Blockchain applications in smart grid–review and frameworks
Modern power systems face different challenges such as the ever-increasing electrical
energy demand, the massive growth of renewable energy with distributed generations, the …
energy demand, the massive growth of renewable energy with distributed generations, the …
Security of wide-area monitoring, protection, and control (WAMPAC) systems of the smart grid: A survey on challenges and opportunities
The evolution of power generation systems, along with their related increase in complexity,
led to the critical necessity of Wide-Area Monitoring, Protection, and Control (WAMPAC) …
led to the critical necessity of Wide-Area Monitoring, Protection, and Control (WAMPAC) …
A survey on the detection algorithms for false data injection attacks in smart grids
Cyber-physical attacks are the main substantial threats facing the utilization and
development of the various smart grid technologies. Among these attacks, false data …
development of the various smart grid technologies. Among these attacks, false data …
Cyber-physical energy systems security: Threat modeling, risk assessment, resources, metrics, and case studies
Cyber-physical systems (CPS) are interconnected architectures that employ analog and
digital components as well as communication and computational resources for their …
digital components as well as communication and computational resources for their …
Survey on smart homes: Vulnerabilities, risks, and countermeasures
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized
the way we live and interact with each other as well as with various types of systems and …
the way we live and interact with each other as well as with various types of systems and …
Consumer, commercial, and industrial iot (in) security: Attack taxonomy and case studies
C Xenofontos, I Zografopoulos… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications
spanning from the consumer domain to commercial and industrial systems. The steep …
spanning from the consumer domain to commercial and industrial systems. The steep …
Survey of machine learning methods for detecting false data injection attacks in power systems
Over the last decade, the number of cyber attacks targeting power systems and causing
physical and economic damages has increased rapidly. Among them, false data injection …
physical and economic damages has increased rapidly. Among them, false data injection …
Spoofing and anti-spoofing technologies of global navigation satellite system: A survey
Z Wu, Y Zhang, Y Yang, C Liang, R Liu - IEEE Access, 2020 - ieeexplore.ieee.org
A large number of facts prove that Global Navigation Satellite System (GNSS) has certain
security risks and is threatened by attacks. In particular, GNSS civilian signal receivers have …
security risks and is threatened by attacks. In particular, GNSS civilian signal receivers have …
Dynamic GPS spoofing attack detection, localization, and measurement correction exploiting PMU and SCADA
GPS receiver is the source of synchronization in phasor measurement unit (PMU) networks.
While it guarantees time precision, it is vulnerable to cyberattacks, which may modify the …
While it guarantees time precision, it is vulnerable to cyberattacks, which may modify the …
Cyber attack resilient distance protection and circuit breaker control for digital substations
This paper proposes new concepts for detecting and mitigating cyber attacks on substation
automation systems by domain-based cyber–physical security solutions. The proposed …
automation systems by domain-based cyber–physical security solutions. The proposed …