[HTML][HTML] A systematic review of data fusion techniques for optimized structural health monitoring
Advancements in structural health monitoring (SHM) techniques have spiked in the past few
decades due to the rapid evolution of novel sensing and data transfer technologies. This …
decades due to the rapid evolution of novel sensing and data transfer technologies. This …
Vulnerability analysis of demand-response with renewable energy integration in smart grids to cyber attacks and online detection methods
The two-way information exchange between customers and the utility in smart grids enables
demand-response programs of customers and the integration of distributed renewable …
demand-response programs of customers and the integration of distributed renewable …
[HTML][HTML] Cyber-secure energy and flexibility scheduling of interconnected local energy networks with introducing an XGBoost-assisted false data detection and …
The growing penetration of renewable energy resources (RERs) and the ever-increasing
implementation of information and communication technologies in smart grids necessitate …
implementation of information and communication technologies in smart grids necessitate …
[HTML][HTML] FedDiSC: A computation-efficient federated learning framework for power systems disturbance and cyber attack discrimination
With the growing concern about the security and privacy of smart grid systems, cyberattacks
on critical power grid components, such as state estimation, have proven to be one of the top …
on critical power grid components, such as state estimation, have proven to be one of the top …
A Review of Cybersecurity Challenges in Smart Power Transformers
In the evolving landscape of critical infrastructure security, the increasing sophistication of
cyber threats poses challenges, particularly to the power grid's new technology …
cyber threats poses challenges, particularly to the power grid's new technology …
Possibilistic–Probabilistic Risk-Based Smart Energy Hub scheduling considering cyber security in advanced metering infrastructures
Future energy systems will be more efficient because of the energy transition of which,
decarbonization, decentralization, and digitalization are important aspects. In addition, cyber …
decarbonization, decentralization, and digitalization are important aspects. In addition, cyber …
Cybersecurity challenges of power transformers
The rise of cyber threats on critical infrastructure and its potential for devastating
consequences, has significantly increased. The dependency of new power grid technology …
consequences, has significantly increased. The dependency of new power grid technology …
Metaheuristics based dimensionality reduction with deep learning driven false data injection attack detection for enhanced network security
Recent sensor, communication, and computing technological advancements facilitate smart
grid use. The heavy reliance on developed data and communication technology increases …
grid use. The heavy reliance on developed data and communication technology increases …
A novel adversarial FDI attack and defense mechanism for Smart Grid demand-response mechanisms
G Zhang, B Sikdar - IEEE Transactions on Industrial Cyber …, 2024 - ieeexplore.ieee.org
This article focuses on enhancing the cybersecurity of cyber-physical systems, with a
particular emphasis on the False Data Injection (FDI) attack within the Demand Response …
particular emphasis on the False Data Injection (FDI) attack within the Demand Response …
Adversarial machine learning against false data injection attack detection for smart grid demand response
Z Guihai, B Sikdar - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
Distributed demand response (DR) is used in smart grids to allow utilities to balance the
power supply with the demand by modulating the consumer's behavior by varying the price …
power supply with the demand by modulating the consumer's behavior by varying the price …