[HTML][HTML] Industrial cyber-physical systems protection: A methodological review

R Canonico, G Sperlì - Computers & Security, 2023 - Elsevier
Ubiquitous utilization of Information and Communication Technologies in modern
manufacturing plants has transformed them into Cyber-Physical Systems (CPSs), making …

Enhancing cyber-resiliency of DER-based smart grid: A survey

M Liu, F Teng, Z Zhang, P Ge, M Sun… - … on Smart Grid, 2024 - ieeexplore.ieee.org
The rapid development of information and communications technology has enabled the use
of digital-controlled and software-driven distributed energy resources (DERs) to improve the …

Experimental validation of a remedial action via Hardware-in-the-Loop System against cyberattacks targeting a lab-scale PV/Wind Microgrid

E Naderi, A Asrari - IEEE Transactions on Smart Grid, 2023 - ieeexplore.ieee.org
This paper experimentally validates the effectiveness of a primary/backup framework in
preventing/mitigating the impacts of false data injection (FDI) cyberattacks targeting a lab …

PDDL: Proactive distributed detection and localization against stealthy deception attacks in DC microgrids

M Liu, C Zhao, J Xia, R Deng… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the rapid development of the information and communication technology in DC
microgrids (DCmGs), the threat of deception attacks has been widely recognized. However …

Performance-guaranteed adaptive self-healing control for wastewater treatment processes

P Du, X Peng, Z Li, L Li, W Zhong - Journal of Process Control, 2022 - Elsevier
This paper investigates the performance-guaranteed adaptive self-healing control for
wastewater treatment processes (WWTPs), in which the non-ideal actuator, ie, the actuator …

Adaptive optimal secure wind power generation control for variable speed wind turbine systems via reinforcement learning

M Mazare - Applied Energy, 2024 - Elsevier
As the utilization of wind energy continues to grow, it is crucial to prioritize the identification
of vulnerabilities, raise awareness, and develop strategies for cybersecurity defense. False …

Modeling and detection scheme for zero-dynamics attack on wind power system

Z Wang, H Zhang, X Cao, E Liu, H Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In a wind farm, wind power system is key to maintaining continuous generation of point
energy. Since Zero-Dynamics attack poses a major risk to future wind farms, investigation on …

Dynamic sum-based event-triggered H∞ filtering for networked TS fuzzy wind turbine systems with deception attacks

S Yan, X Yang, Z Gu, X Xie, F Yang - Fuzzy Sets and Systems, 2024 - Elsevier
This article is concerned with the dynamic sum-based event-triggered H∞ filtering issue for
networked wind turbine systems subject to deception attacks and communication delays. By …

Variable separation-based fuzzy optimal control for multiagent systems in nonstrict-feedback form

Y Su, Q Shan, T Li, CLP Chen - IEEE Transactions on Fuzzy …, 2023 - ieeexplore.ieee.org
This article studies the optimized backstepping consensus control problem for uncertain
nonstrict-feedback nonlinear multiagent systems with intermittent actuator faults and input …

[HTML][HTML] Recent advances and applications of machine learning in the variable renewable energy sector

S Chatterjee, PW Khan, YC Byun - Energy Reports, 2024 - Elsevier
Abstract Machine learning (ML) plays an essential role in various scientific fields. ML
streamlines renewable energy systems, boosting efficiency and production, as global …