Conferences related to System Security

Back to Top

2020 22nd European Conference on Power Electronics and Applications (EPE'20 ECCE Europe)

Energy conversion and conditioning technologies, power electronics, adjustable speed drives and their applications, power electronics for smarter grid, energy efficiency,technologies for sustainable energy systems, converters and power supplies


2020 57th ACM/ESDA/IEEE Design Automation Conference (DAC)

The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2022 59th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2021 58th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2019 56th ACM/ESDA/IEEE Design Automation Conference (DAC)

    EDA (Electronics Design Automation) is becoming ever more important with the continuous scaling of semiconductor devices and the growing complexities of their use in circuits and systems. Demands for lower-power, higher-reliability and more agile electronic systems raise new challenges to both design and design automation of such systems. For the past five decades, the primary focus of research track at DAC has been to showcase leading-edge research and practice in tools and methodologies for the design of circuits and systems.

  • 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2017 54th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC Description for TMRF The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 sessions on design methodologies and EDA tool developments, keynotes, panels, plus the NEW User Track presentations. A diverse worldwide community representing more than 1,000 organizations attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading

  • 2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The world's premier EDA and semiconductor design conference and exhibition. DAC features over 60 session on design methodologies and EDA tool developments, keynotes, panels, plus User Track presentations. A diverse worldwide community representing more than 1,000 organization attends each year, from system designers and architects, logic and circuit designers, validation engineers, CAD managers, senior managers and executives to researchers and academicians from leading universities.

  • 2012 49th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers

  • 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference is the world s leading technical conference and tradeshow on electronic design and design automation. DAC is where the IC Design and EDA ecosystem learns, networks, and does business.

  • 2010 47th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 200 of the leading electronics design suppliers.

  • 2009 46th ACM/EDAC/IEEE Design Automation Conference (DAC)

    DAC is the premier event for the electronic design community. DAC offers the industry s most prestigious technical conference in combination with the biggest exhibition, bringing together design, design automation and manufacturing market influencers.

  • 2008 45th ACM/EDAC/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier event for the design of electronic circuits and systems, and for EDA and silicon solutions. DAC features a wide array of technical presentations plus over 250 of the leading electronics design suppliers.

  • 2007 44th ACM/IEEE Design Automation Conference (DAC)

    The Design Automation Conference (DAC) is the premier Electronic Design Automation (EDA) and silicon solution event. DAC features over 50 technical sessions covering the latest in design methodologies and EDA tool developments and an Exhibition and Demo Suite area with over 250 of the leading EDA, silicon and IP Providers.

  • 2006 43rd ACM/IEEE Design Automation Conference (DAC)

  • 2005 42nd ACM/IEEE Design Automation Conference (DAC)

  • 2004 41st ACM/IEEE Design Automation Conference (DAC)

  • 2003 40th ACM/IEEE Design Automation Conference (DAC)

  • 2002 39th ACM/IEEE Design Automation Conference (DAC)

  • 2001 38th ACM/IEEE Design Automation Conference (DAC)

  • 2000 37th ACM/IEEE Design Automation Conference (DAC)

  • 1999 36th ACM/IEEE Design Automation Conference (DAC)

  • 1998 35th ACM/IEEE Design Automation Conference (DAC)

  • 1997 34th ACM/IEEE Design Automation Conference (DAC)

  • 1996 33rd ACM/IEEE Design Automation Conference (DAC)


2020 IEEE Power & Energy Society General Meeting (PESGM)

The Annual IEEE PES General Meeting will bring together over 2900 attendees for technical sessions, administrative sessions, super sessions, poster sessions, student programs, awards ceremonies, committee meetings, tutorials and more


2020 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM)

The scope of the 2020 IEEE/ASME AIM includes the following topics: Actuators, Automotive Systems, Bioengineering, Data Storage Systems, Electronic Packaging, Fault Diagnosis, Human-Machine Interfaces, Industry Applications, Information Technology, Intelligent Systems, Machine Vision, Manufacturing, Micro-Electro-Mechanical Systems, Micro/Nano Technology, Modeling and Design, System Identification and Adaptive Control, Motion Control, Vibration and Noise Control, Neural and Fuzzy Control, Opto-Electronic Systems, Optomechatronics, Prototyping, Real-Time and Hardware-in-the-Loop Simulation, Robotics, Sensors, System Integration, Transportation Systems, Smart Materials and Structures, Energy Harvesting and other frontier fields.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


More Conferences

Periodicals related to System Security

Back to Top

Aerospace and Electronic Systems Magazine, IEEE

The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.


