Enhancing Cybersecurity in Distributed Microgrids: A Review of Communication Protocols and Standards

ED Ayele, JF Gonzalez, WB Teeuw - Sensors, 2024 - mdpi.com
The effective operation of distributed energy sources relies significantly on the
communication systems employed in microgrids. This article explores the fundamental …

Cybersecurity work at Swedish administrative authorities: taking action or waiting for approval

A Andreasson, H Artman, J Brynielsson… - Cognition, Technology & …, 2024 - Springer
In recent years, the Swedish public sector has undergone rapid digitalization, while
cybersecurity efforts have not kept even steps. This study investigates conditions for …

Security-aware provenance for transparency in iot data propagation

FT Jaigirdar, B Tan, C Rudolph, C Bain - IEEE Access, 2023 - ieeexplore.ieee.org
A successful application of an Internet of Things (IoT) based network depends on the
accurate and successful delivery of data collected from numerous sources. A significant …

An efficient chaotic MHT-PUF-based IoT device authentication with QPBFT for smart grid infrastructure

MP Kumar, N Nalini - Electrical Engineering, 2024 - Springer
Abstract Internet of Things (IoT)-based smart grid employs IoT smart devices which gather
private data about electricity from consumers and distribute data to service providers via an …

Smart Guard Towns: Multi-Drone Systems with Deep Learning for Situational Awareness in Urban Management and Security

DR Hermanus, SH Supangkat… - … Conference on ICT …, 2023 - ieeexplore.ieee.org
The design of multi-drone systems with deep learning capabilities in Smart Guard Towns is
examined in this research study to improve situational awareness for urban management …

FDIAs on Hybrid Trading Transactive Energy Markets: Attacks, Impacts, and Prevention

R Dasgupta, A Sakzad, C Rudolph… - 2023 IEEE PES …, 2023 - ieeexplore.ieee.org
Transactive Energy Market (TEM) operates a day-ahead market for efficient energy
management and determines the energy prices in advance for the future period. This …

[引用][C] Assessment of existing cyber-attack detection models for web-based systems

OG Awuor - Global Journal of Engineering and Technology …, 2023

[PDF][PDF] Security-Aware Provenance for Transparency in IoT Data Propagation

C BAIN - dro.deakin.edu.au
ABSTRACT A successful application of an Internet of Things (IoT) based network depends
on the accurate and successful delivery of data collected from numerous sources. A …

[引用][C] Cyber Attacks and Countermeasures in Transactive Energy Market-based Microgrid Systems

R Dasgupta - 2023 - bridges.monash.edu
This thesis provides a comprehensive overview that spans from the investigation of false
data injection attacks to the analysis of their impacts. It also proposes attack prevention and …