Blockchain technology on smart grid, energy trading, and big data: security issues, challenges, and recommendations
The smart grid idea was implemented as a modern interpretation of the traditional power
grid to find out the most efficient way to combine renewable energy and storage …
grid to find out the most efficient way to combine renewable energy and storage …
A review of internet of energy based building energy management systems: Issues and recommendations
A building energy management system (BEMS) is a sophisticated method used for
monitoring and controlling a building's energy requirements. A number of potential studies …
monitoring and controlling a building's energy requirements. A number of potential studies …
Cyber-security on smart grid: Threats and potential solutions
The smart grid is one of the most significant applications of the Internet of Things (IoT). As
information and communication technologies (ICT) developed and applied in traditional …
information and communication technologies (ICT) developed and applied in traditional …
Cyber-security in smart grid: Survey and challenges
Smart grid uses the power of information technology to intelligently deliver energy by using a
two-way communication and wisely meet the environmental requirements by facilitating the …
two-way communication and wisely meet the environmental requirements by facilitating the …
Architecture and security of SCADA systems: A review
Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, the nuclear
reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU–these …
reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU–these …
Joint detection and mitigation of false data injection attacks in AGC systems
The ability to maintain the system frequency within specified operating limits is crucial for the
stability and proper operation of power systems. Any small deviation out of the permissible …
stability and proper operation of power systems. Any small deviation out of the permissible …
Detection of false data injection attacks in smart grids using recurrent neural networks
False Data Injection (FDI) attacks create serious security challenges to the operation of
power systems, especially when they are carefully constructed to bypass conventional state …
power systems, especially when they are carefully constructed to bypass conventional state …
Optimal scheduling of demand side load management of smart grid considering energy efficiency
The purpose of this research is to provide power grid energy efficiency solutions. In this
paper, a comprehensive review and its optimal solution is proposed considering the various …
paper, a comprehensive review and its optimal solution is proposed considering the various …
Analysis of cyber-attacks on smart grid applications
Cyber-security is the whole process of preventing damage to the confidentiality, integrity,
and availability of information assets as a result of the use of vulnerabilities in information …
and availability of information assets as a result of the use of vulnerabilities in information …
[BOOK][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …