A review of cryptographic impact in cybersecurity on smart grid: threat, challenges and countermeasures
The continuous development of information communication technology assists the traditional electricity grid to become a modern integrated platform. As Internet-of-Thing’s technologies involve in smart grid features together with delivery emerging services utility side to end user via unreliable chan...
| Main Authors: | Hasan, Md Mehedi, Mohd Ariffin, Noor Afiza, Mohd Sani, Nor Fazlida |
|---|---|
| Format: | Article |
| Published: |
Little Lion Scientific
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/96008/ |
Similar Items
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018)
by: Baskerville, Richard, et al.
Published: (2018)
LIKA: lightweight identity based key agreement protocol for secure data transmission in advanced metering infrastructure of smart grid
by: Hasan, Md Mehedi, et al.
Published: (2022)
by: Hasan, Md Mehedi, et al.
Published: (2022)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Efficient mutual authentication using kerberos for resource constraint smart meter in advanced metering infrastructure
by: Hasan, Md Mehedi, et al.
Published: (2023)
by: Hasan, Md Mehedi, et al.
Published: (2023)
The Challenges and Solutions of Cybersecurity Among Malaysian Companies
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)
Integration of electric vehicles in smart grids : A review of the advantages and challenges of vehicle-to-grid technology
by: Asghar, Rafiq, et al.
Published: (2022)
by: Asghar, Rafiq, et al.
Published: (2022)
Moderating effect of self-efficacy in the relationship between knowledge, attitude and environment behavior of cybersecurity awareness
by: Che Zainal, Norhafizah, et al.
Published: (2021)
by: Che Zainal, Norhafizah, et al.
Published: (2021)
Plan recognition scheme using multi-factors authentication for smart card online system
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2014)
Enhancing smart grid with microgrids: Challenges and opportunities
by: Yoldas, Y., et al.
Published: (2017)
by: Yoldas, Y., et al.
Published: (2017)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Ethics, Cybersecurity and the Military
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
Metamorphic testing for cybersecurity
by: Chen, Tsong Yueh, et al.
Published: (2016)
by: Chen, Tsong Yueh, et al.
Published: (2016)
Potential Challenges: Integrating Renewable Energy with the Smart Grid
by: Shafiullah, G., et al.
Published: (2010)
by: Shafiullah, G., et al.
Published: (2010)
Countermeasure for Mould Growths in Operation Theatre
by: Teoh, Yan Heng, et al.
Published: (2015)
by: Teoh, Yan Heng, et al.
Published: (2015)
Tyre Cavity Coupling Resonance and Countermeasures
by: Zamri, Mohamed, et al.
Published: (2012)
by: Zamri, Mohamed, et al.
Published: (2012)
Security and privacy issues in medical internet of things: Overview, countermeasures, challenges and future directions
by: Elhoseny, M., et al.
Published: (2021)
by: Elhoseny, M., et al.
Published: (2021)
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
Algebraic analysis of a rabin-like cryptosystem and its countermeasures
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2017)
Understanding Cybersecurity: Ethical and Conceptual Considerations
by: Ford, Shannon
Published: (2013)
by: Ford, Shannon
Published: (2013)
Impact of training on cybersecurity awareness / Zuriani Ahmad Zukarnain ... [et al].
by: Ahmad Zukarnain, Zuriani, et al.
Published: (2020)
by: Ahmad Zukarnain, Zuriani, et al.
Published: (2020)
A review of cloud security based on cryptographic mechanisms
by: Abd, Sura Khalil, et al.
Published: (2014)
by: Abd, Sura Khalil, et al.
Published: (2014)
Investigation on the Possible Impacts of Smart Grids in the Modern Society
by: Ang, Keat Hong
Published: (2016)
by: Ang, Keat Hong
Published: (2016)
Smart grid communication
by: Shabani, Hikma, et al.
Published: (2011)
by: Shabani, Hikma, et al.
Published: (2011)
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
by: Z'aba, Muhammad Reza, et al.
Published: (2006)
A brief review on smart grid residential network schemes
by: Noshin Fatima,, et al.
Published: (2020)
by: Noshin Fatima,, et al.
Published: (2020)
An overview of attacks against digital watermarking and their respective countermeasures
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
Smart grid communication layer
by: Lokeman, Norulhuda, et al.
Published: (2011)
by: Lokeman, Norulhuda, et al.
Published: (2011)
Exploring the use of blockchain technology in cybersecurity and data science
by: Rahmat, Robaisya, et al.
Published: (2023)
by: Rahmat, Robaisya, et al.
Published: (2023)
Digital empathy and supply chain cybersecurity challenges: concept, framework and solutions for small-medium enterprises
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Blockchain-enabled cybersecurity framework for healthcare domain
by: Islam, Md Shohidul
Published: (2025)
by: Islam, Md Shohidul
Published: (2025)
Big Energy Data Management for Smart Grids—Issues, Challenges and Recent Developments
by: Potdar, Vidyasagar, et al.
Published: (2018)
by: Potdar, Vidyasagar, et al.
Published: (2018)
Provider independent cryptographic tools
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
The study of dangers and countermeasures of fake news in social media
by: Xie, Yuting, et al.
Published: (2021)
by: Xie, Yuting, et al.
Published: (2021)
The role of cybersecurity on the performance of Malaysian higher education institutions
by: Balla Moussa Dioubate,, et al.
Published: (2023)
by: Balla Moussa Dioubate,, et al.
Published: (2023)
Palm oil expansion in Malaysia and its countermeasures through policy window and biorefinery approach
by: Hassan, Mohd Ali, et al.
Published: (2024)
by: Hassan, Mohd Ali, et al.
Published: (2024)
Leveraging web and behavioural data for usable adaptive cybersecurity
by: Addae, Joyce Hoese
Published: (2019)
by: Addae, Joyce Hoese
Published: (2019)
Measuring attitude towards personal data for adaptive cybersecurity
by: Addae, Joyce Hoese, et al.
Published: (2017)
by: Addae, Joyce Hoese, et al.
Published: (2017)
Cybersecurity, Trustworthiness and Resilient Systems: Guiding Values for Policy
by: Henschke, A., et al.
Published: (2017)
by: Henschke, A., et al.
Published: (2017)
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
A review of the impacts of degradation threats on soil properties in the UK
by: Gregory, A.S., et al.
Published: (2015)
by: Gregory, A.S., et al.
Published: (2015)
Similar Items
-
Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective
by: Baskerville, Richard, et al.
Published: (2018) -
LIKA: lightweight identity based key agreement protocol for secure data transmission in advanced metering infrastructure of smart grid
by: Hasan, Md Mehedi, et al.
Published: (2022) -
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018) -
Efficient mutual authentication using kerberos for resource constraint smart meter in advanced metering infrastructure
by: Hasan, Md Mehedi, et al.
Published: (2023) -
The Challenges and Solutions of Cybersecurity Among Malaysian Companies
by: Puteri Fadzline, Muhamad Tamyez
Published: (2019)