Digital transformation and cybersecurity challenges for businesses resilience: Issues and recommendations
S Saeed, SA Altamimi, NA Alkayyal, E Alshehri… - Sensors, 2023 - mdpi.com
This systematic literature review explores the digital transformation (DT) and cybersecurity
implications for achieving business resilience. DT involves transitioning organizational …
implications for achieving business resilience. DT involves transitioning organizational …
Smart substation communications and cybersecurity: A comprehensive survey
Electrical grids generate, transport, distribute and deliver electrical power to consumers
through a complex Critical Infrastructure which progressively shifted from an air-gaped to a …
through a complex Critical Infrastructure which progressively shifted from an air-gaped to a …
[HTML][HTML] Anomaly detection for space information networks: A survey of challenges, techniques, and future directions
Abstract Space anomaly detection plays a critical role in safeguarding the integrity and
reliability of space systems amid the rising tide of threats. This survey aims to deepen …
reliability of space systems amid the rising tide of threats. This survey aims to deepen …
Anomaly and intrusion detection using deep learning for software-defined networks: A survey
Abstract Software-Defined Networks (SDN) represent an adaptable paradigm for dealing
with network users' dynamic demands. Confidentiality, integrity, and availability are …
with network users' dynamic demands. Confidentiality, integrity, and availability are …
A blockchain consensus mechanism for real-time regulation of renewable energy power systems
Y Yu, GP Liu, Y Huang, CY Chung, YZ Li - Nature Communications, 2024 - nature.com
With the ongoing development of renewable energy sources, information technologies and
physical energy systems are further integrated, which leads to challenges in ensuring the …
physical energy systems are further integrated, which leads to challenges in ensuring the …
Enhancing cybersecurity in the internet of things environment using bald eagle search optimization with hybrid deep learning
Nowadays, the Internet of Things (IoT) has become a rapid development; it can be employed
by cyber threats in IoT devices. A correct system to recognize malicious attacks at IoT …
by cyber threats in IoT devices. A correct system to recognize malicious attacks at IoT …
Detecting the cyber-physical-social cooperated APTs in high-DER-penetrated smart grids: Threats, current work and challenges
Q Lu, Z Peng, L Wu, M Ni, J Luo - Computer Networks, 2024 - Elsevier
Large-scale renewable distributed energy sources (DERs) penetrating into smart grids
(SGs) is an inevitable trend. Such high-DER-penetrated SGs entail heavy reliance on …
(SGs) is an inevitable trend. Such high-DER-penetrated SGs entail heavy reliance on …
Spatio-temporal advanced persistent threat detection and correlation for cyber-physical power systems using enhanced gc-lstm
Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015, 2016, and
2022. These cyber attacks are classified as Advanced Persistent Threats (APTs) with …
2022. These cyber attacks are classified as Advanced Persistent Threats (APTs) with …
Spatiotemporal deep learning for power system applications: a survey
Understanding spatiotemporal correlations in power systems is crucial for maintaining grid
stability, reliability, and efficiency. By discerning connections between spatial and temporal …
stability, reliability, and efficiency. By discerning connections between spatial and temporal …
Unsupervised learning for efficiently distributing EVs charging loads and traffic flows in coupled power and transportation systems
With the escalating adoption of electric vehicles (EVs), the intricate interplay between power
and traffic systems becomes increasingly pronounced. Understanding the distribution of …
and traffic systems becomes increasingly pronounced. Understanding the distribution of …