This work is licensed under the Creative Commons Attribution 4.0 International License.
Papia, R., Raj, A. S., & Prasad, M. D. (2018). Intelligence scheme for fault location in a combined overhead transmission line & underground cable. International Journal of Emerging Electric Power Systems, 19.Search in Google Scholar
Askarzadeh, & Alireza. (2017). Solving electrical power system problems by harmony search: a review. Artificial Intelligence Review, 47(2), 1-35.Search in Google Scholar
Tang, Y., Cui, H., Li, F., & Wang, Q. (2019). Review on artificial intelligence in power system transient stability analysis. Zhongguo Dianji Gongcheng Xuebao/Proceedings of the Chinese Society of Electrical Engineering, 39(1), 2-13.Search in Google Scholar
Jiang, D. Y., Zhang, H., Kumar, H., Naveed, Q. N., Takhi, C., & Jagota, V., et al. (2022). Automatic control model of power information system access based on artificial intelligence technology. Mathematical Problems in Engineering, 2022.Search in Google Scholar
Stock, S., Babazadeh, D., & Becker, C. (2021). Applications of artificial intelligence in distribution power system operation. IEEE Access.Search in Google Scholar
Sharma, S., Sabitha, B., Prabhakaran, A., Chavan, M., & Srivastava, R. (2022). A hybrid swarm intelligence approach for resolving reactive power dispatch issues in power system: optimal placement and sizing of upfc. Advances in engineering software.Search in Google Scholar
Vincent, E., Korki, M., Seyedmahmoudian, M., Stojcevski, A., & Mekhilef, S. (2023). Detection of false data injection attacks in cyber–physical systems using graph convolutional network. Electric Power Systems Research, 217, 109118-.Search in Google Scholar
Sagar, D., & Saidireddy, M. (2023). Security measurement in lte/lte-a network based on zs-lr feature selection technique and um-tgan attack detection technique. Expert Systems with Applications.Search in Google Scholar
Milano, F., & Gomez-Exposito, A. (2020). Detection of cyber-attacks of power systems through benford’s law. IEEE Transactions on Smart Grid, PP(99), 1-1.Search in Google Scholar
Alimi, O. A., Ouahada, K., & Abu-Mahfouz, A. M. (2020). A review of machine learning approaches to power system security and stability. IEEE Access, PP(99), 1-1.Search in Google Scholar
Kontouras, E., Tzes, A., & Dritsas, L. (2019). Hybrid detection of intermittent cyber-attacks in networked power systems. Energies, 12(24), 4625.Search in Google Scholar
Huang, R., & Li, Y. (2023). Adversarial attack mitigation strategy for machine learning-based network attack detection model in power system. IEEE Transactions on Smart Grid, 14, 2367-2376.Search in Google Scholar
Ding, Y., Ma, K., Pu, T., Wang, X., & Zhang, D. (2021). A deep learning-based classification scheme for false data injection attack detection in power system. Electronics, 10(12), 1459.Search in Google Scholar
Wu, M., Roy, R., Torre, P. S., & Hidalgo-Gonzalez, P. (2022). Effectiveness of learning algorithms with attack and defense mechanisms for power systems. Electric Power Systems Research.Search in Google Scholar
Fei, J., Yao, Q., Chen, M., Wang, X., & Fan, J. (2020). The abnormal detection for network traffic of power iot based on device portrait. Scientific Programming, 2020(9), 1-9.Search in Google Scholar
Li, Y. W. Y. (2020). Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system. Journal of systems architecture, 105(1).Search in Google Scholar
Wang, Y., Xing, A., Qu, Z., Han, X., Dong, H., & Georgievitch, P. M. (2022). False data injection attack detection based on interval affine state estimation. Electric Power Systems Research.Search in Google Scholar
Aldwairi, M., & Alansari, D. (2019). N-grams exclusion and inclusion filter for intrusion detection in internet of energy big data systems. Transactions on Emerging Telecommunications Technologies(16).Search in Google Scholar
Kwon, S., Yoo, H., & Shon, T. (2020). Ieee 1815.1-based power system security with bidirectional rnn-based network anomalous attack detection for cyber-physical system. IEEE Access, PP(99), 1-1.Search in Google Scholar
Shefaei, A., Mohammadpourfard, M., Mohammadi-Ivatloo, B., & Weng, Y. (2021). Revealing a new vulnerability of distributed state estimation: a data integrity attack and an unsupervised detection algorithm. IEEE Transactions on Control of Network Systems, PP(99), 1-1.Search in Google Scholar
Wang, H., Ruan, J., Zhou, B., Li, C. B., Wu, Q., & Raza, M. Q., et al. (2019). Dynamic data injection attack detection of cyber-physical power systems with uncertainties. IEEE Transactions on Industrial Informatics, 1-1.Search in Google Scholar