Security feedback trust model of power network demand response terminal triggered by hacker attacks
With the rapid expansion of power system scale, demand response business is promoted to develop. More and more demand response terminals are connected to the smart grid, smart grid is an intelligent system that allows the grid to effectively perform its functions. Its data can be used in intelligent...
| Published in: | Frontiers in Energy Research |
|---|---|
| Main Authors: | Jianfei Chen, Lina Zhao, Qiang Sun, Cheng Zhang |
| Format: | Article |
| Language: | English |
| Published: |
Frontiers Media S.A.
2023-02-01
|
| Subjects: | |
| Online Access: | https://www.frontiersin.org/articles/10.3389/fenrg.2023.1113384/full |
Similar Items
Hacker attacks as a form of syber terrorism
by: Klisarić Sanja
Published: (2021-01-01)
by: Klisarić Sanja
Published: (2021-01-01)
¿Qué es ser hacker?
by: Nelson Scariot Esquivel
Published: (2022-05-01)
by: Nelson Scariot Esquivel
Published: (2022-05-01)
¿Qué es la cultura hacker?
by: Nelson Scariot Esquivel
Published: (2022-05-01)
by: Nelson Scariot Esquivel
Published: (2022-05-01)
Behavior and feedback based trust computation in cloud environment
by: Tabassum N. Mujawar, et al.
Published: (2022-09-01)
by: Tabassum N. Mujawar, et al.
Published: (2022-09-01)
A Lightweight Trust Mechanism with Attack Detection for IoT
by: Xujie Zhou, et al.
Published: (2023-08-01)
by: Xujie Zhou, et al.
Published: (2023-08-01)
Analysis of Feedback Evaluation for Trust Management Models in the Internet of Things
by: Claudio Marche, et al.
Published: (2021-08-01)
by: Claudio Marche, et al.
Published: (2021-08-01)
Ağ Toplumunda “Ağ” Dışı Kalan Hackerların Muhalefet Biçimi: Hacker Etiği ve Özgür Yazılım
by: Nurullah Sandilaç
Published: (2020-06-01)
by: Nurullah Sandilaç
Published: (2020-06-01)
Hackers: de piratas a defensores del software libre
by: Jorge Lizama Mendoza
Published: (2015-04-01)
by: Jorge Lizama Mendoza
Published: (2015-04-01)
Leak in trusted root certificates management and the method for solving
by: ZHU Guo-dong, et al.
Published: (2005-01-01)
by: ZHU Guo-dong, et al.
Published: (2005-01-01)
Leak in trusted root certificates management and the method for solving
by: ZHU Guo-dong, et al.
Published: (2005-01-01)
by: ZHU Guo-dong, et al.
Published: (2005-01-01)
Scheme of Attribute-Based Disclosure Mobile Trust Negotiation
by: Qiuyun Wang, et al.
Published: (2013-10-01)
by: Qiuyun Wang, et al.
Published: (2013-10-01)
Scheme of Attribute-Based Disclosure Mobile Trust Negotiation
by: Qiuyun Wang, et al.
Published: (2013-10-01)
by: Qiuyun Wang, et al.
Published: (2013-10-01)
Hacker im Schulsystem? Was wir vom Chaos Computerclub lernen könnten.
by: Lothar Bodingbauer
Published: (2011-11-01)
by: Lothar Bodingbauer
Published: (2011-11-01)
HACKER DALAM PERSPEKTIF HUKUM INDONESIA
by: Bambang Hartono
Published: (2014-01-01)
by: Bambang Hartono
Published: (2014-01-01)
Trust evaluation model of power terminal based on equipment portrait
by: Erxia Li, et al.
Published: (2023-12-01)
by: Erxia Li, et al.
Published: (2023-12-01)
A genre trust model for defending shilling attacks in recommender systems
by: Li Yang, et al.
Published: (2021-04-01)
by: Li Yang, et al.
Published: (2021-04-01)
Multi-Mobile Agent Trust Framework for Mitigating Internal Attacks and Augmenting RPL Security
by: Umer Farooq, et al.
Published: (2022-06-01)
by: Umer Farooq, et al.
Published: (2022-06-01)
Ciberfeminismo de investigacción con y entre tecnoartistas y hackers
by: Núria Vergés Bosch, et al.
Published: (2014-12-01)
by: Núria Vergés Bosch, et al.
Published: (2014-12-01)
Trust Models in Wireless Sensor Networks for Defending Against Denial-of-Service Attacks: A Literature Review
by: Lijuan Wang, et al.
Published: (2025-03-01)
by: Lijuan Wang, et al.
Published: (2025-03-01)
Hackers, Hacktivistas e Whistleblowers: o caso português.
by: José Pedro Arruda
Published: (2021-07-01)
by: José Pedro Arruda
Published: (2021-07-01)
Thinking with the Animal-Hacker
by: Helen Pritchard
Published: (2013-01-01)
by: Helen Pritchard
Published: (2013-01-01)
An efficient neighbor nodes trust tagging model for optimized route detection in smart grids with secure data transmission
by: Naga Priyanka Chadalavada, et al.
