Modeling the development of energy network software, taking into account the detection and elimination of vulnerabilities

I Kotenko, K Izrailov, M Buinevich, I Saenko, R Shorey - Energies, 2023 - mdpi.com
This paper solves the problem of modeling the scheme for developing software systems,
which can be used in building solutions for secure energy networks. A development scheme …

A policy-oriented approach to energy security

J Kucharski, H Unesaki - Procedia Environmental Sciences, 2015 - Elsevier
Modern energy systems are increasingly complex and face ever-changing demands. As
energy markets become increasingly global and interdependent, the issues affecting energy …

Methodologies and applications for critical infrastructure protection: State-of-the-art

JM Yusta, GJ Correa, R Lacal-Arántegui - Energy policy, 2011 - Elsevier
This work provides an update of the state-of-the-art on energy security relating to critical
infrastructure protection. For this purpose, this survey is based upon the conceptual view of …

Formation of the System of Threats to Energy Security of the Republic of Belarus

EP Korsak - Energetika. Proceedings of CIS higher education …, 2019 - energy.bntu.by
The energy sector of the Republic of Belarus is one of the key sectors of the national
economy, the effective development of which ensures the operation of the entire real …

Factor analysis of energy security: net import dependency

SI Kolosok, YV Kovalenko - 2022 - essuir.sumdu.edu.ua
This paper analyzes various aspects of energy dependency and identifies the hidden factors
behind national energy security. Based on a review of the scientific literature, the factors that …

Methodology for management of the protection system of smart power supply networks in the context of cyberattacks

I Kotenko, I Saenko, O Lauta, M Karpov - Energies, 2021 - mdpi.com
This paper examines an approach that allows one to build an efficient system for protecting
the information resources of smart power supply networks from cyberattacks based on the …

Requirements for a taxonomy of cyber threats of critical infrastructure facilities and an analysis of existing approaches

M Komarov, A Davydiuk, A Onyskova… - Systems, Decision and …, 2021 - Springer
Nowadays, information protection and cybersecurity are one of the urgent tasks defined by
the normative documents of our country in the field of national security and defence. In a …

Analysis of electric energy supply security attached to renewable energy sources implementation

Y Veremiichuk, A Zamulko, S Zaichenko… - … and Exposition on …, 2018 - ieeexplore.ieee.org
The security of electricity supply is a basic requirement for the formation of the electricity
market. The article deals with approaches of a system formation for of electricity supply …

On the design of IoT security: Analysis of software vulnerabilities for smart grids

CM Mathas, C Vassilakis, N Kolokotronis… - Energies, 2021 - mdpi.com
The 5G communication network will underpin a vast number of new and emerging services,
paving the way for unprecedented performance and capabilities in mobile networks. In this …

Critical infrastructures vulnerability and risk analysis

E Zio - European Journal for Security Research, 2016 - Springer
Vulnerability and risk analysis are considered in relation to critical infrastructures protection.
The complexity of critical infrastructures is presented as a challenging characteristic, which …