A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future
Due to the advancement in communication networks, metering and smart control systems,
as well as the prevalent use of Internet-based structures, new forms of power systems have …
as well as the prevalent use of Internet-based structures, new forms of power systems have …
A survey on attack detection and resilience for connected and automated vehicles: From vehicle dynamics and control perspective
Recent advances in attack/anomaly detection and resilience strategies for connected and
automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective …
automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective …
Design, modeling and implementation of digital twins
M Segovia, J Garcia-Alfaro - Sensors, 2022 - mdpi.com
A Digital Twin (DT) is a set of computer-generated models that map a physical object into a
virtual space. Both physical and virtual elements exchange information to monitor, simulate …
virtual space. Both physical and virtual elements exchange information to monitor, simulate …
Distributed resilient secondary control for DC microgrids against heterogeneous communication delays and DoS attacks
In this article, a cooperative resilient control method for dc microgrid (MG) is proposed to
dispel the adverse influences of both communication delays and denial-of-service (DoS) …
dispel the adverse influences of both communication delays and denial-of-service (DoS) …
Distributed resilient control for energy storage systems in cyber–physical microgrids
As a cyber-physical system (CPS), the security of microgrids (MGs) is threatened by
unknown faults and cyberattacks. Most existing distributed control methods for MGs are …
unknown faults and cyberattacks. Most existing distributed control methods for MGs are …
[HTML][HTML] Dependable intrusion detection system using deep convolutional neural network: A novel framework and performance evaluation approach
Intrusion detection systems (IDS) play a critical role in safeguarding computer networks
against unauthorized access and malicious activities. However, traditional IDS approaches …
against unauthorized access and malicious activities. However, traditional IDS approaches …
A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems
Power systems are complex systems that have great importance to socio-economic
development due to the fact that the entire world relies on the electric network power supply …
development due to the fact that the entire world relies on the electric network power supply …
On the control of microgrids against cyber-attacks: A review of methods and applications
Nowadays, the use of renewable generations, energy storage systems (ESSs) and
microgrids (MGs) has been developed due to better controllability of distributed energy …
microgrids (MGs) has been developed due to better controllability of distributed energy …
Secure nonlinear fusion estimation for cyber–physical systems under FDI attacks
This paper aims to study the problem of multi-sensor fusion estimation for nonlinear cyber–
physical systems, where sensor measurements may be tampered with by false data injection …
physical systems, where sensor measurements may be tampered with by false data injection …
Distributed resilient optimal current sharing control for an islanded DC microgrid under DoS attacks
For DC microgrids (MGs), cyber attacks of distributed secondary control system result in
communication faults and thus, cause serious stability and cyber-security issues. In this …
communication faults and thus, cause serious stability and cyber-security issues. In this …