Advancing UAV security with artificial intelligence: A comprehensive survey of techniques and future directions
Abstract Unmanned Aerial Vehicles (UAVs) have become an integral part of modern smart
cities and systems. However, the proliferation of UAVs has also brought a significant security …
cities and systems. However, the proliferation of UAVs has also brought a significant security …
Cybersecurity challenges in IoT-based smart renewable energy
Abstract The Internet of Things (IoT) makes it possible to collect data from, and issue
commands to, devices via the Internet, eliminating the need for humans in the process while …
commands to, devices via the Internet, eliminating the need for humans in the process while …
Blending data and physics against false data injection attack: An event-triggered moving target defence approach
Fast and accurate detection of cyberattacks is a key element for a cyber-resilient power
system. Recently, data-driven detectors and physics-based Moving Target Defences (MTD) …
system. Recently, data-driven detectors and physics-based Moving Target Defences (MTD) …
Integrating FACTS technologies into renewable energy systems: potential and challenges
The proliferation of renewable energy systems into smart grids is becoming increasingly vital
as the globe continues to shift toward sustainable energy sources. However, renewable …
as the globe continues to shift toward sustainable energy sources. However, renewable …
Ha-grid: Security aware hazard analysis for smart grids
Attacks targeting smart grid infrastructures can result in the disruptions of power supply as
well as damages to costly equipment, with significant impact on safety as well as on end …
well as damages to costly equipment, with significant impact on safety as well as on end …
Physical verification of data-driven cyberattack detector in power system: An MTD approach
Stealthy false data injection attacks (FDIAs) have been shown to compromise power system
state estimation. The data-driven detector is a promising way to counter FDIAs. However, it …
state estimation. The data-driven detector is a promising way to counter FDIAs. However, it …
Detecting smart meter false data attacks using hierarchical feature clustering and incentive weighted anomaly detection
Spot pricing is often suggested as a method of increasing demand‐side flexibility in
electrical power load. However, few works have considered the vulnerability of spot pricing …
electrical power load. However, few works have considered the vulnerability of spot pricing …
Incentive-weighted Anomaly Detection for False Data Injection Attacks Against Smart Meter Load Profiles
Spot pricing is often suggested as a method of increasing demand-side flexibility in electrical
power load. However, few works have considered the vulnerability of spot pricing to financial …
power load. However, few works have considered the vulnerability of spot pricing to financial …
[PDF][PDF] HA-Grid: Security Aware Hazard Analysis for Smart Grids
Attacks targeting smart grid infrastructures can result in the disruptions of power supply as
well as damages to costly equipment, with significant impact on safety as well as on end …
well as damages to costly equipment, with significant impact on safety as well as on end …