Spatiotemporal deep learning for power system applications: a survey

M Saffari, M Khodayar - IEEE Access, 2024 - ieeexplore.ieee.org
Understanding spatiotemporal correlations in power systems is crucial for maintaining grid
stability, reliability, and efficiency. By discerning connections between spatial and temporal …

[PDF][PDF] Comprehensive Review Analysis and Countermeasures for Cybersecurity Threats: DDoS, Ransomware, and Trojan Horse Attacks

N Ravichandran, T Tewaraja, V Rajasegaran… - Preprints. org, 2024 - preprints.org
With all the sophisticated threats to network security, intrusion detection is a section of the
security technology industry that is becoming increasingly significant. In this research paper …

Exploring gender dynamics in cybersecurity education: a self-determination theory and social cognitive theory perspective

SP Francis, VK Kolil, V Pavithran, I Ray… - Computers & Security, 2024 - Elsevier
The cybersecurity industry is facing two major challenges as cyber threats get more serious:
a shortage of skilled workers to defend against these attacks and a noticeable …

Advanced hybrid techniques for cyberattack detection and defense in IoT networks

ZS Mahdi, RM Zaki, L Alzubaidi - Security and Privacy, 2024 - Wiley Online Library
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to
the Internet, making it easier for users to connect to modern technology. However, the …

Deep Learning Strategies for Detecting and Mitigating Cyber-Attacks Targeting Water-Energy Nexus

A Abughali, M Alansari, AS Al-Sumaiti - IEEE Access, 2024 - ieeexplore.ieee.org
Due to the substantial interdependencies between water and energy infrastructures, the
water-energy nexus (WEN) is regarded as an appealing focal point for potential malicious …

[HTML][HTML] Data-centric explainable artificial intelligence techniques for cyber-attack detection in microgrid networks

R Trivedi, S Patra, S Khadem - Energy Reports, 2025 - Elsevier
This article presents a strategy for pre-processing data and interpreting the performance of
advanced machine learning (ML) models to improve data quality and modify the models …

BESS-Set: A Dataset for Cybersecurity Monitoring in a Battery Energy Storage System

GB Gaggero, A Armellin, G Ferro… - IEEE Open Access …, 2024 - ieeexplore.ieee.org
Smart grids are nowadays featured by distributed energy resources, both renewables,
traditional sources and storage systems. Generally, these components are characterized by …

Cross-Domain Solutions (CDS): A Comprehensive Survey

V Sundaravarathan, H Alqalaf, A Siddiqui, K Kim… - IEEE …, 2024 - ieeexplore.ieee.org
A domain is commonly defined as a set of system resources, eg, computers, to which certain
users have prescribed access rights as governed by some security policies. The access …

Stealthy FDI attack to maximize load shedding considering voltage sensitivity analysis

M Basiri-Kejani, M Gholipour, R Hooshmand - Electric Power Systems …, 2025 - Elsevier
Today, the expansion utilization of telecommunication systems results in the power systems
having a physical-cyber structure. Despite the advantages of this structure, one of the main …

Event-triggered Intelligent Control Scheme for Data Integrity Attack Mitigation in Multi-area Power Grids

V Kapil, S Prasad - IEEE Transactions on Power Systems, 2024 - ieeexplore.ieee.org
The power grids are becoming smarter with adoption of various IoT Technologies (Internet of
Things). IoT calls for sensors, which are transacting real time data through communication …