Visible to the public Biblio

Filters: Keyword is fuzzy techniques  [Clear All Filters]
2023-07-11
Sari, Indah Permata, Nahor, Kevin Marojahan Banjar, Hariyanto, Nanang.  2022.  Dynamic Security Level Assessment of Special Protection System (SPS) Using Fuzzy Techniques. 2022 International Seminar on Intelligent Technology and Its Applications (ISITIA). :377—382.
This study will be focused on efforts to increase the reliability of the Bangka Electricity System by designing the interconnection of the Bangka system with another system that is stronger and has a better energy mix, the Sumatra System. The novelty element in this research is the design of system protection using Special Protection System (SPS) as well as a different assessment method using the Fuzzy Technique This research will analyze the implementation of the SPS event-based and parameter-based as a new defense scheme by taking corrective actions to keep the system stable and reliable. These actions include tripping generators, loads, and reconfiguring the system automatically and quickly. The performance of this SPS will be tested on 10 contingency events with four different load profiles and the system response will be observed in terms of frequency stability, voltage, and rotor angle. From the research results, it can be concluded that the SPS performance on the Bangka-Sumatra Interconnection System has a better and more effective performance than the existing defense scheme, as evidenced by the results of dynamic security assessment (DSA) testing using Fuzzy Techniques.
2020-02-26
Naik, Nitin, Jenkins, Paul, Savage, Nick, Yang, Longzhi.  2019.  Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors Using Fuzzy Hashing and Fuzzy C-Means Clustering. 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). :1–6.

Threat actors are constantly seeking new attack surfaces, with ransomeware being one the most successful attack vectors that have been used for financial gain. This has been achieved through the dispersion of unlimited polymorphic samples of ransomware whilst those responsible evade detection and hide their identity. Nonetheless, every ransomware threat actor adopts some similar style or uses some common patterns in their malicious code writing, which can be significant evidence contributing to their identification. he first step in attempting to identify the source of the attack is to cluster a large number of ransomware samples based on very little or no information about the samples, accordingly, their traits and signatures can be analysed and identified. T herefore, this paper proposes an efficient fuzzy analysis approach to cluster ransomware samples based on the combination of two fuzzy techniques fuzzy hashing and fuzzy c-means (FCM) clustering. Unlike other clustering techniques, FCM can directly utilise similarity scores generated by a fuzzy hashing method and cluster them into similar groups without requiring additional transformational steps to obtain distance among objects for clustering. Thus, it reduces the computational overheads by utilising fuzzy similarity scores obtained at the time of initial triaging of whether the sample is known or unknown ransomware. The performance of the proposed fuzzy method is compared against k-means clustering and the two fuzzy hashing methods SSDEEP and SDHASH which are evaluated based on their FCM clustering results to understand how the similarity score affects the clustering results.