A survey of protocol-level challenges and solutions for distributed energy resource cyber-physical security

A Sundararajan, A Chavan, D Saleem, AI Sarwat - Energies, 2018 - mdpi.com
The increasing proliferation of distributed energy resources (DERs) on the smart grid has
made distributed solar and wind two key contributors to the expanding attack surface of the …

A multidimensional holistic framework for the security of distributed energy and control systems

D Saleem, A Sundararajan, A Sanghvi… - IEEE Systems …, 2019 - ieeexplore.ieee.org
The digitization of smart grid distributed generation and industrial control systems has
prompted utilities to deploy tools with ubiquitous communications that potentially widen the …

Defense in Depth: Multilayer of security

R Alsaqour, A Majrashi, M Alreedi… - International …, 2021 - search.proquest.com
Many types and methodologies of attacks have been developed to target the victims in
different ways affecting their resources and assets. This paper reviews the defense in depth …

[PDF][PDF] Speech encryption by multiple chaotic maps with fast fourier transform

Y Alemami, MA Mohamed, S Atiewi… - International Journal of …, 2020 - researchgate.net
There are various ways of social communication including writing (WhatsApp, Messenger,
Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your …

[KİTAP][B] Modeling and simulation of cyberattacks to aid systems security engineers and cyber-physical designs to aid systems engineers

CD Colvett - 2023 - search.proquest.com
The advent of the Internet has led to an ever-increasingly interconnected world. The range of
cyber-physical systems being interconnected has expanded to include power generation …

Advance persistent threat defense techniques: A review

MA SIDDIQI, A MUGHERI, K OAD - 2016 - repository.pastic.gov.pk
The evolution of internet in the age of information is very rapid. With the rapid development
of the internet, significance of privacy and security is also becoming a key concern. This …

[KİTAP][B] Addressing issues with defense-in-depth, apts, and iot with active cyber defense cycle and cyber resilience

S Orme - 2019 - search.proquest.com
Defense-in-Depth practices are failing as a result of the significant changes brought by
advanced persistent threats (APTs) and globally scaled networks utilized by the internet of …

Securing the Cloud: An Analysis of Cloud Migration Challenges

D Celeste - 2020 - search.proquest.com
The evolution of attack tactics, techniques, and procedures that enable the compromise of
enterprise networks has been a driving factor in the ongoing development of cyber-defense …

Defense in Depth: The Basics of Blockade and Delay

AJ Lohn - arxiv preprint arxiv:1910.00111, 2019 - arxiv.org
Given that individual defenses are rarely sufficient, defense-in-depth is nearly universal and
options for individual defensive layers abound. We develop a simple mathematical theory …

Data Analytics and Machine Learning to Enhance the Operational Visibility and Situation Awareness of Smart Grid High Penetration Photovoltaic Systems

A Sundararajan - 2019 - digitalcommons.fiu.edu
Electric utilities have limited operational visibility and situation awareness over grid-tied
distributed photovoltaic systems (PV). This will pose a risk to grid stability when the PV …