Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence
Smart grids (SG) emerged as a response to the need to modernize the electricity grid. The
current security tools are almost perfect when it comes to identifying and preventing known …
current security tools are almost perfect when it comes to identifying and preventing known …
A novel charging scheme for electric vehicles with smart communities in vehicular networks
In a smart community (SC) with renewable energy sources (RES), flexible charging service
can be provisioned to electric vehicles (EVs), where EVs can choose clean energy …
can be provisioned to electric vehicles (EVs), where EVs can choose clean energy …
[HTML][HTML] A trust-influenced smart grid: A survey and a proposal
A compromised Smart Grid, or its components, can have cascading effects that can affect
lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in …
lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in …
Fog-based evaluation approach for trustworthy communication in sensor-cloud system
A sensor-cloud system is a combination of wireless sensor networks and cloud computing
that is equipped with ubiquitous physical sensing ability, high-speed computation, huge …
that is equipped with ubiquitous physical sensing ability, high-speed computation, huge …
Deception in cyberspace: An empirical study on a con man attack
MM Chowdhury, KE Nygard - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Deception happens in social life. Social life is now omnipresent in cyber domains. As a
result, deception is also evident in cyberspace. Deception in cyberspace is diverse and often …
result, deception is also evident in cyberspace. Deception in cyberspace is diverse and often …
Assessing the risk of implementing system integrity protection schemes in a power system with significant wind integration
N Liu, P Crossley - IEEE Transactions on Power Delivery, 2017 - ieeexplore.ieee.org
System integrity protection schemes (SIPS) are widely applied to power networks to ensure
their operating security. This is particularly important when a network is operating close to its …
their operating security. This is particularly important when a network is operating close to its …
Deception in cyberspace: Performance focused con resistant trust algorithm
MM Chowdhury, KE Nygard… - 2017 International …, 2017 - ieeexplore.ieee.org
A con man trick appears in cyberspace as a deception around cloud services from the
service provider. Con man resistant trust algorithm continuously monitors cloud service's …
service provider. Con man resistant trust algorithm continuously monitors cloud service's …
Optimized energy consumption and demand side management in smart grid
This chapter reviews prevailing methodologies and future techniques to optimize energy
consumption. It discerns that smart grid provides better tools and equipment to control and …
consumption. It discerns that smart grid provides better tools and equipment to control and …
[PDF][PDF] An empirical study on a con resistant trust algorithm for cyberspace
MM Chowdhury, KE Nygard - Proceedings on the International …, 2017 - researchgate.net
A con man deception appears in services from cyberspace eg in cloud services. Con man
resistant trust algorithm is used as a proactive measure against such deception, reducing …
resistant trust algorithm is used as a proactive measure against such deception, reducing …
Smart grid for sustainable cities: strategies and pathways for energy efficiency solutions
Smart Cities are making massive use of information and communication technologies, which
are leading to significant digitization. However, the rate at which technology is currently …
are leading to significant digitization. However, the rate at which technology is currently …