7 research outputs found

    Cybersecurity of Microgrid: State-of-the-Art Review and Possible Directions of Future Research

    No full text
    The infrastructure of and processes involved in a microgrid electrical system require advanced technology to facilitate connection among its various components in order to provide the intelligence and automation that can benefit users. As a consequence, the microgrid has vulnerabilities that can expose it to a wide range of attacks. If they are not adequately addressed, these vulnerabilities may have a destructive impact on a country’s critical infrastructure and economy. While the impact of exploiting vulnerabilities in them is understood, research on the cybersecurity of microgrids is inadequate. This paper provides a comprehensive review of microgrid cybersecurity. In particular, it (1) reviews the state-of-the-art microgrid electrical systems, communication protocols, standards, and vulnerabilities while highlighting prevalent solutions to cybersecurity-related issues in them; (2) provides recommendations to enhance the security of these systems by segregating layers of the microgrid, and (3) identifies the gap in research in the area, and suggests directions for future work to enhance the cybersecurity of microgrids

    Comprehensive Review and Future Research Directions on Dynamic Faceted Search

    No full text
    In modern society, the increasing number of web search operations on various search engines has become ubiquitous due to the significant number of results presented to the users and the incompetent result-ranking mechanism in some domains, such as medical, law, and academia. As a result, the user is overwhelmed with a large number of misranked or uncategorized search results. One of the most promising technologies to reduce the number of results and provide desirable information to the users is dynamic faceted filters. Therefore, this paper extensively reviews related research articles published in IEEE Xplore, Web of Science, and the ACM digital library. As a result, a total of 170 related research papers were considered and organized into five categories. The main contribution of this paper is to provide a detailed analysis of the faceted search’s fundamental attributes, as well as to demonstrate the motivation from the usage, concerns, challenges, and recommendations to enhance the use of the faceted approach among web search service providers

    A Survey on the Use of Personalized Model-Based Search Engine

    No full text
    Mostly with growth of the information sector, in particular the World wide web and the mobile Internet, the volume of information that we’ll have to contend with is rapidly increasing. To a certain degree, users could get the information they need from the Internet. And in context of these vast availability and proliferation of information, users need an efficient way of finding only important and interesting information. How to optimize usability during information search process is still not addressed. Searching was the key feature of a conventional search engine. There has been insufficient customization in search engines to be used by searchers during the information extraction process. This article thus analysed and discussed the personalized recommendations of searches using a tailored framework that supports search engines. We describe a comprehensive review of the study on search engine customization for web-based queries. The study is partially systematic and, also at end of the study, we discuss the difficulties of personalizing search engines

    From 5G to 6G Technology: Meets Energy, Internet-of-Things and Machine Learning: A Survey

    No full text
    Due to the rapid development of the fifth-generation (5G) applications, and increased demand for even faster communication networks, we expected to witness the birth of a new 6G technology within the next ten years. Many references suggested that the 6G wireless network standard may arrive around 2030. Therefore, this paper presents a critical analysis of 5G wireless networks’, significant technological limitations and reviews the anticipated challenges of the 6G communication networks. In this work, we have considered the applications of three of the highly demanding domains, namely: energy, Internet-of-Things (IoT) and machine learning. To this end, we present our vision on how the 6G communication networks should look like to support the applications of these domains. This work presents a thorough review of 370 papers on the application of energy, IoT and machine learning in 5G and 6G from three major libraries: Web of Science, ACM Digital Library, and IEEE Explore. The main contribution of this work is to provide a more comprehensive perspective, challenges, requirements, and context for potential work in the 6G communication standard

    A short review: Issues and threats pertaining the security of SCADA systems

    No full text
    SCADA systems are commonly used to track and manage utilities in vital national infrastructures including electricity generation and delivery, transportation networks, water supply and manufacturing, and manufacturing facilities. Cyber-attacks that threaten data privacy in SCADA networks, such as unauthorised misuse of sensor or control signals, may have a significant effect on the functioning of sensitive national infrastructure by causing device operators to make incorrect decisions, which could result in disastrous outcomes. Therefore, the cyber-security of SCADA systems has been an active topic of research for the past decades due to the potentially disastrous impact on the environment, public safety, and economy when these systems are breached or compromised. This paper examines the current security posture of SCADA systems from the perspective of data and cybersecurity and to propose recommendations for enhancing protection measures

    A review: Towards practical attack taxonomy for industrial control systems

    No full text
    Supervisory Control and Data Acquisition (SCADA) system is the underlying control system of most national critical infrastructures such as power, energy, water, transportation and telecommunication. In order to understand the potential threats to these infrastructures and the mechanisms to protect them, different types of cyber-attacks applicable to these infrastructures need to be identified. Therefore, there is a significant need to have a comprehensive understanding of various types of cyber-attacks and its classification associated with both Opera-tion Technology (OT) and Information Technology (IT). This paper presents a comprehensive review of existing cyber-attack taxonomies available in the literature and evaluates these taxonomies based on defined criteria
    corecore