Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 1 of 1 matches in All Departments
The goal of this research is to show in a simulated environment that security of the network can be strengthen by first fielding the trust system and second, by dividing a network into smaller clusters, called "domains," in order to isolate anomalies or intrusions detected. In order to show this, a mathematical model of the problem will be built and translated into a software tool that at the end will receive real-life-network data as input. This program uses real world power grid representative data, outputs a network configuration that has used the concepts described above of network compartmentalization and strategic placing of trust nodes. As a result, this new network configuration ensures safe day-to-day operations by minimizing the effects in case of an attack or equipment malfunction of the system by subdividing the network into domains. Each domain protected by a trust node(s) without violating timing constraints.
|
You may like...
|