581 research outputs found

    Risk based multi-objective security control and congestion management

    Get PDF
    Deterministic security criterion has served power system operation, congestion management quite well in last decades. It is simple to be implemented in a security control model, for example, security constrained optimal power flow (SCOPF). However, since event likelihood and violation information are not addressed, it does not provide quantitative security understanding, and so results in system inadequate awareness. Therefore, even if computation capability and information techniques have been greatly improved and widely applied in the operation support tool, operators are still not able to get rid of the security threat, especially in the market competitive environment.;Probability approach has shown its strong ability for planning purpose, and recently gets attention in operation area. Since power system security assessment needs to analyze consequence of all credible events, risk defined as multiplication of event probability and severity is well suited to give an indication to quantify the system security level, and congestion level as well. Since risk addresses extra information, its application for making BETTER online operation decision becomes an attractive research topic.;This dissertation focus on system online risk calculation, risk based multi-objective optimization model development, risk based security control design, and risk based congestion management. A regression model is proposed to predict contingency probability using weather and geography information for online risk calculation. Risk based multi-objective optimization (RBMO) model is presented, considering conflict objectives: risks and cost. Two types of method, classical methods and evolutionary algorithms, are implemented to solve RBMO problem, respectively. A risk based decision making architecture for security control is designed based on the Pareto-optimal solution understanding, visualization tool and high level information analysis. Risk based congestion management provides a market lever to uniformly expand a security VOLUME , where greater volume means more risk. Meanwhile, risk based LMP signal contracts ALL dimensions of this VOLUME in proper weights (state probabilities) at a time.;Two test systems, 6-bus and IEEE RTS 96, are used to test developed algorithms. The simulation results show that incorporating risk into security control and congestion management will evolve our understanding of security level, improve control and market efficiency, and support operator to maneuver system in an effective fashion

    Scaling Multi-Objective Security Games Provably via Space Discretization Based Evolutionary Search

    Full text link
    In the field of security, multi-objective security games (MOSGs) allow defenders to simultaneously protect targets from multiple heterogeneous attackers. MOSGs aim to simultaneously maximize all the heterogeneous payoffs, e.g., life, money, and crime rate, without merging heterogeneous attackers. In real-world scenarios, the number of heterogeneous attackers and targets to be protected may exceed the capability of most existing state-of-the-art methods, i.e., MOSGs are limited by the issue of scalability. To this end, this paper proposes a general framework called SDES based on many-objective evolutionary search to scale up MOSGs to large-scale targets and heterogeneous attackers. SDES consists of four consecutive key components, i.e., discretization, optimization, restoration and evaluation, and refinement. Specifically, SDES first discretizes the originally high-dimensional continuous solution space to the low-dimensional discrete one by the maximal indifference property in game theory. This property helps evolutionary algorithms (EAs) bypass the high-dimensional step function and ensure a well-convergent Pareto front. Then, a many-objective EA is used for optimization in the low-dimensional discrete solution space to obtain a well-spaced Pareto front. To evaluate solutions, SDES restores solutions back to the original space via bit-wisely optimizing a novel solution divergence. Finally, the refinement in SDES boosts the optimization performance with acceptable cost. Theoretically, we prove the optimization consistency and convergence of SDES. Experiment results show that SDES is the first linear-time MOSG algorithm for both large-scale attackers and targets. SDES is able to solve up to 20 attackers and 100 targets MOSG problems, while the state-of-the-art methods can only solve up to 8 attackers and 25 targets ones. Ablation study verifies the necessity of all components in SDES

    Security Issues in Mobile Payment from the Customer Viewpoint

    Get PDF
    The perception of mobile payment procedures’ security by the customer is one major factor for the market breakthrough of the according systems. In this paper we examine security issues in mobile payment from the viewpoint of customers. Based on theoretical research we analyze empirical data from the MP2 mobile payment study with 8295 respondents in order to develop a set of dimensions, categories and aspects. The results do have a scientific as well as a practical impact: They provide a basis for the selection of appropriate indicators for further empirical studies. Furthermore they can serve as a guideline for mobile payment service providers in order to prevent security concerns through appropriate design and communication of payment procedures and to convince customers of the security of their mobile procedures by meeting concerns in informative advertising.

