Search results for "infrastructure"
showing 10 items of 326 documents
A New Coupling Solution for G3-PLC Employment in MV Smart Grids
2019
This paper proposes a new coupling solution for transmitting narrowband multicarrier power line communication (PLC) signals over medium voltage (MV) power lines. The proposed system is based on an innovative PLC coupling principle, patented by the authors, which exploits the capacitive divider embedded in voltage detecting systems (VDS) already installed inside the MV switchboard. Thus, no dedicated couplers have to be installed and no switchboard modifications or energy interruptions are needed. This allows a significant cost reduction of MV PLC implementation. A first prototype of the proposed coupling system was presented in previous papers: it had a 15 kHz bandwidth useful to couple sin…
PLC security and critical infrastructure protection
2013
Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…
Aproximación a la Geografía del despilfarro en España: balance de las últimas dos décadas
2018
Este trabajo pretende ser una primera aproximación a la dimensión del despilfarro de recursos públicos en infraestructuras en España desde 1995 hasta la actualidad en los distintos niveles de gobierno. A partir de algunas precisiones sobre los conceptos de despilfarro y corrupción, se analiza, de una parte, la inversión y los sobrecostes en infraestructuras innecesarias impulsadas y ejecutadas por la Administración General del Estado en el ámbito de sus competencias, y de otra, infraestructuras, proyectos, eventos e inversiones fallidas, vacías o infrautilizadas acometidas por las Comunidades Autónomas y los gobiernos locales. Se abordan los déficit de marco institucional y de gobernanza te…
Simulations of networked critical infrastructures
2018
Master's thesis Information- and communication technology IKT590 - University of Agder 2018 Critical infrastructure (CI) refers to assets that are essential for the functioning of a society and economy, such as telecommunication/ICT; energy generation, transmission and distribution; financial sector; etc. CIs are tightly coupled, creating a complex system where failures propagate from a disrupted CI to other CIs, aggravating and prolonging the societal impact through cascading effects. This thesis extends a system dynamic model by Eliza Canzani describing how a failed critical infrastructure that cannot deliver products and services impacts other critical infrastructures, and how a critical…
Customer data collection infrastructure and Customer Experience Management:The SAQ Case Study
2017
Channel integration makes Customer Experience Management more complex and requires from retailers a regeneration of their value proposition. A longitudinal case study reveal a hierarchical sequence of operant resource triad: cultural mindsets, strategic directions for designing value propositions, and a dynamic system of capabilities for continually renewing customer experiences. The implementation of a customer data collection infrastructure, the adoption of an iterative and sequential innovation process, and the mobilization of cross-functional and multidisciplinary project teams, will help develop the firm’s dynamic system of capabilities.
Phenomena in the Cyber World
2015
This chapter describes and evaluates the cyber world, including its phenomena, from a strategic perspective. As no universally accepted definitions for the cyber world exist, associated literature and publications address it in many different ways. A five-layer model is constructed for cyber threats, which include cybervandalism, cybercrime, cyber intelligence, cyberterrorism and cyberwarfare. This chapter depicts the standards-based risk model, cyber operations and cyberweaponry, as well as the critical structures of society as the targets. Moreover, cyber security definitions are provided. Cyber world phenomena are addressed in more detail in other chapters of this book.
Criminal networks analysis in missing data scenarios through graph distances.
2021
Data collected in criminal investigations may suffer from: (i) incompleteness, due to the covert nature of criminal organisations; (ii) incorrectness, caused by either unintentional data collection errors and intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyse nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data and to determine which network type is most affected by it. The networks are firstly pruned following two specific methods: …
Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk
2009
Abstract The protection of critical infrastructure requires an understanding of the effects of change on current and future safety and operations. Vulnerabilities may emerge during the rollout of updated techniques and integration of new technology with existing work practices. Managers need to understand how their decisions, often focused on economic priorities, affect the dynamics of vulnerability over time. Such understanding is difficult to obtain, as the historical data typically used for decision support, prediction and forecasting may not be available. We report on the use of group model building and simulation to consider proactively the effects of a 10-year, multi-billion dollar mo…
Forecasting the diffusion of hydrogen EV refuelling infrastructures in Italy
2019
In Italy the electric vehicle revolution is arrived but it still has difficulties to take off. At the moment hybrid technology would seem the most quoted, due especially to range anxiety. The aim of this work is to understand if the fuel cell technology can find place in Italy. The possibility to use fuel cell to storage electric energy is quite interesting: the charging times will be reduced, and heavy passenger transportation should be easily faced. Basing on the existing history and analysis of the information accessible, this paper addresses the existing e-mobility scenario in Italy and predicts the cities in which a hydrogen refuelling infrastructure should be more remunerative, in ord…
Dsdivn: A Distributed Software-Defined Networking Architecture for Infrastructure-Less Vehicular Networks
2017
International audience; In the last few years, the emerging network architecture paradigm of Software-Defined Networking (SDN), has become one of the most important technology to manage large scale networks such as Vehicular Ad-hoc Networks (VANETs). Recently, several works have shown interest in the use of SDN paradigm in VANETs. SDN brings flexibility, scalability and management facility to current VANETs. However, almost all of proposed Software-Defined VANET (SDVN) architectures are infrastructure-based. This paper will focus on how to enable SDN in infrastructure-less vehicular environments. For this aim, we propose a novel distributed SDN-based architecture for uncovered infrastructur…