<script type="text/javascript">
<!--
document.write('<div id="oa_widget"></div>');
document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=undefined&type=result"></script>');
-->
</script>
pmid: 35224445
pmc: PMC8010494
AbstractDistributed generators (D.G.’s) enable us to generate, supply and be self-reliant on power while also allows us to supply power to meet the demand through virtual power plants. The virtual power plants also help us analyse, control, optimise, and help bridge the gap of demand and supply in these vast energy requirements. With this also comes challenges associated with securing physical systems, data protection and information privacy. Recent technological advancements have aided cybercriminals to disrupt operations by carrying out deliberate attacks on the energy sector. Though security researchers have tried to mitigate the risks, vulnerabilities, and it remains a challenge. This paper aims to present a comprehensive Edge-based security architecture to help reduce the risks and help secure the physical systems and ensure privacy and data protection.
Artificial intelligence, Computer Networks and Communications, Bridge (graph theory), Control (management), Energy supply, IDS, Energy industries. Energy policy. Fuel trade, Engineering, Characterization and Detection of Android Malware, Computer security, FOS: Mathematics, Risk analysis (engineering), Business, Security controls, Internal medicine, DDoS Attacks, Virtual power plants (VPP), Research, Statistics, Security architecture, Authentication and authorisation, Edge computing, Security Challenges in Smart Grid Systems, Computer science, Distributed energy resource (DER), Enhanced Data Rates for GSM Evolution, Physical security, Control and Systems Engineering, Physical Sciences, Signal Processing, Computer Science, Network Intrusion Detection and Defense Mechanisms, Telecommunications, Medicine, HD9502-9502.5, Energy (signal processing), Mathematics
Artificial intelligence, Computer Networks and Communications, Bridge (graph theory), Control (management), Energy supply, IDS, Energy industries. Energy policy. Fuel trade, Engineering, Characterization and Detection of Android Malware, Computer security, FOS: Mathematics, Risk analysis (engineering), Business, Security controls, Internal medicine, DDoS Attacks, Virtual power plants (VPP), Research, Statistics, Security architecture, Authentication and authorisation, Edge computing, Security Challenges in Smart Grid Systems, Computer science, Distributed energy resource (DER), Enhanced Data Rates for GSM Evolution, Physical security, Control and Systems Engineering, Physical Sciences, Signal Processing, Computer Science, Network Intrusion Detection and Defense Mechanisms, Telecommunications, Medicine, HD9502-9502.5, Energy (signal processing), Mathematics
citations This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 15 | |
popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Top 10% | |
influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Top 10% | |
impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Top 10% |