Audio, Speech, and Language Processing, IEEE Transactions on

Speech analysis, synthesis, coding speech recognition, speaker recognition, language modeling, speech production and perception, speech enhancement. In audio, transducers, room acoustics, active sound control, human audition, analysis/synthesis/coding of music, and consumer audio. (8) (IEEE Guide for Authors) The scope for the proposed transactions includes SPEECH PROCESSING - Transmission and storage of Speech signals; speech coding; speech enhancement and noise reduction; ...


Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Circuits and Systems I: Regular Papers, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


Circuits and Systems II: Express Briefs, IEEE Transactions on

Part I will now contain regular papers focusing on all matters related to fundamental theory, applications, analog and digital signal processing. Part II will report on the latest significant results across all of these topic areas.


More Periodicals

Most published Xplore authors for System Security

Back to Top

Xplore Articles related to System Security

Back to Top

Analysis and recommendations for the adaptability of China's power system security and stability relevant standards

CSEE Journal of Power and Energy Systems, 2017

In developing power grids, setting standards is critical to its success. The development of China's power industry has proposed new requirements for power systems to ensure secure and stable operations. The principal standards for the security and stability of China's current power systems are analyzed in terms of operational control, generator-grid coordination and simulation. The shortcomings are pointed out and ...


Implementation of power system security check and its visualization system

2011 4th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), 2011

Nowadays, with the introduction of competitive electricity markets, large scale interconnected power grids are operated closer to their operation limits, and power system operators often have a dual and conflicting responsibility for system security and for profit maximization. Insuring power grid operating safely and stably under complicated operating conditions has become a rigorous challenge to electric utilities. This paper discusses ...


Classification of power system security state in presence of fluctuating in-feed in operational planning

2013 North American Power Symposium (NAPS), 2013

Due to political targets, the share of fluctuating in-feed of the total electricity generation is substantial in many countries today. Maybe the most common sources of fluctuating in-feed are wind generation and photovoltaic. These fluctuations cause challenges for transmission system operators to maintain security in the system. In order to study the system security state in operational planning, the transmission ...


Optimal power flow considering system security using loading factor

2010 9th International Conference on Environment and Electrical Engineering, 2010

This paper presents an optimal power flow (OPF) model which maximizes system security. Loading factor has been chosen as objective function of OPF problem to enhance system security. It is demonstrated that available transfer capability (ATC) is a suitable criterion for evaluation of system security. In addition, this concept is consistent to ISO requirements for system operation. On the other ...


Quantification of Market Performance as a Function of System Security

IEEE Transactions on Power Systems, 2007

The tight coupling between market and system operations in the restructured environment requires a thorough understanding of the interdependence between the market performance and the way the power systems are operated. In particular, we need to go beyond the qualitative characterization and to quantify the dependence of the market performance on the system security. Such studies are typically not performed ...


More Xplore Articles

Educational Resources on System Security

Back to Top

IEEE.tv Videos

Bill Woodward presents NEEDLES: 2016 End to End Trust and Security Workshop for the Internet of Things
Ulf Lindqvist presents the IEEE Cybersecurity Initiative (CybSI): 2016 End to End Trust and Security Workshop for the Internet of Things
Developing Automated Analysis Tools for Space/Time Sidechannel Detection - IEEE SecDev 2016
Howard Shrobe: Runtime Security Monitor for Real-time Critical System Embedded Applications: WF IoT 2016
Keynote Deepak Maheshwari - India Biometrics - ETAP Forum Tel Aviv 2016
Security Issues, Approaches and Practices in the IoT-Fog Era - Fog World Congress 2017
Infineon: Innovative Semiconductor Solutions
Optical Stealth Communication based on Amplified Spontaneous Emission Noise - Ben Wu - IEEE Sarnoff Symposium, 2019
Reconfigurable Distributed MIMO for Physical-layer Security - Zygmunt Haas - IEEE Sarnoff Symposium, 2019
IEEE Green Energy Summit 2015, Panel 2: How reliable is reliable enough?
Robotics History: Narratives and Networks Oral Histories: Pradeep Khosla
NXP
Disruptive Internet of Things course, Part 2 - IEEE Smart Tech Workshop
Disruptive Internet of Things course, Part 3 - IEEE Smart Tech Workshop
Fragility of Interconnected Cyber-Physical Systems - Marios M. Polycarpou - WCCI 2016
Disruptive Internet of Things course, Part 4 - IEEE Smart Tech Workshop
NIKSUN World Wide Security & Mobility Conference 2011-Rajagopalan
Disruptive Internet of Things course, Part 1 - IEEE Smart Tech Workshop
PES Scholarship Initiative Plus - Patricia Hoffman Presentation
NIKSUN World Wide Security & Mobility Conference 2011 - V Solanki Lecture