    Toward optimal multi-objective models of network security: Survey

    Get PDF
    Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers

    Towards optimal multi-objective models of network security: survey

    Get PDF
    Information security is an important aspect of a successful business today. However, financial difficulties and budget cuts create a problem of selecting appropriate security measures and keeping networked systems up and running. Economic models proposed in the literature do not address the challenging problem of security countermeasure selection. We have made a classification of security models, which can be used to harden a system in a cost effective manner based on the methodologies used. In addition, we have specified the challenges of the simplified risk assessment approaches used in the economic models and have made recommendations how the challenges can be addressed in order to support decision makers

    Optimum Use of Handheld Device Using Monolithic Kernel Architecture for Security Purpose

    Get PDF
    Recompile the kernel to customize as per user need so that unnecessary running application will not be available. This will secure the machine for specific purpose only since we optimize the system and make it reliable. We made camera application and specific module only sustainable in order to achieve our objective security by optimizing the system. Trusted computing based work has been proposed for the system which is necessity of modular monolithic kernel architecture

    The environmental security debate and its significance for climate change

    Get PDF
    Policymakers, military strategists and academics all increasingly hail climate change as a security issue. This article revisits the (comparatively) long-standing “environmental security debate” and asks what lessons that earlier debate holds for the push towards making climate change a security issue. Two important claims are made. First, the emerging climate security debate is in many ways a re-run of the earlier dispute. It features many of the same proponents and many of the same disagreements. These disagreements concern, amongst other things, the nature of the threat, the referent object of security and the appropriate policy responses. Second, given its many different interpretations, from an environmentalist perspective, securitisation of the climate is not necessarily a positive development

    An Introduction to Trade and National Security: New Concepts of National Security in a Time of Economic uncertainty

    Get PDF
    Within the context of enhanced rhetoric about the need for national security measures to protect domestic economic interests, the Duke Journal of Comparative & International Law hosted a Symposium on National Security and Trade Law in which speakers raised questions as to not only what is meant by national security today, but also the significance of invoking national security exceptions in trade. This Introduction provides an overview of issues discussed as well as some reflections on the use of the national security exception in trade during a time when nations are moving away from international cooperation towards unilateralism and facing global crises such as the COVID-19 pandemic. With the World Trade Organization’s recent panel decision, Russia—Measures Concerning Traffic in Transit , the international community received some guidance as to the limited use of this exception under GATT Article XXI and the need for good faith by nations invoking it, but larger questions remained as to its applicability in the context of economic insecurity and in the context of broader global challenges such as cybersecurity and climate change. Furthermore, with the current dysfunction of the Appellate Body of the WTO, there is no central adjudicatory body to address these issues in a systematic fashion, leaving it up to the nations or ad hoc adjudicatory processes to decide, rendering the multilateral trade framework an even more fragmented system. New ways of imagining the role of trade in the context of global and economic crises are needed, as well as more resilient institutional frameworks that can adapt to future forms of insecurity and allow for varied, constructive forms of dialogue among nations

    Impact of the Credit Rating Agencies on the Financial Crisis 2007–2009

    Get PDF
    The paper presents some ethical aspects of the credit rating agencies (CRAs) market in the light of the latest economic crisis of 2008. A historical background is also shown and how the CRA market emerged. It is emphasised how the functioning of CRAs contributed to the outbreak of the crisis and what were the consequences of over- or underestimated rating grades. The downgrading of a country has a significant influence on the deterioration of the economic condition. Simultaneously, it afflicts the citizens, who have to pay for it e.g. with higher tax rates. It is believed that overestimated ratings lead to a speculative bubble, which ends up with the crisis. The paper indicates the problems connected with the way that CRAs operate and how they relate to business ethics. The fact that those institutions are profitprofile entities, which earn their income from clients, whose financial instruments are assessed, may bring about a conflict of interests. Moreover, it is outlined how the governmental policies of countries left CRAs without any particular control, which in the end was a significant factor, too. Finally, some potential solutions are discussed, and how the approach of CRA managers should change in order to prevent the market from similar situations in the future
    • 

    corecore