Cyber-physical power systems: A comprehensive review about technologies drivers, standards, and future perspectives
MS Alvarez-Alvarado, C Apolo-Tinoco… - Computers and …, 2024 - Elsevier
The evolution of power systems into Cyber Physical Power Systems (CPPS), characterized
by the integration of information and communication technologies with traditional electrical …
by the integration of information and communication technologies with traditional electrical …
Application of machine learning and deep learning in cybersecurity: An innovative approach
D Kaushik, M Garg, A Gupta… - … Approach to Modern …, 2022 - taylorfrancis.com
Machine learning (ML) and deep learning (DL) both drawn unparalleled community interest
recently. With a growing convergence of online activities and digital life, the way people …
recently. With a growing convergence of online activities and digital life, the way people …
Framework and modelling of inclusive manufacturing system
The world has seen tremendous changes in manufacturing, since its first industrial
revolution to the current era of Industry 4.0. In the past few years, numerous advanced …
revolution to the current era of Industry 4.0. In the past few years, numerous advanced …
[PDF][PDF] Cloud Computing Threats, Vulnerabilities and Countermeasures: A State-of-the-Art.
SS Pericherla - ISeCure, 2023 - sid.ir
Cloud computing created a revolution in the way IT organizations and IT teams manage their
internal digital resources and workloads. One major drawback or limitation of cloud …
internal digital resources and workloads. One major drawback or limitation of cloud …
Data security and privacy, cyber-security enhancement, and systems recovery approaches for microgrid networks
Microgrids increase the feasibility of distributed renewable energy generation through
intelligent power flow optimization, which has significant economic and ecological benefits …
intelligent power flow optimization, which has significant economic and ecological benefits …
An attack analysis framework for LoRaWAN applied advanced manufacturing
MMR Monjur, J Heacock, R Sun… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Advanced manufacturing is transitioning into automated production, which enables the
remote system monitoring, increases the online system configuration, and thus reduces the …
remote system monitoring, increases the online system configuration, and thus reduces the …
Cybersecurity as a centralized directed system of systems using SoS explorer as a tool
The vast advancements in computing technology and the profound reliance on inter-
connected systems has led to a significant growth of cyber-attack incidents. The incidents …
connected systems has led to a significant growth of cyber-attack incidents. The incidents …
Cybersecurity in the electricity sector
R Leszczyna - Managing Critical Infrastructure; Springer: Gdansk …, 2019 - Springer
We are witnessing the transformation of the electricity sector into its new, enhanced
incarnation associated with the concepts of the smart grid or the Internet of Energy. The …
incarnation associated with the concepts of the smart grid or the Internet of Energy. The …
Multi-stage intrusion detection system aided by grey wolf optimization algorithm
Abstract A Network Intrusion Detection System (NIDS) is frequently used for monitoring and
detecting malicious activities in network traffic. A typical NIDS has four stages: a data source …
detecting malicious activities in network traffic. A typical NIDS has four stages: a data source …
A Survey on Firewall for cloud security with Anomaly detection in Firewall Policy
D Hakani - … Conference on Artificial Intelligence and Smart …, 2023 - ieeexplore.ieee.org
Due to the explosive growth of internet, the security related issues are also increased.
Firewall is a core element of network security. A firewall is a series of sequential filtering …
Firewall is a core element of network security. A firewall is a series of sequential filtering …