Security risk modeling in smart grid critical infrastructures in the era of big data and artificial intelligence

A Chehri, I Fofana, X Yang - Sustainability, 2021 - mdpi.com
Smart grids (SG) emerged as a response to the need to modernize the electricity grid. The
current security tools are almost perfect when it comes to identifying and preventing known …

A novel charging scheme for electric vehicles with smart communities in vehicular networks

Y Wang, Z Su, Q Xu, T Yang… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In a smart community (SC) with renewable energy sources (RES), flexible charging service
can be provisioned to electric vehicles (EVs), where EVs can choose clean energy …

[HTML][HTML] A trust-influenced smart grid: A survey and a proposal

K Boakye-Boateng, AA Ghorbani… - Journal of Sensor and …, 2022 - mdpi.com
A compromised Smart Grid, or its components, can have cascading effects that can affect
lives. This has led to numerous cybersecurity-centric studies focusing on the Smart Grid in …

Fog-based evaluation approach for trustworthy communication in sensor-cloud system

T Wang, Y Li, Y Chen, H Tian, Y Cai… - IEEE …, 2017 - ieeexplore.ieee.org
A sensor-cloud system is a combination of wireless sensor networks and cloud computing
that is equipped with ubiquitous physical sensing ability, high-speed computation, huge …

Deception in cyberspace: An empirical study on a con man attack

MM Chowdhury, KE Nygard - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Deception happens in social life. Social life is now omnipresent in cyber domains. As a
result, deception is also evident in cyberspace. Deception in cyberspace is diverse and often …

Assessing the risk of implementing system integrity protection schemes in a power system with significant wind integration

N Liu, P Crossley - IEEE Transactions on Power Delivery, 2017 - ieeexplore.ieee.org
System integrity protection schemes (SIPS) are widely applied to power networks to ensure
their operating security. This is particularly important when a network is operating close to its …

Deception in cyberspace: Performance focused con resistant trust algorithm

MM Chowdhury, KE Nygard… - 2017 International …, 2017 - ieeexplore.ieee.org
A con man trick appears in cyberspace as a deception around cloud services from the
service provider. Con man resistant trust algorithm continuously monitors cloud service's …

Optimized energy consumption and demand side management in smart grid

S Ahmad, A Ahmad, R Yaqub - Smart Technologies: Breakthroughs …, 2018 - igi-global.com
This chapter reviews prevailing methodologies and future techniques to optimize energy
consumption. It discerns that smart grid provides better tools and equipment to control and …

[PDF][PDF] An empirical study on a con resistant trust algorithm for cyberspace

MM Chowdhury, KE Nygard - Proceedings on the International …, 2017 - researchgate.net
A con man deception appears in services from cyberspace eg in cloud services. Con man
resistant trust algorithm is used as a proactive measure against such deception, reducing …

Smart grid for sustainable cities: strategies and pathways for energy efficiency solutions

A Chehri, R Saadane, I Fofana, G Jeon - Sustainability in Energy and …, 2022 - Springer
Smart Cities are making massive use of information and communication technologies, which
are leading to significant digitization. However, the rate at which technology is currently …