Published: (2024-06-01)
by: Naga Priyanka Chadalavada, et al.
Published: (2024-06-01)
El flâneur de Benjamin como esqueumorfismo del hacker contemporáneo
by: Helena Maldonado Goti
Published: (2023-08-01)
by: Helena Maldonado Goti
Published: (2023-08-01)
Hackers Against Natural Disasters: accustoming people to risk
by: Gaël Musquet
Published: (2018-12-01)
by: Gaël Musquet
Published: (2018-12-01)
A Trust-Based Model for Secure Routing against RPL Attacks in Internet of Things
by: Syeda Mariam Muzammal, et al.
Published: (2022-09-01)
by: Syeda Mariam Muzammal, et al.
Published: (2022-09-01)
Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks
by: Dilraj Singh, et al.
Published: (2015-09-01)
by: Dilraj Singh, et al.
Published: (2015-09-01)
Multi Trust-based Secure Trust Model for WSNs
by: Tayyab Khan, et al.
Published: (2022-03-01)
by: Tayyab Khan, et al.
Published: (2022-03-01)
Building Trust Through Feedback: A Conceptual Framework for Educators
by: Breana Bayraktar, et al.
Published: (2025-01-01)
by: Breana Bayraktar, et al.
Published: (2025-01-01)
Autoria na web 2.0 no contexto da educação e a ética dos hackers / Authoring on the web 2.0: educational view and hacker ethic
by: Marcia Izabel Fugisawa Souza, et al.
Published: (2011-04-01)
by: Marcia Izabel Fugisawa Souza, et al.
Published: (2011-04-01)
TSIS: A Trust-Based Scheme for Increasing Security in Wireless Sensor Networks
by: Mahdi Dibaei, et al.
Published: (2024-02-01)
by: Mahdi Dibaei, et al.
Published: (2024-02-01)
A Hybrid Trust Model against Insider Packet Drop Attacks in Wireless Sensor Networks
by: Youngho Cho, et al.
Published: (2023-04-01)
by: Youngho Cho, et al.
Published: (2023-04-01)
Predicting individual differences to cyber attacks: Knowledge, arousal, emotional and trust responses
by: Aryn Pyke, et al.
Published: (2024-02-01)
by: Aryn Pyke, et al.
Published: (2024-02-01)
Trust Research on Behavior Evaluation Based on Fuzzy Similarity
by: Limiao Li, et al.
Published: (2020-01-01)
by: Limiao Li, et al.
Published: (2020-01-01)
Sensor Network Environments: A Review of the Attacks and Trust Management Models for Securing Them
by: Kealan Mannix, et al.
Published: (2022-08-01)
by: Kealan Mannix, et al.
Published: (2022-08-01)
Trust model based on individual experience
by: WANG Shao-jie, et al.
Published: (2008-01-01)
by: WANG Shao-jie, et al.
Published: (2008-01-01)
Trust model based on individual experience
by: WANG Shao-jie, et al.
Published: (2008-01-01)
by: WANG Shao-jie, et al.
Published: (2008-01-01)
Building a Reputation Attack Detector for Effective Trust Evaluation in a Cloud Services Environment
by: Salah T. Alshammari, et al.
Published: (2021-09-01)
by: Salah T. Alshammari, et al.
Published: (2021-09-01)
Trusted access scheme for intranet mobile terminal based on encrypted SD card
by: Jiyang LI, et al.
Published: (2019-08-01)
by: Jiyang LI, et al.
Published: (2019-08-01)
Trusted access scheme for intranet mobile terminal based on encrypted SD card
by: LI Jiyang, LIU Zhe, et al.
Published: (2019-08-01)
by: LI Jiyang, LIU Zhe, et al.
Published: (2019-08-01)
5G-Power-Compromised Terminal Threat Detection Based on Atomized Zero-Trust Component
by: GU Zhimin, WANG Ziying, GUO Jing, GUO Yajuan, FENG Jingyu
Published: (2023-02-01)
by: GU Zhimin, WANG Ziying, GUO Jing, GUO Yajuan, FENG Jingyu
Published: (2023-02-01)
Similar Items
-
Hacker attacks as a form of syber terrorism
by: Klisarić Sanja
Published: (2021-01-01) -
¿Qué es ser hacker?
by: Nelson Scariot Esquivel
Published: (2022-05-01) -
¿Qué es la cultura hacker?
by: Nelson Scariot Esquivel
Published: (2022-05-01) -
Behavior and feedback based trust computation in cloud environment
by: Tabassum N. Mujawar, et al.
Published: (2022-09-01) -
A Lightweight Trust Mechanism with Attack Detection for IoT
by: Xujie Zhou, et al.
Published: (2023-08-01)
