Addressing AI Risks in Critical Infrastructure: Formalising the AI Incident Reporting Process

A Agarwal, MJ Nene - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
Integrating Artificial Intelligence (AI) into critical infrastructure sectors such as the power grid,
energy systems, and telecommunications has revolutionised decision-making processes …

Large Language Models (LLM) for Estimating the Cost of Cyber-attacks

H Razavi, MR Jamali - 2024 11th International Symposium on …, 2024 - ieeexplore.ieee.org
With the expansion of digital services and intelligent agents, cyber-attacks are increasingly
frequent and impactful. Estimating the financial consequences of these attacks has become …

Markov chain and RATGOS-driven fuzzy decision-making for prioritizing cybersecurity measures in microgrid systems

S Eti, S Yüksel, D Pamucar, H Dinçer, M Deveci… - OPSEARCH, 2024 - Springer
Necessary precautions must be taken to increase cybersecurity to improve the performance
of microgrid systems. However, because these actions create costs, it is not possible to …

Telling Apart: ML Framework Towards Cyber Attack and Fault Differentiation in Microgrids

T Das, S Rath, S Sengupta - 2024 IEEE 7th International …, 2024 - ieeexplore.ieee.org
Microgrids have revolutionized the field of power systems as they provide higher reliability
and power quality over traditional power systems by possessing the ability to self-supply …

Enhancing Resilience: Smart Grid Cybersecurity and Fault Diagnosis Strategies

A Basharat, Z Huma - Asian Journal of Research in …, 2024 - geographical.go2journals.com
The increasing integration of advanced technologies within the power grid infrastructure has
led to significant advancements in efficiency, reliability, and sustainability. However, this …

Data-Driven Graph Switching for Cyber-Resilient Control in Microgrids

S Rath, S Sahoo - 2024 IEEE Design Methodologies …, 2024 - ieeexplore.ieee.org
Distributed microgrids are conventionally dependent on communication networks to achieve
secondary control objectives. This dependence makes them vulnerable to stealth data …