A survey on metaverse: Fundamentals, security, and privacy

Y Wang, Z Su, N Zhang, R Xing, D Liu… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully
immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to …

Metaverse communications, networking, security, and applications: Research issues, state-of-the-art, and future directions

M Ali, F Naeem, G Kaddoum… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Metaverse is an evolving orchestrator of the next-generation Internet architecture that
produces an immersive and self-adapting virtual world in which humans perform activities …

Risk identification and influence analysis model for urban energy internet based on knowledge graph improved decision-making trial and evaluation laboratory

J Xuefeng, L Cunbin, Z Ying - Expert Systems with Applications, 2023 - Elsevier
The pressing issue of climate change has led to a growing concern for low-carbon energy
transformation. Urban energy internet (UEI) provides a means to facilitate renewable energy …

Application of distributed ledger technology in distribution networks

Y Zhou, AN Manea, W Hua, J Wu, W Zhou… - Proceedings of the …, 2022 - ieeexplore.ieee.org
In the transition to a society with net-zero carbon emissions, high penetration of distributed
renewable power generation and large-scale electrification of transportation and heat are …

[HTML][HTML] Reliability assessment of cyber-physical power systems considering the impact of predicted cyber vulnerabilities

A Rostami, M Mohammadi, H Karimipour - International Journal of Electrical …, 2023 - Elsevier
This paper presents a reliability assessment technique for cyber-physical power systems
(CPPSs) that incorporates cybersecurity issues by considering non-normal random …

Cyber insurance against cyberattacks on electric vehicle charging stations

S Acharya, R Mieth, C Konstantinou… - … on Smart Grid, 2021 - ieeexplore.ieee.org
Cyberattacks in the energy sector are commonplace. Load-altering cyberattacks launched
via the manipulations of high-wattage appliances and assets are particularly alarming, as …

Risk-based contingency analysis for power systems considering a combination of different types of cyber-attacks

Y Zhao, Y Li, Y Cao, M Yan - Applied Energy, 2023 - Elsevier
Substation with various communication and control devices has become a major target of
cyber-attacks. In general, two main types of cyber-attacks can be performed on substations …

Coordinated cyber-physical attack considering false overload of lines

J Yang, G Sun, J Yin - Protection and Control of Modern Power …, 2022 - ieeexplore.ieee.org
The application of many sensor devices and complex information communication networks
in a power system brings new potential threats to the electrical cyber-physical system. In this …

Vulnerability management models using a common vulnerability scoring system

M Walkowski, J Oko, S Sujecki - Applied Sciences, 2021 - mdpi.com
Featured Application The Vulnerability Management Center allows for the improvement of
the quality and efficiency of operation for security operation centers. Abstract Vulnerability …

Adaptive security control of time-varying constraints nonlinear cyber-physical systems with false data injection attacks

YM Wang, YX Li - Journal of Control and Decision, 2024 - Taylor & Francis
In this article, an adaptive security control scheme is presented for cyber-physical systems
(CPSs) suffering from false data injection (FDI) attacks and time-varying state constraints …