Cyber-physical power systems: A comprehensive review about technologies drivers, standards, and future perspectives

MS Alvarez-Alvarado, C Apolo-Tinoco… - Computers and …, 2024 - Elsevier
The evolution of power systems into Cyber Physical Power Systems (CPPS), characterized
by the integration of information and communication technologies with traditional electrical …

Application of machine learning and deep learning in cybersecurity: An innovative approach

D Kaushik, M Garg, A Gupta… - … Approach to Modern …, 2022 - taylorfrancis.com
Machine learning (ML) and deep learning (DL) both drawn unparalleled community interest
recently. With a growing convergence of online activities and digital life, the way people …

Framework and modelling of inclusive manufacturing system

S Singh, B Mahanty, MK Tiwari - International Journal of Computer …, 2019 - Taylor & Francis
The world has seen tremendous changes in manufacturing, since its first industrial
revolution to the current era of Industry 4.0. In the past few years, numerous advanced …

[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.

SS Pericherla - ISeCure, 2023 - sid.ir
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …

Data security and privacy, cyber-security enhancement, and systems recovery approaches for microgrid networks

NR Naraindath, HA Kupolati, RC Bansal… - Modeling and Control …, 2024 - Elsevier
Microgrids increase the feasibility of distributed renewable energy generation through
intelligent power flow optimization, which has significant economic and ecological benefits …

An attack analysis framework for LoRaWAN applied advanced manufacturing

MMR Monjur, J Heacock, R Sun… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Advanced manufacturing is transitioning into automated production, which enables the
remote system monitoring, increases the online system configuration, and thus reduces the …

Cybersecurity as a centralized directed system of systems using SoS explorer as a tool

L Ashiku, C Dagli - 2019 14th Annual Conference System of …, 2019 - ieeexplore.ieee.org
The vast advancements in computing technology and the profound reliance on inter-
connected systems has led to a significant growth of cyber-attack incidents. The incidents …

Cybersecurity in the electricity sector

R Leszczyna - Managing Critical Infrastructure; Springer: Gdansk …, 2019 - Springer
We are witnessing the transformation of the electricity sector into its new, enhanced
incarnation associated with the concepts of the smart grid or the Internet of Energy. The …

Multi-stage intrusion detection system aided by grey wolf optimization algorithm

S Chatterjee, V Shaw, R Das - Cluster Computing, 2024 - Springer
Abstract A Network Intrusion Detection System (NIDS) is frequently used for monitoring and
detecting malicious activities in network traffic. A typical NIDS has four stages: a data source …

A Survey on Firewall for cloud security with Anomaly detection in Firewall Policy

D Hakani - … Conference on Artificial Intelligence and Smart …, 2023 - ieeexplore.ieee.org
Due to the explosive growth of internet, the security related issues are also increased.
Firewall is a core element of network security. A firewall is a series of sequential filtering …