This paper presents a review of state‐of‐the‐art of cybersecurity in the power system, reviewing available simulation tools for studying the cybersecurity of the power system, classifying vulnerable components of the power system to cyberattacks, and summarizing the adverse effects of a successful cyberattack on each component in the power system ...
Milad Beikbabaei +2 more
wiley +1 more source
Energy Management Under Uncertainty for Hybrid Microgrids: From Data to Decision‐Making
This review explores energy management under uncertainty in hybrid microgrids, focusing on how data‐driven methods support robust decision‐making. It examines sources of uncertainty, such as forecast errors and modelling inaccuracies and reviews analytical and AI‐based strategies to manage them.
Farid Moazzen +3 more
wiley +1 more source
Towards Standardisation Measures to Support the Security of Control and Real-Time Systems for Energy Critical Infrastructures [PDF]
This report outlines the context for control and real time systems vulnerability in the energy sector, their role in energy critical infrastructures and their emerging vulnerabilities as they were put in light by some recent episodes.
MASERA Marcelo, STEFANINI Alberto
core
Validating secure and reliable IP/MPLS communications for current differential protection [PDF]
Current differential protection has stringent real-time communications requirements and it is critical that protection traffic is transmitted securely, i.e., by using appropriate data authentication and encryption methods.
Blair, S.M. +6 more
core +1 more source
Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures [PDF]
The electricity industry is now at the verge of a new era. An era that promises, through the evolution of the existing electrical grids to Smart Grids, more efficient and effective power management, better reliability, reduced production costs and more ...
Komninos, N. +2 more
core +1 more source
Energy management in microgrid and multi‐microgrid
This problem‐oriented study is the first to elaborate energy management in microgrid and multi‐microgrid from the perspective of energy utilization model. Then, a systematic hierarchical architecture is designed to incorporate stability, touch, efficiency, evenness, and resilience dimensions. Last, main energy management technologies are summarized and
Xueliang Xing, Limin Jia
wiley +1 more source
Основи інформаційної безпеки [PDF]
Робоча навчальна програма з курсу «Основи інформаційної безпеки» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо-професійної програми підготовки ...
Бурячок, Володимир Леонідович +1 more
core +3 more sources
A Test bed dedicated to the Study of Vulnerabilities in IEC 61850 Power Utility Automation Networks
International audienceIndustrial control systems rely more and more on digital technologies. Although the cyber risk such technologies induce is widely judged as serious, especially for critical infrastructures, these systems have generally not been ...
Kabir-Querrec, Maëlle +3 more
core +2 more sources
On the Detection of Cyber-Attacks in the Communication Network of IEC 61850 Electrical Substations [PDF]
The availability of the data within the network communication remains one of the most critical requirement when compared to integrity and confidentiality.
Elbez, Ghada
core +2 more sources
The application and challenge of energy router in energy internet
Abstract The energy internet has emerged as a promising area of research in power systems with distributed generation. Similar to an internet router to connect and switch networks, the energy router within the energy internet plays a crucial role to integrate and distribute the energy flow.
Jinliang Huang +4 more
wiley +1 more source

