Smart grid cyber security enhancement: Challenges and solutions—A review

T Alsuwian, A Shahid Butt, AA Amin - Sustainability, 2022 - mdpi.com
The incorporation of communication technology with Smart Grid (SG) is proposed as an
optimal solution to fulfill the requirements of the modern power system. A smart grid …

A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems

S Selvarajan, H Mouratidis - Scientific Reports, 2023 - nature.com
Many researchers have been interested in healthcare cybersecurity for a long time since it
can improve the security of patient and health record data. As a result, a lot of research is …

An innovative perceptual pigeon galvanized optimization (PPGO) based likelihood Naïve Bayes (LNB) classification approach for network intrusion detection system

S Shitharth, PR Kshirsagar, PK Balachandran… - IEEE …, 2022 - ieeexplore.ieee.org
Intrusion detection and classification have gained significant attention recently due to the
increased utilization of networks. For this purpose, there are different types of Network …

Healthcare data security using IoT sensors based on random hashing mechanism

AO Khadidos, S Shitharth, AO Khadidos… - Journal of …, 2022 - Wiley Online Library
Providing security to the healthcare data stored in an IoT‐cloud environment is one of the
most challenging and demanding tasks in recent days. Because the IoT‐cloud framework is …

A Bayesian deep learning approach with convolutional feature engineering to discriminate cyber-physical intrusions in smart grid systems

D Kaur, A Anwar, I Kamwa, S Islam, SM Muyeen… - IEEE …, 2023 - ieeexplore.ieee.org
The emergence of cyber-physical smart grid (CPSG) systems has revolutionized the
traditional power grid by enabling the bidirectional energy flow between consumers and …

[Retracted] Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm

PR Kshirsagar, H Manoharan, HA Alterazi… - Journal of …, 2022 - Wiley Online Library
Cloud services are a popular concept used to describe how internet‐based services are
delivered and maintained. The computer technology environment is being restructured with …

A proficient ZESO-DRKFC model for smart grid SCADA security

OBJ Rabie, PK Balachandran, M Khojah, S Selvarajan - Electronics, 2022 - mdpi.com
Smart grids are complex cyber-physical systems that incorporate smart devices'
communication capabilities into the grid to enable remote management and the control of …

Optimal feature selection based on evolutionary algorithm for intrusion detection

SK Prashanth, S Shitharth, B Praveen Kumar… - SN Computer …, 2022 - Springer
Since the past decades, internet usage has become inevitable due to its tremendous
applications in various fields. Due to this huge usage of network, a lot of security problems …

Integrating industrial appliances for security enhancement in data point using SCADA networks with learning algorithm

AO Khadidos, AO Khadidos… - … on Electrical Energy …, 2022 - Wiley Online Library
The process of ensuring automatic operation for industrial appliances using both
supervision and control techniques is a challenging task. Therefore, this article focuses on …

[HTML][HTML] A single-vendor multi-buyer inventory model with multiple raw material and quality degradation: A case study on agri-food industry

DM Utama, IR Kusuma, I Amallynda, T Baroto… - Results in Control and …, 2024 - Elsevier
Managing degraded-quality materials in a supply chain with a single-vendor and multi-
buyers is prevalent and critical in modern industry. This research addresses the single …