[PDF][PDF] Simulation for cybersecurity: state of the art and future directions
H Kavak, JJ Padilla, D Vernon-Bido… - Journal of …, 2021 - academic.oup.com
In this article, we provide an introduction to simulation for cybersecurity and focus on three
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …
themes:(1) an overview of the cybersecurity domain;(2) a summary of notable simulation …
Cybersecurity of smart electric vehicle charging: A power grid perspective
With the roll-out of electric vehicles (EVs), the automobile industry is transitioning away from
conventional gasoline-fueled vehicles. As a result, the EV charging demand is continuously …
conventional gasoline-fueled vehicles. As a result, the EV charging demand is continuously …
Quantitative model and metrics of electrical grids' resilience evaluated at a power distribution level
A Kwasinski - Energies, 2016 - mdpi.com
This paper presents a framework to systematically measure and assess power grids'
resilience with a focus on performance as perceived by customers at the power distribution …
resilience with a focus on performance as perceived by customers at the power distribution …
Security challenges in smart grid implementation
The smart grid architecture amalgamates the physical power grid and a communication grid
into a single monolithic network. It poses several security threats that are well known (Li et …
into a single monolithic network. It poses several security threats that are well known (Li et …
[图书][B] Machine-to-machine communications: architectures, technology, standards, and applications
With the number of machine-to-machine (M2M)–enabled devices projected to reach 20 to 50
billion by 2020, there is a critical need to understand the demands imposed by such …
billion by 2020, there is a critical need to understand the demands imposed by such …
Integrated distributed authentication protocol for smart grid communications
In the smart grid, an integrated distributed authentication protocol is needed to not only
securely manage the system but also efficiently authenticate many different entities for the …
securely manage the system but also efficiently authenticate many different entities for the …
Analysis of e-mobility-based threats to power grid resilience
The increasing complexity of the e-mobility infrastructure leads to an increasing risk of
security threats, which may negatively affect any connected infrastructures such as the …
security threats, which may negatively affect any connected infrastructures such as the …
Cyber–Physical–Social Security of High‐DER‐Penetrated Smart Grids: Threats, Countermeasures, and Challenges
Q Lu, J Li, Z Peng, M Ni - IET Information Security, 2025 - Wiley Online Library
With the trend of large‐scale renewable distributed energy sources (DERs) penetrating into
the smart grids (SGs), the SGs entail heavy reliance on information and communication …
the smart grids (SGs), the SGs entail heavy reliance on information and communication …
Greenbench: A benchmark for observing power grid vulnerability under data-centric threats
Smart grid is a cyber-physical system which integrates communication networks into
traditional power grid. This integration, however, makes the power grid susceptible to cyber …
traditional power grid. This integration, however, makes the power grid susceptible to cyber …
Key-leakage resilient encrypted data aggregation with lightweight verification in fog-assisted smart grids
X Zhang, C Huang, C Xu, Y Zhang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
In this article, we analyze the inherent characteristics of smart grids, and point out that some
electricity consumption data are very sensitive and should be encrypted. However, once the …
electricity consumption data are very sensitive and should be encrypted. However, once the …