis is based on the Economic Scheduling and on- line Dynamic Security Assessment functions developed within the MORE CARE EU project and integrated in the EMS software operating in the power system of Crete. The Economic impact of Wind Power is evaluated taking into account the feed-in tariffs for wind power applied in the Greek islands. In addition, the financial benefits from the application of advanced software tools, like MORE CARE, for the operation and control of island systems with increased wind penetration are investigated.
This paper provides results from the evaluation of the economic and security impacts of wind power production on autonomous, medium-size systems. The power system of Crete, the largest isolated system in Greece, is used as a study case.... more
This paper provides results from the evaluation of the economic and security impacts of wind power production on autonomous, medium-size systems. The power system of Crete, the largest isolated system in Greece, is used as a study case. The analysis is based on the Economic Scheduling and online Dynamic Security Assessment functions developed within the MORE CARE EU project and integrated in the EMS software operating in the power system of Crete. The Economic impact of Wind Power is evaluated taking into account the feed-in tariffs for wind power applied in the Greek islands. In addition, the financial benefits from the application of advanced software tools, like MORE CARE, for the operation and control of island systems with increased wind penetration are investigated.
This paper provides a description of the development of software tools able to deal with system fast dynamic monitoring and determination of preventive control procedures, for a given set of disturbances, in networks with large... more
This paper provides a description of the development of software tools able to deal with system fast dynamic monitoring and determination of preventive control procedures, for a given set of disturbances, in networks with large integration of wind power production. Preventive control is performed through power redispatches, involving also the on/off control of the wind generators. The quality of the approach is illustrated here through its application to the system of the Madeira island.
Probabilistic risk assessment (PRA) methodologies are raising more and more interest in the context of the operation of high voltage transmission networks because they represent a new approach to the security assessment in power system... more
Probabilistic risk assessment (PRA) methodologies are raising more and more interest in the context of the operation of high voltage transmission networks because they represent a new approach to the security assessment in power system operation. The classical deterministic methods, which compare the power system performance to a predefined set of requirements (e.g. no current and voltage violations, no stability problems), do not take into account the probability of occurrence of events. The fulfillment of the security requirements also for the most critical contingencies determines large security margins, thus higher operational and planning costs. This paper presents a new PRA methodology aimed at assessing the operational risk, measured through the probability of tripping of a set of lines within a 10-15 minute time window. Some simulation results on a large realistic power system are presented and discussed.
The increasing technology trends has turned each infrastructure to its new hazards. Present information policies designed are not readily equipped with up-to-date analysis or problems suffered throughout networks. This paper addresses not... more
The increasing technology trends has turned each infrastructure to its new hazards. Present information policies designed are not readily equipped with up-to-date analysis or problems suffered throughout networks. This paper addresses not only ...
Control room operators are faced with frequent security-economy decision-making situations necessitated by stressed system operating conditions, and there is increased need for securityeconomy decision-support tools. Although... more
Control room operators are faced with frequent security-economy decision-making situations necessitated by stressed system operating conditions, and there is increased need for securityeconomy decision-support tools. Although probabilistic methods are promising in this regard, they have been mainly used in planning environments. This task force paper explores their use for operational decision-making, comparing them to the more traditional deterministic approach. Two examples are used to facilitate this comparison via overload and low voltage security assessment to identify secure regions of operation for a small 5-bus system and for the IEEE Reliability Test System. The results of this comparison show that the probabilistic approach offers several inherent advantages.