Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Microgrid cyber-security: Review and challenges toward resilience
The importance of looking into microgrid security is getting more crucial due to the cyber
vulnerabilities introduced by digitalization and the increasing dependency on information …
vulnerabilities introduced by digitalization and the increasing dependency on information …
[HTML][HTML] Cyberattacks in smart grids: challenges and solving the multi-criteria decision-making for cybersecurity options, including ones that incorporate artificial …
AA Bouramdane - Journal of Cybersecurity and Privacy, 2023 - mdpi.com
Smart grids have emerged as a transformative technology in the power sector, enabling
efficient energy management. However, the increased reliance on digital technologies also …
efficient energy management. However, the increased reliance on digital technologies also …
Distributed screening of hijacking attacks in DC microgrids
It is well-known that distributed control can improve the resiliency of dc microgrids against
multiple link failures as compared to centralized control. However, the control layer is still …
multiple link failures as compared to centralized control. However, the control layer is still …
[HTML][HTML] On the assessment of cyber risks and attack surfaces in a real-time co-simulation cybersecurity testbed for inverter-based microgrids
The integration of variable distributed generations (DGs) and loads in microgrids (MGs) has
made the reliance on communication systems inevitable for information exchange in both …
made the reliance on communication systems inevitable for information exchange in both …
Intrusion detection and mitigation of attacks in microgrid using enhanced deep belief network
D Durairaj, TK Venkatasamy… - Energy Sources, Part …, 2024 - Taylor & Francis
The convergence from the electric grid to the smart microgrid motivates the incorporation of
the intrusion detection system to identify intruders and mitigate the resultant damages to …
the intrusion detection system to identify intruders and mitigate the resultant damages to …
Challenges and peculiarities of attack detection in virtual power plants: Towards an advanced persistent threat detection system
R Buchta, F Heine, C Kleiner - 2022 IEEE 29th Annual Software …, 2022 - ieeexplore.ieee.org
Currently, there are no mission-capable systems that can successfully detect advanced
persistent threats (APTs). These types of threats are hazardous in critical infrastructures …
persistent threats (APTs). These types of threats are hazardous in critical infrastructures …
A low latency secure communication architecture for microgrid control
The availability of secure, efficient, and reliable communication systems is critical for the
successful deployment and operations of new power systems such as microgrids. These …
successful deployment and operations of new power systems such as microgrids. These …
Consequence verification during risk assessments of smart grids
D Abraham, Ø Toftegaard, A Gebremedhin… - … Conference on Critical …, 2023 - Springer
The transformation of conventional power grids to smart grids over the past decade has led
to increased exposure to cyber attacks. Understanding the impacts of cyber attacks is …
to increased exposure to cyber attacks. Understanding the impacts of cyber attacks is …
A survey of cyber security in smart microgrid
With the large integration of renewable intermittent energy resources, it became challenging
to control the microgrid especially in the absence of the electric power systems operating as …
to control the microgrid especially in the absence of the electric power systems operating as …
Transient model-based detection scheme for false data injection attacks in microgrids
Centralized controllers are popularly used in Microgrid as it ensures its economic and stable
operation. The measurements taken for such a controller are prone to false data injection …
operation. The measurements taken for such a controller are prone to false data injection …