IEEE-USA E-Books

  • Analysis and recommendations for the adaptability of China's power system security and stability relevant standards

    In developing power grids, setting standards is critical to its success. The development of China's power industry has proposed new requirements for power systems to ensure secure and stable operations. The principal standards for the security and stability of China's current power systems are analyzed in terms of operational control, generator-grid coordination and simulation. The shortcomings are pointed out and the directions of future development are discussed. In the end, the study highlighted the following key areas that require further research and improvement: the evaluation criteria of power system security and stability should be improved to ensure the secure and stable operation of China's power systems; the operational control standards should be constantly enhanced to increase the reliability and flexibility of operational control strategies; generator-grid coordination standards should be upgraded to improve the coordination between the generator control protection system and the grid; and the simulation methodology should be standardized in future power system security and stability research.

  • Implementation of power system security check and its visualization system

    Nowadays, with the introduction of competitive electricity markets, large scale interconnected power grids are operated closer to their operation limits, and power system operators often have a dual and conflicting responsibility for system security and for profit maximization. Insuring power grid operating safely and stably under complicated operating conditions has become a rigorous challenge to electric utilities. This paper discusses some online security check technologies, and presents a power system security check software package implemented with advanced visualization technologies. The application of power system security check is based on CIM model so as to facilitate the passing of power system data with other applications.

  • Classification of power system security state in presence of fluctuating in-feed in operational planning

    Due to political targets, the share of fluctuating in-feed of the total electricity generation is substantial in many countries today. Maybe the most common sources of fluctuating in-feed are wind generation and photovoltaic. These fluctuations cause challenges for transmission system operators to maintain security in the system. In order to study the system security state in operational planning, the transmission system operator has to take the fluctuations into account. This paper presents a method to classify the power system security state in the operational planning in presence of fluctuating in-feed. The method proposed gives the probability for every power system security state at the moment of supply using available production plans and forecasts in operational planning. The method has been illustrated by using one area of the IEEE RTS-96 test system.

  • Optimal power flow considering system security using loading factor

    This paper presents an optimal power flow (OPF) model which maximizes system security. Loading factor has been chosen as objective function of OPF problem to enhance system security. It is demonstrated that available transfer capability (ATC) is a suitable criterion for evaluation of system security. In addition, this concept is consistent to ISO requirements for system operation. On the other hand, loading factor (LF) is an alternative concept that can evaluate system ATC. Therefore, in this work, the correlation between LF and ATC has been demonstrated. The proposed OPF model formulation has been solved in order to maximize loading factor. By solving this optimization model for normal and contingency conditions, ISO can be ensured about system reliability and security. Finally, the proposed optimal power flow model is applied and tested on the CIGRE 32-bus system for normal and contingency cases.

  • Quantification of Market Performance as a Function of System Security

    The tight coupling between market and system operations in the restructured environment requires a thorough understanding of the interdependence between the market performance and the way the power systems are operated. In particular, we need to go beyond the qualitative characterization and to quantify the dependence of the market performance on the system security. Such studies are typically not performed in today's regional transmission organization, or RTO, structures. In this paper, we develop a general approach to quantify the monetary impacts of complying with a specified security criterion when the deployment of appropriate preventive and/or corrective security control actions is fully taken into account. This approach is deployed in the day-ahead electricity markets and is based on the emulation of the way the RTO currently operates the market and the grid, the latter in compliance with the security criterion. The proposed approach has a wide range of applications such as comparative market performance assessments of different security criteria and the cost/benefit analysis of network improvements to mitigate the market performance impacts of a set of specified contingencies. We illustrate the application of the proposed approach on the large-scale ISO-NE system to quantify the monetary impacts associated with changing from the current security criterion to two other criteria using the actual 2005 day-ahead data-the historical system model and the bids/offers submitted-with the actual market clearing methodology. These studies capture, in a meaningful way, the impacts of the changes with respect to the current security criterion. An important finding of this study is that the economic efficiency of electricity markets need not decrease when the system is operated under a stricter criterion.

