Defense strategies for epidemic cyber security threats: modeling and analysis by using a machine learning approach

M Sulaiman, M Waseem, AN Ali, G Laouini… - IEEE …, 2024 - ieeexplore.ieee.org
This paper investigates the mathematical modelling of cybercrime attacks on multiple
devices connected to the server. This model is a very successful way for cybercrime, bio …

Online Recursive Detection and Adaptive Fuzzy Mitigation of Cyber-Physical Attacks Targeting Topology of IMG: An LFC Case Study

A Abazari, MM Soleymani, M Zadsar… - … on Smart Grid, 2023 - ieeexplore.ieee.org
Due to the low inertia of inverter-based islanded microgrids (IMGs), these systems require a
delicate and accurate load frequency control (LFC) scheme. The deployment of such a …

Time-synchronization attack on data aggregation in wide-area damping controllers

M Zadsar, M Ghafouri, A Ameli… - 2022 IEEE electrical …, 2022 - ieeexplore.ieee.org
The advent of wide-area measurement systems (WAMSs) in modern power systems enables
deployment of wide-area damping controllers (WADCs) to effectively deal with dominant …

Cyber Induced Harmonic Instability of Inverter-Based Renewable Generators

M Zadsar, MB Vavdareh, M Ghafouri… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Extensive integration of inverter-based resources (IBRs) has introduced stability challenges
to power grids due to their low-inertia nature and grid-following control configuration. To …

[PDF][PDF] A Mathematical Real Analysis on 2D Connection Spaces for Network Cyber Threats: A SEIAR-Neural Network Approach

S Ayyalasomayajula, DD Rao, M Goel, S Khan… - researchgate.net
This article examines this problem by deploying the mathematical modelling, specifically
compartmental SEIAR model to simulate and analyse cyberattack on a number of devices …