682 research outputs found
RISK ASSESSMENT OF MALICIOUS ATTACKS AGAINST POWER SYSTEMS
The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical systems are at stake. In this framework, infrastructural systems, including power systems, represent a possible target due to the huge impact they can have on society. Malicious attacks are different in their nature from other more traditional cause of threats to power system, since they embed a strategic interaction between the attacker and the defender (characteristics that cannot be found in natural events or systemic failures). This difference has not been systematically analyzed by the existent literature. In this respect, new approaches and tools are needed. This paper presents a mixed-strategy game-theory model able to capture the strategic interactions between malicious agents that may be willing to attack power systems and the system operators, with its related bodies, that are in charge of defending them. At the game equilibrium, the different strategies of the two players, in terms of attacking/protecting the critical elements of the systems, can be obtained. The information about the attack probability to various elements can be used to assess the risk associated with each of them, and the efficiency of defense resource allocation is evidenced in terms of the corresponding risk. Reference defense plans related to the online defense action and the defense action with a time delay can be obtained according to their respective various time constraints. Moreover, risk sensitivity to the defense/attack-resource variation is also analyzed. The model is applied to a standard IEEE RTS-96 test system for illustrative purpose and, on the basis of that system, some peculiar aspects of the malicious attacks are pointed ou
A Systematic Literature Review on Task Allocation and Performance Management Techniques in Cloud Data Center
As cloud computing usage grows, cloud data centers play an increasingly
important role. To maximize resource utilization, ensure service quality, and
enhance system performance, it is crucial to allocate tasks and manage
performance effectively. The purpose of this study is to provide an extensive
analysis of task allocation and performance management techniques employed in
cloud data centers. The aim is to systematically categorize and organize
previous research by identifying the cloud computing methodologies, categories,
and gaps. A literature review was conducted, which included the analysis of 463
task allocations and 480 performance management papers. The review revealed
three task allocation research topics and seven performance management methods.
Task allocation research areas are resource allocation, load-Balancing, and
scheduling. Performance management includes monitoring and control, power and
energy management, resource utilization optimization, quality of service
management, fault management, virtual machine management, and network
management. The study proposes new techniques to enhance cloud computing work
allocation and performance management. Short-comings in each approach can guide
future research. The research's findings on cloud data center task allocation
and performance management can assist academics, practitioners, and cloud
service providers in optimizing their systems for dependability,
cost-effectiveness, and scalability. Innovative methodologies can steer future
research to fill gaps in the literature
Block Chain Technology Assisted Privacy Preserving Resource Allocation Scheme for Internet of Things Based Cloud Computing
Resource scheduling in cloud environments is a complex task, as it involves allocating suitable resources based on Quality of Service (QoS) requirements. Existing resource allocation policies face challenges due to resource dispersion, heterogeneity, and uncertainty. In this research, the authors propose a novel approach called Quasi-Oppositional Artificial Jellyfish Optimization Algorithm (QO-AJFOA) for resource scheduling in cloud computing (CC) environments. The QO-AJFOA model aims to optimize the allocation of computing power and bandwidth resources in servers, with the goal of maximizing long-term utility. The technique combines quasi-oppositional based learning (QOBL) with traditional AJFOA. Additionally, a blockchain-assisted Smart Contract protocol is used to distribute resource allocation, ensuring agreement on wireless channel utilization. Experimental validation of the QO-AJFOA technique demonstrates its promising performance compared to recent models, as tested with varying numbers of tasks and iterations. The proposed approach addresses the challenges of resource scheduling in cloud environments and contributes to the existing literature on resource allocation policies
- âŚ