  • Impact of industry restructuring on the Chilean central interconnected system security and dynamic performance

    In this work, a critical revision of the evolution of security and dynamic performance of the Chilean central interconnected system (CIS) is presented. The paper renders a description of the main events leading to partial or total blackouts, that have occurred in the CIS system. Also, a classification of the type of instability as transient, small signal, or voltage collapse is attempted. Special attention is devoted to describe the root and the main lessons learned from the incidents

  • Analysis of “Importance sampling” in electric power system security

    Power system security has become one of the most important issues in power system operation due to intensive use of transmission network and it is strongly tied with contingency analysis. However with the introduction of more variable generation sources such as wind power and due to fast changing loads power system security analysis will also have to incorporate sudden changes in injected powers that are not due to generation outages. The probability of failure induced by changes in grid state is evaluated by the Monte Carlo simulation method. A comparison to crude Monte Carlo (CMC) and Importance sampling (IS) is performed for standard IEEE-33 bus system. Importance sampling method indicates a major increase in simulation efficiency by reducing number of samples.

  • Power System Security in Market Clearing and Dispatch Mechanisms

    This paper presents and discusses some typical market clearing and dispatch mechanisms based on security-constrained (SC) optimal power flow (OPF) techniques that are currently being utilized in various jurisdictions throughout the world, concentrating on how system security is accounted for in these auction systems and the effect that this has on the system dispatch schedules and energy prices. The Ontario market is used as an example to illustrate the practical application of these security-constrained clearing and dispatch mechanisms. The need for a better representation of system security in the existent auction systems is also discussed, based on the fact that "unexpected" dispatch solutions, resulting from diverse bidding patterns and the mechanisms used to clear and dispatch the market, may render ineffective the predetermined system security limits typically used in most auction models, leading to insecure operating conditions and/or unnecessary high prices associated with an unrealistic modeling of system congestion. The latter is illustrated using a simple 6 bus test system, comparing the dispatch levels and prices, as well as the general system operating conditions, obtained from a SC-OPF auction mechanism with respect to those obtained using a voltage-stability-constrained technique, which better represents system security

  • Optimal Location of Series FACTS Devices for Enhancing Power System Security

    In emerging electric power systems, due to increased loading or due to severe contingencies often lead to situation where system no longer remains in the secure operating region. Under these situations, it is primary objective of the operator to apply control action to bring the power system into the secure region. FACTS devices can play a very important role in power system security enhancement. Due to high capital investment, it is necessary to locate these devices optimally in the power system. In this paper, a real power flow performance index (PI) sensitivity based approach and the line outage distribution factor has been proposed to decide optimal location of Thyristor Controlled Series Compensator (TCSC) and Static Synchronous Series Compensator (SSSC) to enhance the security of the power system. The effectiveness of the proposed controller has been tested on modified IEEE 30 bus system using Power World Simulator Software Version 12.0.

  • An innovative analying method for the scale of distribution system security region

    Distribution system security region (DSSR) has been widely used to analyze the distribution system operation security. This paper innovatively defines the scale of DSSR, namely the number of boundary constraints and variables of all operational constraints, analyzes and puts forward the corresponding evaluation method. Firstly, the influence of the number of security boundary constraints and variables on the scale of DSSR is analyzed. The factors that mainly influence the scale are found, such as the number of transformers, feeders, as well as sectionalizing switches, and feeder contacts modes between transformers. Secondly, a matrix representing the relations among transformers in distribution system is defined to reflect the characteristics of network's structure, while an algorithm of the scale of DSSR based on transformers connection relationship matrix is proposed, which avoids the trouble of listing security region constraints. Finally, the proposed method is applied in a test system to confirm the effectiveness of the concepts and methods. It provides the necessary foundation for DSSR theory as well as safety analysis.



Standards related to System Security

Back to Top

IEEE Standard for Local and metropolitan area networks - Secure Device Identity

This standard specifies unique per-device identifiers (DevID) and the management and cryptographic binding of a device to its identifiers, the relationship between an initially installed identity and subsequent locally significant identities, and interfaces and methods for use of DevIDs with existing and new provisioning and authentication protocols.


IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of common public-key cryptographic techniques for performing password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363™-2000 and IEEE Std 1363a™-2004.1 It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key ...


IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is ...


IEEE Standard Specifications for Public-Key Cryptography

Specifications of common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys.


IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (key) derivation, public-key encryption, digital signatures, and identification, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.


More Standards