Defense strategies for epidemic cyber security threats: modeling and analysis by using a machine learning approach
This paper investigates the mathematical modelling of cybercrime attacks on multiple
devices connected to the server. This model is a very successful way for cybercrime, bio …
devices connected to the server. This model is a very successful way for cybercrime, bio …
Online Recursive Detection and Adaptive Fuzzy Mitigation of Cyber-Physical Attacks Targeting Topology of IMG: An LFC Case Study
Due to the low inertia of inverter-based islanded microgrids (IMGs), these systems require a
delicate and accurate load frequency control (LFC) scheme. The deployment of such a …
delicate and accurate load frequency control (LFC) scheme. The deployment of such a …
Time-synchronization attack on data aggregation in wide-area damping controllers
The advent of wide-area measurement systems (WAMSs) in modern power systems enables
deployment of wide-area damping controllers (WADCs) to effectively deal with dominant …
deployment of wide-area damping controllers (WADCs) to effectively deal with dominant …
Cyber Induced Harmonic Instability of Inverter-Based Renewable Generators
Extensive integration of inverter-based resources (IBRs) has introduced stability challenges
to power grids due to their low-inertia nature and grid-following control configuration. To …
to power grids due to their low-inertia nature and grid-following control configuration. To …
[PDF][PDF] A Mathematical Real Analysis on 2D Connection Spaces for Network Cyber Threats: A SEIAR-Neural Network Approach
S Ayyalasomayajula, DD Rao, M Goel, S Khan… - researchgate.net
This article examines this problem by deploying the mathematical modelling, specifically
compartmental SEIAR model to simulate and analyse cyberattack on a number of devices …
compartmental SEIAR model to simulate and analyse cyberattack on a number of devices …