Machine learning in cybersecurity: A review of threat detection and defense mechanisms

UI Okoli, OC Obi, AO Adewusi… - World Journal of Advanced …, 2024 - wjarr.co.in
The cybersecurity concerns get increasingly intricate as the digital world progresses. In light
of the increasing complexity of cyber threats, it is imperative to develop and implement …

Cybersecurity and forensics in connected autonomous vehicles: A review of the state-of-the-art

P Sharma, J Gillanders - IEEe Access, 2022 - ieeexplore.ieee.org
Connected Autonomous Vehicles (CAVs) are transformational technologies that have
demonstrated significant potential for sha** the future of transportation systems. CAV …

A secure federated learning framework for residential short-term load forecasting

MA Husnoo, A Anwar, N Hosseinzadeh… - … on Smart Grid, 2023 - ieeexplore.ieee.org
Smart meter measurements, though critical for accurate demand forecasting, face several
drawbacks including consumers' privacy, data breach issues, to name a few. Recent …

Digital transformation of microgrids: a review of design, operation, optimization, and cybersecurity

E Irmak, E Kabalci, Y Kabalci - Energies, 2023 - mdpi.com
This paper provides a comprehensive review of the future digitalization of microgrids to meet
the increasing energy demand. It begins with an overview of the background of microgrids …

Data poisoning attacks in intelligent transportation systems: A survey

F Wang, X Wang, XJ Ban - Transportation Research Part C: Emerging …, 2024 - Elsevier
Emerging technologies drive the ongoing transformation of Intelligent Transportation
Systems (ITS). This transformation has given rise to cybersecurity concerns, among which …

Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methods

S Asefi, M Mitrovic, D Ćetenović, V Levi… - … Energy, Grids and …, 2023 - Elsevier
Power system state estimation is being faced with different types of anomalies. These might
include bad data caused by gross measurement errors or communication system failures …

Data poisoning attacks on traffic state estimation and prediction

F Wang, X Wang, Y Hong, RT Rockafellar… - … Research Part C …, 2024 - Elsevier
Data has become ubiquitous nowadays in transportation, including vehicular data and
infrastructure-generated data. The growing reliance on data poses potential cybersecurity …

[HTML][HTML] Synthetic energy data generation using time variant generative adversarial network

S Asre, A Anwar - Electronics, 2022 - mdpi.com
Energy consumption data is being used for improving the energy efficiency and minimizing
the cost. However, obtaining energy consumption data has two major challenges:(i) data …

Future smart grids creation and dimensionality reduction with signal handling on smart grid using targeted projection

MM Jaber, MH Ali, CB Sivaparthipan, RR Asaad… - … Informatics and Systems, 2023 - Elsevier
A smart grid is a develo** electrical network of transmission lines, switches, transformers,
protection equipment, sensors, and information technologies working together and are the …

[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data

Z Chang, J Wu, H Liang, Y Wang, Y Wang, X **ong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …