Security attacks on smart grid scheduling and their defences: a game-theoretic approach

M Pilz, FB Naeini, K Grammont, C Smagghe… - International Journal of …, 2020 - Springer
The introduction of advanced communication infrastructure into the power grid raises a
plethora of new opportunities to tackle climate change. This paper is concerned with the …

Dynamic risk-aware patch scheduling

F Zhang, Q Li - 2020 IEEE Conference on Communications …, 2020 - ieeexplore.ieee.org
Every month, many new software vulnerabilities are discovered and published which will
pose security risks to power grid systems if they are exploited by attackers. Thus the …

Neural network and blockchain based technique for cyber threat intelligence and situational awareness

R Graf, R King - 2018 10th International Conference on Cyber …, 2018 - ieeexplore.ieee.org
Protecting Critical Infrastructure (CI) against increasing cyber threats has become as crucial
as it is complicated. To be effective in identifying and defeating cyber attacks, cyber analysts …

A cybercrime incident architecture with adaptive response policy

G Tsakalidis, K Vergidis, S Petridou… - Computers & Security, 2019 - Elsevier
Handling and mitigating the cybercrime incidents (CIs) have attracted significant research
attention, over the last years, due to their increasing frequency of occurrence. However, the …

Tripartite Accounting Framework: A Novel Blockchain-Based Model for Recording B2B Transactions

MI Sarwar, I Khan, LA Maghrabi, A Jaffar… - IEEE Access, 2024 - ieeexplore.ieee.org
As FinTech emerges and the design and delivery of financial services evolve AIS
(Accounting Information System) needs to evaluate their underlying accounting principles to …

PatchRank: Ordering updates for SCADA systems

G Yadav, K Paul - 2019 24th IEEE International Conference on …, 2019 - ieeexplore.ieee.org
Securing SCADA is a challenging task for the research community as well as the industry.
SCADA networks form the basis of industrial productivity. Industry 4.0 is likely to see more …

Risk mitigation in electric power systems: Where to start?

A Alshawish, H de Meer - Energy Informatics, 2019 - Springer
Power grids are becoming increasingly intelligent. In this regard, they benefit considerably
from the information technology (IT) networks coupled with their underlying operational …

Finding Optimal Moving Target Defense Strategies: A Resilience Booster for Connected Cars

M Ayrault, U Kühne, É Borde - Information, 2022 - mdpi.com
During their life-cycle, modern connected cars will have to face various and changing
security threats. As for any critical embedded system, security fixes in the form of software …

Smart Grid and Blockchain Technology for Community-Based P2P Renewable Energy Trading

MI Sarwar, LA Maghrabi - 2023 2nd International Engineering …, 2023 - ieeexplore.ieee.org
Current electric grids were designed a century ago for simple and limited needs. An electric
grid helps the power generation company (PGC) supply electricity to homes and industrial …

A novel approach to classify vulnerabilities based on authenticated measurements

G El-Hajal, R Abi Zeid Daou, Y Ducq - IT Convergence and Security …, 2021 - Springer
Cyber incidents occur on a regular basis. Moreover the COVID-19 pandemic pushed most
enterprises on the path of digital transformation thus expanding the attack surface for cyber …