All industries rely on smart grid infrastructures and systems to energy systems to provide power supply to industries and individual users for innovation, economic growth and sustainability as part of SGD goals. However, recent attacks on the smart grid using various attack methods have made it inevitable to provide security implementation for sustainable development infrastructures and economic growth. Agent-based simulation (ABS) considers modelling complex adaptive systems in a heterogeneous environment to detect their interactive behaviours and attacks. Agents can represent people, households, and business entities in a smart grid system. ABSs are created with three core attributes, the declaration of the agent’s architectures and asso...
Smart Grids (SGs) are Critical Infrastructures (CI), which are responsible for controlling and main...
Energy grids and critical infrastructures in general undergo drastic changes. Specifically, energy ...
With their ever increasing malicious capabilities and potential to infect a vast majority of compute...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
The vision of a smart grid is to provide a modern, resilient, and secure electric power grid as it b...
Sensor networks and Internet of Things (IoT) are useful for many purposes such as military defense, ...
The electrical power grid is evolving into a more modern electric grid, called smart grid. Smart gri...
This paper presents a distributed multi-agent scheme for enhancing the cyber security of smart grids...
Sensor networks and Internet of Things (IoT) are useful for many purposes such as military defense, ...
This paper presents a distributed multi-agent scheme for enhancing the cyber security of smart grids...
Smart Grids (SGs) are Critical Infrastructures (CI), which are responsible for controlling and main...
The power grid is a highly complex control system and one of the most impressive engineering feats o...
This thesis presents the development and evaluation of a distributed agent based system using reputa...
Smart Grids (SGs) are Critical Infrastructures (CI), which are responsible for controlling and main...
Energy grids and critical infrastructures in general undergo drastic changes. Specifically, energy ...
With their ever increasing malicious capabilities and potential to infect a vast majority of compute...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
Smart grid employs Information and Communication Technology (ICT) infrastructure and network connect...
The vision of a smart grid is to provide a modern, resilient, and secure electric power grid as it b...
Sensor networks and Internet of Things (IoT) are useful for many purposes such as military defense, ...
The electrical power grid is evolving into a more modern electric grid, called smart grid. Smart gri...
This paper presents a distributed multi-agent scheme for enhancing the cyber security of smart grids...
Sensor networks and Internet of Things (IoT) are useful for many purposes such as military defense, ...
This paper presents a distributed multi-agent scheme for enhancing the cyber security of smart grids...
Smart Grids (SGs) are Critical Infrastructures (CI), which are responsible for controlling and main...
The power grid is a highly complex control system and one of the most impressive engineering feats o...
This thesis presents the development and evaluation of a distributed agent based system using reputa...
Smart Grids (SGs) are Critical Infrastructures (CI), which are responsible for controlling and main...
Energy grids and critical infrastructures in general undergo drastic changes. Specifically, energy ...
With their ever increasing malicious capabilities and potential to infect a vast majority of compute...