Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning-based intrusion detection for smart grid computing: A survey
Machine learning (ML)-based intrusion detection system (IDS) approaches have been
significantly applied and advanced the state-of-the-art system security and defense …
significantly applied and advanced the state-of-the-art system security and defense …
A survey of intrusion detection systems in smart grid
Smart grid has emerged as an option-loaded, efficient replacement of the out-of-date power
grid infrastructure. However, with the introduction of smart grid systems and the many …
grid infrastructure. However, with the introduction of smart grid systems and the many …
Empirical study of PLC authentication protocols in industrial control systems
Programmable logic controllers (PLCs) run a 'control logic'program that defines how to
control a physical process such as a nuclear plant, power grid stations, and gas pipelines …
control a physical process such as a nuclear plant, power grid stations, and gas pipelines …
[HTML][HTML] JTAG-based PLC memory acquisition framework for industrial control systems
In industrial control systems (ICS), programmable logic controllers (PLC) are the embedded
devices that directly control and monitor critical industrial infrastructure processes such as …
devices that directly control and monitor critical industrial infrastructure processes such as …
[HTML][HTML] PEM: Remote forensic acquisition of PLC memory in industrial control systems
Programmable logic controllers (PLC) are special-purpose embedded devices used in
various industries for automatic control of physical processes. Cyberattacks on PLCs can …
various industries for automatic control of physical processes. Cyberattacks on PLCs can …
A fog-edge-enabled intrusion detection system for smart grids
Abstract The Smart Grid (SG) heavily depends on the Advanced Metering Infrastructure
(AMI) technology, which has shown its vulnerability to intrusions. To effectively monitor and …
(AMI) technology, which has shown its vulnerability to intrusions. To effectively monitor and …
A nifty collaborative intrusion detection and prevention architecture for smart grid ecosystems
Smart Grid (SG) systems are critical, intelligent infrastructure utility services connected
through open networks that are potentially susceptible to cyber-attacks with very acute …
through open networks that are potentially susceptible to cyber-attacks with very acute …
Distributed denial of service attacks and defense mechanisms: current landscape and future directions
Societal dependence on Information and Communication Technology (ICT) over the past
two decades has brought with it an increased vulnerability to a large variety of cyber-attacks …
two decades has brought with it an increased vulnerability to a large variety of cyber-attacks …
Securing advanced metering infrastructure using intrusion detection system with data stream mining
Advanced metering infrastructure (AMI) is an imperative component of the smart grid, as it is
responsible for collecting, measuring, analyzing energy usage data, and transmitting these …
responsible for collecting, measuring, analyzing energy usage data, and transmitting these …
[HTML][HTML] Control logic forensics framework using built-in decompiler of engineering software in industrial control systems
In industrial control systems (ICS), attackers inject malicious control-logic into programmable
logic controllers (PLCs) to sabotage physical processes, such as nuclear plants, traffic-light …
logic controllers (PLCs) to sabotage physical processes, such as nuclear plants, traffic-light …