energies-logo

Journal Browser

Journal Browser

Cyber Security in Energy Networks in 2023

A special issue of Energies (ISSN 1996-1073). This special issue belongs to the section "G1: Smart Cities and Urban Management".

Deadline for manuscript submissions: closed (6 September 2023) | Viewed by 1348

Special Issue Editors


E-Mail Website
Guest Editor
Saint-Petersburg Institute for Informatics and Automation, Russian Academy of Sciences (SPIIRAS), 39, 14 Liniya, 199178 St. Petersburg, Russia
Interests: cyber security; IoT; cyber physical systems; decision making and planning; artificial intelligence; big data; telecommunications
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Laboratory of Computer Security Problems, St. Petersburg Federal Research Center of the Russian Academy of Sciences, Saint Petersburg 199178, Russia
Interests: computer-based systems; information security; data processing and communications; modeling theory and mathematical statistics; information theory
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Cyber security in energy networks is one of the important problems of the modern computer science and information technology. The problem importance is confirmed by ever increasing multiplicity and diversity of threads and vulnerabilities of energy networks, permanently increasing significance and value of information itself, and by potentially devastating consequences of successful attacks on integrity, resource availability and information confidentiality of energy networks. Unauthorized access to energy networks facilities and resources may be truly disastrous.

In this context, the proposed Special Issue will have to present unpublished theoretical and applied results related to the development of new approaches, models, methods, algorithms, software and hardware for cyber security in energy networks. These results will concern wide range of the issues affecting application of the advanced and innovation methods of data processing, resilience, security, and safety.

Prof. Dr. Igor Kotenko
Prof. Dr. Igor Saenko
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Energies is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

40 pages, 1386 KiB  
Article
Modeling the Development of Energy Network Software, Taking into Account the Detection and Elimination of Vulnerabilities
by Igor Kotenko, Konstantin Izrailov, Mikhail Buinevich, Igor Saenko and Rajeev Shorey
Energies 2023, 16(13), 5111; https://doi.org/10.3390/en16135111 - 2 Jul 2023
Cited by 5 | Viewed by 940
Abstract
This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, [...] Read more.
This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, namely the following representations: idea, conceptual model, architecture, algorithm, source code, graphic code, abstract syntax tree, assembler code, machine code, byte code, executed code. The main properties of each representation are indicated, such as the form (text, graphic, programming language, binary, and decoded), development (transformation) methods, as well as vulnerabilities that are detected in it. An example of each representation is given, particularly as applied to the energy networks. The scheme elements (representations, vulnerabilities, forms, etc.) and the main operations for working with their elements (representation transformation, vulnerability injection, and detection) are presented in an analytical form. An example of a development scheme for a simple software complex of energy networks is given. The classification of vulnerabilities is introduced; it divides the vulnerabilities according to the structural level, functioning disruption, and information impact. The vulnerabilities in each of the views are substantiated using the common vulnerabilities and exposures (CVE) database. An experiment was conducted to demonstrate the vulnerability spread across representations during the development of a software complex example for the energy network. The features of the applications of the obtained results for energy networks are taken into account. The advantages, disadvantages, and limitations of the study, as well as ways to eliminate them, are discussed. Full article
(This article belongs to the Special Issue Cyber Security in Energy Networks in 2023)
Show Figures

Figure 1

Back to TopTop