Searched for: +
(1 - 15 of 15)
document
Najm, Z. (author)
doctoral thesis 2023
document
Chaal, M. (author), Ren, X. (author), Bahootoroody, A. (author), Basnet, Sunil (author), Bolbot, Victor (author), Banda, Osiris A.Valdez (author), van Gelder, P.H.A.J.M. (author)
The safety and reliability of autonomous ships are critical for the successful realization of an autonomous maritime ecosystem. Research and collaboration between governments, industry, and academia are vital in achieving this goal. This paper conducts a bibliometric review of the research on the risk, safety, and reliability of autonomous ships...
review 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
The cyber attacks in Ukraine in 2015 and 2016 demonstrated the vulnerability of electrical power grids to cyber threats. They highlighted the significance of Operational Technology (OT) communication-based anomaly detection. Many anomaly detection methods are based on real-time traffic monitoring, i.e., Intrusion Detection Systems (IDS) that may...
conference paper 2023
document
Presekal, A. (author), Stefanov, Alexandru (author), Subramaniam Rajkumar, Vetrivel (author), Palensky, P. (author)
Electrical power grids are vulnerable to cyber attacks, as seen in Ukraine in 2015 and 2016. However, existing attack detection methods are limited. Most of them are based on power system measurement anomalies that occur when an attack is successfully executed at the later stages of the cyber kill chain. In contrast, the attacks on the Ukrainian...
journal article 2023
document
Akkaoui, R. (author), Stefanov, Alexandru (author), Palensky, P. (author), Epema, D.H.J. (author)
The solar industry in residential areas has been witnessing an astonishing growth worldwide. At the heart of this transformation, affecting the edge of the electricity grid, reside smart inverters (SIs). These IoT-enabled devices aim to introduce a certain degree of intelligence to conventional inverters by integrating various grid support...
journal article 2023
document
Akkaoui, R. (author), Stefanov, Alexandru (author), Palensky, P. (author), Epema, D.H.J. (author)
The concept of the internet of energy (IoE) emerged as an innovative paradigm to encompass all the complex and intertwined notions relevant to the transition of current smart grids towards more decarbonization, digitalization and decentralization. With a focus on the two last aspects, the amount of intelligent devices being connected in a...
journal article 2022
document
Subramaniam Rajkumar, Vetrivel (author), Musunuri, Shyam (author), Stefanov, Alexandru (author), Bruijns, Siem (author), de Wit, J.J. (author), Klaar, Danny (author), Louh, Amadou (author), Thoen, Arnaud (author), Palensky, P. (author)
Paper ID – 0348
conference paper 2022
document
Marot, Antoine (author), Kelly, Adrian (author), Naglic, M. (author), Barbesant, Vincent (author), Cremer, Jochen (author), Stefanov, Alexandru (author), Viebahn, Jan (author)
Today's power systems are seeing a paradigm shift under the energy transition, sparkled by the electrification of demand, digitalisation of systems, and an increasing share of decarbonated power generation. Most of these changes have a direct impact on their control centers, forcing them to handle weather-based energy resources, new...
journal article 2022
document
Liu, Chen-Ching (author), Bedoya, Juan C. (author), Sahani, Nitasha (author), Stefanov, Alexandru (author), Appiah-Kubi, Jennifer (author), Sun, Chih Che (author), Lee, Jin Young (author), Zhu, Ruoxi (author)
The Information and Communications Technology (ICT) for control and monitoring of power systems is a layer on top of the physical power system infrastructure. The cyber system and physical power system components form a tightly coupled Cyber-Physical System (CPS). Sources of vulnerabilities arise from the computing and communication systems...
journal article 2021
document
Smith, Marcus (author), Miller, S.R.M. (author)
This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and...
book 2021
document
Subramaniam Rajkumar, Vetrivel (author), Stefanov, Alexandru (author), Musunuri, Shyam (author), de Wit, Johan (author)
Driven by power grid digitalisation, tighter coupling between the cyber and physical layers has introduced cyber security threats. This paper elucidates the emergence and possible consequences of recently identified Information Technology (IT) / Industrial Internet of Things (IIoT) vulnerabilities, i.e., Ripple20, and the threats it poses to...
conference paper 2021
document
Çetin, F.O. (author)
Resources on the Internet allow constant communication and data sharing between Internet users. While these resources keep vital information flowing, cybercriminals can easily compromise and abuse them, using them as a platform for fraud and misuse. Every day, we observe millions of internet-connected resources are being abused in criminal...
doctoral thesis 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Palensky, P. (author)
Power systems automation and communication standards are crucial for the transition of the conventional power system towards a smart grid. The IEC 61850 standard is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation devices. IEC 61850 serves as the...
conference paper 2020
document
Subramaniam Rajkumar, Vetrivel (author), Tealane, M. (author), Stefanov, Alexandru (author), Presekal, A. (author), Palensky, P. (author)
Power system automation and communication standards are spearheading the power system transition towards a smart grid. IEC 61850 is one such standard, which is widely used for substation automation and protection. It enables real-time communication and data exchange between critical substation automation and protection devices within digital...
conference paper 2020
document
Maathuis, E.C. (author), Pieters, W. (author), van den Berg, Jan (author)
Cyber operations lack models, methodologies, and mechanisms to describe relevant data and knowledge. This problem is directly reflected when cyber operations are conducted and their effects assessed, and it can produce dissonance and disturbance in corresponding decision-making processes and communication between different military actors. To...
journal article 2018
Searched for: +
(1 - 15 of 15)