Intrusion Detection in Smart Grid Using Bagging Ensemble Classifiers

A Subasi, SM Qaisar, M Al-Nory… - 2019 IEEE PES …, 2019 - ieeexplore.ieee.org
Developments in information and communication technologies (ICT) achieved new trends
such as smart grid (SG). Innovations in ICT bring challenges to our security and expectations …

[PDF][PDF] An efficient Intrusion Detection System against cyber-physical attacks in the smart grid

DC Aglzim - academia.edu
Without robust security mechanisms, the smart grid remains vulnerable to many attacks that
can cause serious damages. Since state estimation is a critical entity to monitor and control …

[PDF][PDF] Detecting False Data Injection Attacks Against Smart Grid Wide Area Monitoring Systems

S Paudel - 2021 - academia.edu
Wide area monitoring systems (WAMSs) are used to measure synchrophasor data at
different locations and give operators a near-real-time picture of what is happening in the …

[PDF][PDF] Evaluation of Confidentiality and Data Integrity Encryption Based on User Session Timing Using Java for IoT Environment

A Bamhdi, O Abdulkader, A Kargar, A Patel… - researchgate.net
Confidentiality and data integrity are two important security services that are provided by the
most popular VPN protocols such IPsec and SSL/TLS. It is a well-known fact that security …

Evaluation of Confidentiality and Data Integrity Based on User Session for IoT Environment

A Bamhdi, O Abdulgadir, A Kargar, A Patel… - Proceedings of Fifth …, 2021 - Springer
Confidentiality and data integrity are two important security services that are provided by the
most popular VPN protocols such IPsec and SSL/TLS. It is a well-known fact that security …

[PDF][PDF] International Journal of Data Mining, Modelling and Management

T Kenaza - researchgate.net
A good defense strategy utilizes multiple solutions such as Firewalls, IDS, Antivirus, AAA
server, VPN, etc. However, these tools can easily generate hundreds of thousands of events …

DHCD: Distributed Host-Based Collaborative Detection for FmDI Attacks

B Li, R Lu, G Xiao, B Li, R Lu, G Xiao - … of False Data Injection Attacks in …, 2020 - Springer
The entire power system may suffer catastrophic damage caused by FmDI attacks. However,
since the high reliance on open information networks, it is challenging to counter FmDI …

[PDF][PDF] An Improved Intrusion Detection in Cloud Virtualization for National Open University of Nigeria (NOUN)

K Okafor, F Onuodu - International Journal of Advanced Research in …, 2019 - academia.edu
One of the major problems in cloud virtualization is security. To allow the smooth flow of this
communalism around the physical resources, there ought to be a level of monitoring and …

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs

W Zhou, B Yu - KSII Transactions on Internet and Information …, 2018 - koreascience.kr
Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with
various attacks launched by malicious nodes, which include network eavesdropping …

[图书][B] Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds

A Abusitta - 2018 - search.proquest.com
Les systèmes infonuagiques deviennent de plus en plus complexes, plus dynamiques et
hétérogènes. Un tel environnement produit souvent des données complexes et bruitées …