Results 71 to 80 of about 61,083 (243)

Model-Based Detection of Coordinated Attacks (DCA) in Distribution Systems

open access: yesIEEE Open Access Journal of Power and Energy
The fast-paced growth in digitization of smart grid components enhances system observability and remote-control capabilities through efficient communication.
Nitasha Sahani, Chen-Ching Liu
doaj   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Local Cyber-Physical Attack for Masking Line Outage and Topology Attack in Smart Grid

open access: yes, 2018
Malicious attacks in the power system can eventually result in a large-scale cascade failure if not attended on time. These attacks, which are traditionally classified into \emph{physical} and \emph{cyber attacks}, can be avoided by using the latest and ...
Chung, Hwei-Ming   +5 more
core   +1 more source

Machine Learning and Artificial Intelligence Techniques for Intelligent Control and Forecasting in Energy Storage‐Based Power Systems

open access: yesEnergy Science &Engineering, EarlyView.
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan   +4 more
wiley   +1 more source

Cyber-Attacks Detection Using Novel IDDMS Framework [PDF]

open access: yes, 2020
Security of a data system is a significant property, particularly today when PCs are interconnected by means of the internet. Since no system can be totally secure, the opportune and precise detection of intrusions is essential. Cyber security is the region that manages shielding from cyber terrorism.
Bhivsen, Gadekar Ganesh   +4 more
openaire   +1 more source

Using Deep Learning Conditional Value‐at‐Risk Based Utility Function in Cryptocurrency Portfolio Optimisation

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT One of the critical risks associated with cryptocurrency assets is the so‐called downside risk, or tail risk. Conditional Value‐at‐Risk (CVaR) is a measure of tail risks that is not normally considered in the construction of a cryptocurrency portfolio.
Xinran Huang   +3 more
wiley   +1 more source

Cloaking the Clock: Emulating Clock Skew in Controller Area Networks

open access: yes, 2018
Automobiles are equipped with Electronic Control Units (ECU) that communicate via in-vehicle network protocol standards such as Controller Area Network (CAN).
Bushnell, Linda   +4 more
core   +1 more source

Young adult self‐harm: The role of victimisation and polygenic risk in a population‐based longitudinal study

open access: yesJCPP Advances, EarlyView.
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki   +8 more
wiley   +1 more source

The contribution of vibrational spectroscopy and data analytics towards the achievement of the global sustainability goals

open access: yesJournal of the Science of Food and Agriculture, EarlyView.
Abstract The United Nations Sustainable Development Goals (UN SDGs) were defined to improve the quality of life of the global population particularly regarding social and economic aspects, with a major focus on environmental sustainability. The incorporation of digital technologies into the agri‐food sector has become a key enabler in increasing the ...
Daniel Cozzolino, Louwrens C Hoffman
wiley   +1 more source

D4I - Digital forensics framework for reviewing and investigating cyber attacks

open access: yesArray, 2020
Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation.
Athanasios Dimitriadis   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy