Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Cybersecurity in power grids: Challenges and opportunities
Increasing volatilities within power transmission and distribution force power grid operators
to amplify their use of communication infrastructure to monitor and control their grid. The …
to amplify their use of communication infrastructure to monitor and control their grid. The …
Machine learning-based intrusion detection for smart grid computing: A survey
Machine learning (ML)-based intrusion detection system (IDS) approaches have been
significantly applied and advanced the state-of-the-art system security and defense …
significantly applied and advanced the state-of-the-art system security and defense …
Unsupervised machine learning-based detection of covert data integrity assault in smart grid networks utilizing isolation forest
Being one of the most multifaceted cyber-physical systems, smart grids (SGs) are arguably
more prone to cyber-threats. A covert data integrity assault (CDIA) on a communications …
more prone to cyber-threats. A covert data integrity assault (CDIA) on a communications …
Cyber attacks on power grids: Causes and propagation of cascading failures
Cascading effects in the power grid involve an uncontrolled, successive failure of elements.
The root cause of such failures is the combined occurrence of multiple, statistically rare …
The root cause of such failures is the combined occurrence of multiple, statistically rare …
Cloud manufacturing as a sustainable process manufacturing route
Cloud Manufacturing (CM) is a service oriented business model to share manufacturing
capabilities and resources on a cloud platform. Manufacturing is under pressure to achieve …
capabilities and resources on a cloud platform. Manufacturing is under pressure to achieve …
Detecting false data injection attacks in AC state estimation
G Chaojun, P Jirutitijaroen… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Estimating power system states accurately is crucial to the reliable operation of power grids.
Traditional weighted least square (WLS) state estimation methods face the rising threat of …
Traditional weighted least square (WLS) state estimation methods face the rising threat of …
Cyber-physical systems security: a systematic map** study
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …
Power system reliability evaluation with SCADA cybersecurity considerations
As information and communication networks are highly interconnected with the power grid,
cyber security of the supervisory control and data acquisition (SCADA) system has become …
cyber security of the supervisory control and data acquisition (SCADA) system has become …
Integrated anomaly detection for cyber security of the substations
Cyber intrusions to substations of a power grid are a source of vulnerability since most
substations are unmanned and with limited protection of the physical security. In the worst …
substations are unmanned and with limited protection of the physical security. In the worst …
A tri-level optimization model to mitigate coordinated attacks on electric power systems in a cyber-physical environment
The electric power system is facing greater threats each year due to malicious attacks. In the
recent decade, multiple attacks on both physical and cyber layers of the power system …
recent decade, multiple attacks on both physical and cyber layers of the power system …