[HTML][HTML] A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

Y Li, Q Liu - Energy Reports, 2021 - Elsevier
At present, most of the economic, commercial, cultural, social and governmental activities
and interactions of countries, at all levels, including individuals, non-governmental …

[PDF][PDF] Predictions of cybersecurity experts on future cyber-attacks and related cybersecurity measures

AM AL-Hawamleh - momentum, 2023 - academia.edu
The Internet interconnections' exponential growth has resulted in an increase in cyber-attack
occurrences with mostly devastating consequences. Malware is a common tool for …

[HTML][HTML] False data injection cyber-attacks detection for multiple DC microgrid clusters

S Tan, P Xie, JM Guerrero, JC Vasquez - Applied Energy, 2022 - Elsevier
DC microgrids are considered as the next generation of power systems because of the
possibility of connecting various renewable energy sources to different types of loads based …

[PDF][PDF] Techno-Prevention in Counterterrorism: Between Countering Crime and Human Rights Protection

A Masyhar, SO Emovwodo - Journal of Human Rights …, 2023 - pdfs.semanticscholar.org
In recent years, terrorism has emerged as a prominent global issue. Defense and deterrence
concepts are subject to transformation in light of evolving concerns and asymmetric threats …

COVID-19 pandemic & cyber security issues: Sentiment analysis and topic modeling approach

S Khandelwal, A Chaudhary - Journal of Discrete Mathematical …, 2022 - Taylor & Francis
The purpose of this study is to understand public awareness of cybersecurity-related issues
and discussions during the COVID-19 pandemic. Employees and confidential organizational …

[PDF][PDF] Social-legal foundations of information security of the state, society and individual in Ukraine

I Sopilko, L Rapatska - … Journal of the National Academy of …, 2023 - lawscience.com.ua
■ Abstract. Ukraine is experiencing military aggression due to the full-scale invasion of
Russia, which uses information weapons. Therefore, the problem of ensuring a sufficiently …

Fuzzy EKF-based intrusion detection and accurate state estimation of interconnected DC MGs with CPLs

N Vafamand, R Razavi-Far, MM Arefi… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the advancement of digital technologies in complex and large-scale power systems, the
issue of cyber-attack detection has become of paramount importance to maintain system …

[HTML][HTML] False data injection in power smart grid and identification of the most vulnerable bus; a case study 14 IEEE bus network

X Zhong, G xin Li, C Zhng - Energy Reports, 2021 - Elsevier
Smart grids are one of the most important structures based on cyber–physical devices.
Therefore, these grids should be more reliable and efficient when increasing consumption …

[HTML][HTML] Valuing the cyber-attacks budget in high voltage power substations to increase cyber-security; providing a method based on Fuzzy Analytical Hierarchy …

Y Xiao, L Yang, J Li, J Xu, K Liu - Energy Reports, 2021 - Elsevier
The level of protection of high voltage power substations depends on the considerations of
the electricity company, the level of threats and the value of their assets. On the other hand …

Consensus check in the detection of faulty and hijacking attacks for multiple converter-based microgrids

S Tan, P Xie, JC Vasquez… - 2024 IEEE 10th …, 2024 - ieeexplore.ieee.org
Microgrids are nowadays exposed to cyber-security challenges due to the integration of
information and communications technologies (ICT). Cyber-attacks have the potential to …