Machine learning applications in the resilience of interdependent critical infrastructure systems—A systematic literature review

BA Alkhaleel - International Journal of Critical Infrastructure Protection, 2024 - Elsevier
The resilience of interdependent critical infrastructure systems (ICISs) is critical for the
functioning of society and the economy. ICISs such as power grids and telecommunication …

Cyber-physical power systems: A comprehensive review about technologies drivers, standards, and future perspectives

MS Alvarez-Alvarado, C Apolo-Tinoco… - Computers and …, 2024 - Elsevier
The evolution of power systems into Cyber Physical Power Systems (CPPS), characterized
by the integration of information and communication technologies with traditional electrical …

[HTML][HTML] Augmenting Zero Trust Network Architecture to enhance security in virtual power plants

A Alagappan, SK Venkatachary, LJB Andrews - Energy Reports, 2022 - Elsevier
Abstract Zero Trust Network Architecture implementation is gaining popularity in the ICT
sector to defend and deter cyber threats or cyber crime. Considering the architecture's …

Fifty years of scholarly research on terrorism: Intellectual progression, structural composition, trends and knowledge gaps of the field

M Haghani, E Kuligowski, A Rajabifard… - International Journal of …, 2022 - Elsevier
Scholarly literature on terrorism is analysed in its full scope with three main goals:(i) to
objectively determine the structural makeup of the field,(ii) to document its current and past …

A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid

J Lázaro, A Astarloa, M Rodríguez, U Bidarte… - Electronics, 2021 - mdpi.com
Since the 1990s, the digitalization process has transformed the communication infrastructure
within the electrical grid: proprietary infrastructures and protocols have been replaced by the …

XGBoost regression classifier (XRC) model for cyber attack detection and classification using inception V4

KMK Raghunath, VV Kumar… - Journal of Web …, 2022 - ieeexplore.ieee.org
Massive reliance on practical systems has resulted in several security concerns. The ability
to identify anomalies is a critical safety feature enabled by anomaly diagnostic techniques …

Review of cybersecurity research topics, taxonomy and challenges: Interdisciplinary perspective

H Suryotrisongko, Y Musashi - 2019 IEEE 12th conference on …, 2019 - ieeexplore.ieee.org
As cybersecurity is a growing field of science, there is not complete agreement across the
scope of cybersecurity research topics. This paper proposes a grouping and classifications …

Cybersecurity Risks Quantification in the Internet of Things

A Alagappan, LJB Andrews, RA Raj… - 2022 IEEE 7th …, 2022 - ieeexplore.ieee.org
A dynamic platform, the Internet of Things uses data, which in turn invites cybersecurity risks.
In a dynamic and complicated world, many organisations are putting more of their attention …

Eleven years of cyberattacks on Chinese supply chains in an era of cyber warfare, a review and future research agenda

J Pérez-Morón - Journal of Asia Business Studies, 2022 - emerald.com
Purpose The contribution of this study aims to twofold: First, it provides an overview of the
current state of research on cyberattacks on Chinese supply chains (SCs). Second, it offers a …

A fixed-latency architecture to secure GOOSE and sampled value messages in substation systems

M Rodríguez, J Lázaro, U Bidarte, J Jiménez… - IEEE …, 2021 - ieeexplore.ieee.org
International Electrotechnical Commission (IEC) 62351-6 standard specifies the security
mechanisms to protect real-time communications based on IEC 61850. Generic Object …