Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Machine learning in cybersecurity: A review of threat detection and defense mechanisms
UI Okoli, OC Obi, AO Adewusi… - World Journal of Advanced …, 2024 - wjarr.co.in
The cybersecurity concerns get increasingly intricate as the digital world progresses. In light
of the increasing complexity of cyber threats, it is imperative to develop and implement …
of the increasing complexity of cyber threats, it is imperative to develop and implement …
Cybersecurity and forensics in connected autonomous vehicles: A review of the state-of-the-art
P Sharma, J Gillanders - IEEe Access, 2022 - ieeexplore.ieee.org
Connected Autonomous Vehicles (CAVs) are transformational technologies that have
demonstrated significant potential for sha** the future of transportation systems. CAV …
demonstrated significant potential for sha** the future of transportation systems. CAV …
A secure federated learning framework for residential short-term load forecasting
Smart meter measurements, though critical for accurate demand forecasting, face several
drawbacks including consumers' privacy, data breach issues, to name a few. Recent …
drawbacks including consumers' privacy, data breach issues, to name a few. Recent …
Digital transformation of microgrids: a review of design, operation, optimization, and cybersecurity
This paper provides a comprehensive review of the future digitalization of microgrids to meet
the increasing energy demand. It begins with an overview of the background of microgrids …
the increasing energy demand. It begins with an overview of the background of microgrids …
Data poisoning attacks in intelligent transportation systems: A survey
Emerging technologies drive the ongoing transformation of Intelligent Transportation
Systems (ITS). This transformation has given rise to cybersecurity concerns, among which …
Systems (ITS). This transformation has given rise to cybersecurity concerns, among which …
Anomaly detection and classification in power system state estimation: Combining model-based and data-driven methods
Power system state estimation is being faced with different types of anomalies. These might
include bad data caused by gross measurement errors or communication system failures …
include bad data caused by gross measurement errors or communication system failures …
Data poisoning attacks on traffic state estimation and prediction
Data has become ubiquitous nowadays in transportation, including vehicular data and
infrastructure-generated data. The growing reliance on data poses potential cybersecurity …
infrastructure-generated data. The growing reliance on data poses potential cybersecurity …
[HTML][HTML] Synthetic energy data generation using time variant generative adversarial network
S Asre, A Anwar - Electronics, 2022 - mdpi.com
Energy consumption data is being used for improving the energy efficiency and minimizing
the cost. However, obtaining energy consumption data has two major challenges:(i) data …
the cost. However, obtaining energy consumption data has two major challenges:(i) data …
Future smart grids creation and dimensionality reduction with signal handling on smart grid using targeted projection
A smart grid is a develo** electrical network of transmission lines, switches, transformers,
protection equipment, sensors, and information technologies working together and are the …
protection equipment, sensors, and information technologies working together and are the …
[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data
Z Chang, J Wu, H Liang, Y Wang, Y Wang, X **ong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …
management of power systems, complex and covert false data attacks pose a serious threat …