A survey on metaverse: Fundamentals, security, and privacy
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully
immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to …
immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to …
Metaverse communications, networking, security, and applications: Research issues, state-of-the-art, and future directions
Metaverse is an evolving orchestrator of the next-generation Internet architecture that
produces an immersive and self-adapting virtual world in which humans perform activities …
produces an immersive and self-adapting virtual world in which humans perform activities …
Risk identification and influence analysis model for urban energy internet based on knowledge graph improved decision-making trial and evaluation laboratory
J Xuefeng, L Cunbin, Z Ying - Expert Systems with Applications, 2023 - Elsevier
The pressing issue of climate change has led to a growing concern for low-carbon energy
transformation. Urban energy internet (UEI) provides a means to facilitate renewable energy …
transformation. Urban energy internet (UEI) provides a means to facilitate renewable energy …
Application of distributed ledger technology in distribution networks
In the transition to a society with net-zero carbon emissions, high penetration of distributed
renewable power generation and large-scale electrification of transportation and heat are …
renewable power generation and large-scale electrification of transportation and heat are …
[HTML][HTML] Reliability assessment of cyber-physical power systems considering the impact of predicted cyber vulnerabilities
This paper presents a reliability assessment technique for cyber-physical power systems
(CPPSs) that incorporates cybersecurity issues by considering non-normal random …
(CPPSs) that incorporates cybersecurity issues by considering non-normal random …
Cyber insurance against cyberattacks on electric vehicle charging stations
Cyberattacks in the energy sector are commonplace. Load-altering cyberattacks launched
via the manipulations of high-wattage appliances and assets are particularly alarming, as …
via the manipulations of high-wattage appliances and assets are particularly alarming, as …
Risk-based contingency analysis for power systems considering a combination of different types of cyber-attacks
Y Zhao, Y Li, Y Cao, M Yan - Applied Energy, 2023 - Elsevier
Substation with various communication and control devices has become a major target of
cyber-attacks. In general, two main types of cyber-attacks can be performed on substations …
cyber-attacks. In general, two main types of cyber-attacks can be performed on substations …
Coordinated cyber-physical attack considering false overload of lines
J Yang, G Sun, J Yin - Protection and Control of Modern Power …, 2022 - ieeexplore.ieee.org
The application of many sensor devices and complex information communication networks
in a power system brings new potential threats to the electrical cyber-physical system. In this …
in a power system brings new potential threats to the electrical cyber-physical system. In this …
Vulnerability management models using a common vulnerability scoring system
M Walkowski, J Oko, S Sujecki - Applied Sciences, 2021 - mdpi.com
Featured Application The Vulnerability Management Center allows for the improvement of
the quality and efficiency of operation for security operation centers. Abstract Vulnerability …
the quality and efficiency of operation for security operation centers. Abstract Vulnerability …
Adaptive security control of time-varying constraints nonlinear cyber-physical systems with false data injection attacks
In this article, an adaptive security control scheme is presented for cyber-physical systems
(CPSs) suffering from false data injection (FDI) attacks and time-varying state constraints …
(CPSs) suffering from false data injection (FDI) attacks and time-varying state constraints …