Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Evaluation framework for electric vehicle security risk assessment
Electric Vehicles (EVs) seem promising for future transportation to solve environmental
concerns and energy management problems. According to Reuters, global car makers plan …
concerns and energy management problems. According to Reuters, global car makers plan …
Evexchange: A relay attack on electric vehicle charging system
To support the increasing spread of Electric Vehicles (EVs), Charging Stations (CSs) are
being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) …
being installed worldwide. The new generation of CSs employs the Vehicle-To-Grid (V2G) …
[HTML][HTML] Certifying battery usage for V2G and second life with a blockchain-based framework
This paper describes a blockchain-based approach for sharing data among all the actors
involved in Vehicle-to-Grid programs. The shared information is used both for monitoring the …
involved in Vehicle-to-Grid programs. The shared information is used both for monitoring the …
Reference Power Tracking for AC Charging of Electric Vehicles
Electric vehicle (EV) charging is widely considered as a key enabling technology that can
support system stability and provide ancillary services to the grid. The present work aims to …
support system stability and provide ancillary services to the grid. The present work aims to …
Electric vehicles security and privacy: Challenges, solutions, and future needs
Electric Vehicles (EVs) share common technologies with classical fossil-fueled cars, but they
also employ novel technologies and components (eg, Charging System and Battery …
also employ novel technologies and components (eg, Charging System and Battery …
Plug and power: Fingerprinting usb powered peripherals via power side-channel
The literature and the news regularly report cases of exploiting Universal Serial Bus (USB)
devices as attack tools for malware injections and private data exfiltration. To protect against …
devices as attack tools for malware injections and private data exfiltration. To protect against …
Collaborative anomaly detection system for charging stations
In recent years, the deployment of charging infrastructures has been increasing
exponentially due to the high energy demand of electric vehicles, forming complex charging …
exponentially due to the high energy demand of electric vehicles, forming complex charging …
Threats to Power Grid Operations From the Demand-Side Response Ecosystem: A Comprehensive Overview
This article focuses on cyber security threats from IoT-enabled energy smart appliances
(ESAs) such as smart heat pumps, electric vehicle chargers, etc., to power grid operations. It …
(ESAs) such as smart heat pumps, electric vehicle chargers, etc., to power grid operations. It …
Private Metering in EV Charging Infrastructure: An OCPP Extension
The security of electrical vehicle (EV) charging systems has been improving over the past
years. However, privacy concerns are yet to be addressed as profiling attacks can be …
years. However, privacy concerns are yet to be addressed as profiling attacks can be …
LPPDA: A Light-Weight Privacy-Preserving Data Aggregation Protocol for Smart Grids
Smart meters are continuously being deployed in several countries as a step in the direction
of modernizing the power grid. Smart meters allow for automatic electricity consumption …
of modernizing the power grid. Smart meters allow for automatic electricity consumption …