Market mechanisms and trading in microgrid local electricity markets: A comprehensive review

Y Zahraoui, T Korõtko, A Rosin, H Agabus - Energies, 2023 - mdpi.com
Electricity generation using distributed renewable energy systems is becoming increasingly
common due to the significant increase in energy demand and the high operation of …

Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms

O Kornyo, M Asante, R Opoku, K Owusu-Agyemang… - Computers & …, 2023 - Elsevier
Abstract STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Escalation of
privilege) in advance metering infrastructure (AMI) and cloud computing have been …

[HTML][HTML] Threat modeling of cyber-physical systems-a case study of a microgrid system

SM Khalil, H Bahsi, H Ochieng'Dola, T Korõtko… - Computers & …, 2023 - Elsevier
Cyber threat modeling is an analytical process that is used for identifying the potential
threats against a system and supporting the selection of security requirements in the early …

Enhancing Cybersecurity in Distributed Microgrids: A Review of Communication Protocols and Standards

ED Ayele, JF Gonzalez, WB Teeuw - Sensors, 2024 - mdpi.com
The effective operation of distributed energy sources relies significantly on the
communication systems employed in microgrids. This article explores the fundamental …

[HTML][HTML] A critical review on intelligent-based techniques for detection and mitigation of cyberthreats and cascaded failures in cyber-physical power systems

OO Tooki, OM Popoola - Renewable Energy Focus, 2024 - Elsevier
The advent of advanced technologies in power and energy systems is fortifying the grid's
resilience and enhancing the availability of power supply through a network of electrical and …

Mapping Cyber Attacks on the Internet of Medical Things: A Taxonomic Review

V Kondeti, H Bahsi - 2024 19th Annual System of Systems …, 2024 - ieeexplore.ieee.org
The Internet of Medical Things (IoMT) constitutes the core technology of various
contemporary healthcare applications, such as remote patient monitoring, telemedicine, and …

Edge-Cloud Architectures for Hybrid Energy Management Systems: A Comprehensive Review

O Boiko, A Komin, R Malekian… - IEEE Sensors …, 2024 - ieeexplore.ieee.org
This article provides an overview of recent research on edge-cloud architectures in hybrid
energy management systems (HEMSs). It delves into the typical structure of an IoT system …

Impact Characterization of Cyber Attacks on Grid-Connected Microgrid Operations

N Saqib, S Bhattacharya, KK Challa… - 2024 56th North …, 2024 - ieeexplore.ieee.org
Microgrids are crucial for the modern power grid due to their ability to ensure reliable power
supply, enhance resilience, and operate independently through islanding. However, rising …

Create the Taxonomy for Unintentional Insider Threat via Text Mining and Hierarchical Clustering Analysis

J Baugher, Y Qu - European Journal of Electrical Engineering and …, 2024 - ejece.org
The unintentional activities of system users can jeopardize the confidentiality, integrity, and
assurance of data on information systems. These activities, known as unintentional insider …

Digital Twins for Designing Energy Management Systems for Microgrids: Implementation Example Based on TalTech Campulse Project

T Korõtko, Y Zahraoui, A Rosin… - 2023 IEEE 17th …, 2023 - ieeexplore.ieee.org
Innovative solutions are required to sustain the balance between energy generation and
demand to achieve the desired efficiency in the power system and microgrid. With the recent …