Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
by
Irfan, Hafiz Muhammad
, Khan, Sunawar
, Iqbal, Muhammad
, Mazhar, Tehseen
, Haq, Inayatul
, Hamam, Habib
, Ullah, Inam
in
Alternative energy sources
/ Artificial intelligence
/ Blockchain
/ Cryptography
/ cyber security
/ cyberattacks
/ Cybercrime
/ Cybersecurity
/ Cyberterrorism
/ data mining
/ Data security
/ deep learning
/ Electronic devices
/ Energy consumption
/ Genetic algorithms
/ Internet
/ Machine learning
/ Methods
/ Neural networks
/ Packets (communication)
/ Security software
/ Sensors
/ Smart grid
/ Smart sensors
2023
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
by
Irfan, Hafiz Muhammad
, Khan, Sunawar
, Iqbal, Muhammad
, Mazhar, Tehseen
, Haq, Inayatul
, Hamam, Habib
, Ullah, Inam
in
Alternative energy sources
/ Artificial intelligence
/ Blockchain
/ Cryptography
/ cyber security
/ cyberattacks
/ Cybercrime
/ Cybersecurity
/ Cyberterrorism
/ data mining
/ Data security
/ deep learning
/ Electronic devices
/ Energy consumption
/ Genetic algorithms
/ Internet
/ Machine learning
/ Methods
/ Neural networks
/ Packets (communication)
/ Security software
/ Sensors
/ Smart grid
/ Smart sensors
2023
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
by
Irfan, Hafiz Muhammad
, Khan, Sunawar
, Iqbal, Muhammad
, Mazhar, Tehseen
, Haq, Inayatul
, Hamam, Habib
, Ullah, Inam
in
Alternative energy sources
/ Artificial intelligence
/ Blockchain
/ Cryptography
/ cyber security
/ cyberattacks
/ Cybercrime
/ Cybersecurity
/ Cyberterrorism
/ data mining
/ Data security
/ deep learning
/ Electronic devices
/ Energy consumption
/ Genetic algorithms
/ Internet
/ Machine learning
/ Methods
/ Neural networks
/ Packets (communication)
/ Security software
/ Sensors
/ Smart grid
/ Smart sensors
2023
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
Journal Article
Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods
2023
Request Book From Autostore
and Choose the Collection Method
Overview
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the most challenging things to stop. The biggest problem is caused by millions of sensors constantly sending and receiving data packets over the network. Cyberattacks can compromise the smart grid’s dependability, availability, and privacy. Users, the communication network of smart devices and sensors, and network administrators are the three layers of an innovative grid network vulnerable to cyberattacks. In this study, we look at the many risks and flaws that can affect the safety of critical, innovative grid network components. Then, to protect against these dangers, we offer security solutions using different methods. We also provide recommendations for reducing the chance that these three categories of cyberattacks may occur.
This website uses cookies to ensure you get the best experience on our website.