[PDF][PDF] Identification scheme of false data injection attack based on deep learning algorithms for smart grids

ME Merza, SH Hussein, QI Ali - Indonesian Journal of Electrical …, 2023 - academia.edu
This paper presents the artificial intelligence (AI) techniques based on the deep learning
algorithms to diagnose false data injection (FDI) attacks to smart grids with the measurement …

The Effectiveness of a Comprehensive threat Mitigation Framework in NETWORKING: A Multi-Layered Approach to Cyber Security

H Balisane, E Egho-Promise, E Lyada… - … Research Journal of …, 2024 - clok.uclan.ac.uk
The rapidly evolving landscape of cyber threats necessitates robust and adaptable
strategies to safeguard networking. This study explores the development and evaluation of a …

TOWARDS IMPROVED THREAT MITIGATION IN DIGITAL ENVIRONMENTS: A COMPREHENSIVE FRAMEWORK FOR CYBERSECURITY ENHANCEMENT

H Balisane, EI Egho-Promise, E Lyada… - International Journal of …, 2024 - clok.uclan.ac.uk
In today's digital landscape, cybersecurity has become a critical concern due to the
increasing sophistication of cyber threats. Traditional cybersecurity measures are often …

Supply chain risks from Cloud Security Posture Management

RM Gebregergis, L Fritsch - 2023 - oda.oslomet.no
Cloud security posture management services (CSPMSs) support security efforts in the
industry by providing more convenient ways of detecting misconfigurations, threats, and …