On the control of microgrids against cyber-attacks: A review of methods and applications
Nowadays, the use of renewable generations, energy storage systems (ESSs) and
microgrids (MGs) has been developed due to better controllability of distributed energy …
microgrids (MGs) has been developed due to better controllability of distributed energy …
A survey on artificial intelligence techniques for security event correlation: models, challenges, and opportunities
Abstract Information systems need to process a large amount of event monitoring data. The
process of finding the relationships between events is called correlation, which creates a …
process of finding the relationships between events is called correlation, which creates a …
Peer-to-peer energy trading in energy local area network considering decentralized energy routing
Abstract Peer-to-peer (P2P) energy trading is perceived as a promising energy management
mechanism for decentralized renewable energy sources. The concept of energy local area …
mechanism for decentralized renewable energy sources. The concept of energy local area …
Reactive power optimization based on the application of an improved particle swarm optimization algorithm
Climate change, improved energy efficiency, and access to contemporary energy services
are among the key topics investigated globally. The effect of these transitions has been …
are among the key topics investigated globally. The effect of these transitions has been …
Empowering Security Operation Center with Artificial Intelligence and Machine Learning–A Systematic Literature Review
Organizational cybersecurity relies heavily on security operation centers (SOCs) to protect
businesses and institutions from emerging cyber threats. In recent years, the complexity and …
businesses and institutions from emerging cyber threats. In recent years, the complexity and …
[HTML][HTML] Simulation of multi-stage attack and defense mechanisms in smart grids
The power grid is a vital infrastructure in modern society, essential for ensuring public safety
and welfare. As it increasingly relies on digital technologies for its operation, it becomes …
and welfare. As it increasingly relies on digital technologies for its operation, it becomes …
Edge-assisted and energy-efficient access control for dynamic users group in smart grids
P **ao, S Yang, Z Zhang, H Wang - Peer-to-Peer Networking and …, 2024 - Springer
Smart grids represent a transformative evolution in energy distribution, enabling
bidirectional electricity flow, automation, and real-time data analysis. However, with large …
bidirectional electricity flow, automation, and real-time data analysis. However, with large …
Assessing cyber attacks on local electricity markets using simulation analysis: Impacts and possible mitigations
J Dedrick, KA Perrin, E Sabaghian… - Sustainable Energy, Grids …, 2023 - Elsevier
Improved management of the distribution level of the electric grid could allow faster and
more reliable deployment of renewable energy sources, and greater grid resilience. One …
more reliable deployment of renewable energy sources, and greater grid resilience. One …
AHP-Based network security situation assessment for industrial internet of things
J Yi, L Guo - Electronics, 2023 - mdpi.com
The Industrial Internet of Things (IIoT) is used in various industries to achieve industrial
automation and intelligence. Therefore, it is important to assess the network security …
automation and intelligence. Therefore, it is important to assess the network security …
Beyond botnets: Autonomous Firmware Zombie Attack in industrial control systems
This paper introduces a novel cyberattack vector called the” Autonomous Firmware Zombie
Attack.” Unlike traditional zombie attacks that rely on botnets and direct network control, this …
Attack.” Unlike traditional zombie attacks that rely on botnets and direct network control, this …