Intrusion detection using a fuzzy genetics-based learning algorithm
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Fuzzy risk analysis based on fuzzy numbers with different shapes and different deviations
Expert Systems with Applications: An International Journal
A new approach for fuzzy risk analysis based on similarity measures of generalized fuzzy numbers
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Intrusion detection using fuzzy association rules
Applied Soft Computing
Journal of Network and Computer Applications
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
A method for fuzzy risk analysis based on the new similarity of trapezoidal fuzzy numbers
Expert Systems with Applications: An International Journal
Hacking Risk Analysis of Web Trojan in Electric Power System
WISM '09 Proceedings of the 2009 International Conference on Web Information Systems and Mining
ISNN'10 Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part II
Denial of service detection with hybrid fuzzy set based feed forward neural network
ISNN'10 Proceedings of the 7th international conference on Advances in Neural Networks - Volume Part II
Botnet traffic detection using hidden Markov models
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 0.00 |
The cyber attack risks are threatening the smart grid security. Malicious worm could spread from meter to meter to take out power in a simulated attack. The North American Electric Reliability Corporation (NERC) has thus developed several iterations of cyber security standards. According to the NERC cyber standards CIP-002-2 requirements, in this paper, we present cyber security risk analysis using computational intelligence methods and review on core methods, such as in risk assessment HHM, IIM, RFRM algorithms, fault analysis FTA, ETA, FMEA, FMECA algorithms, fuzzy sets, intrusion detection systems, artificial neural networks and artificial immune systems. Through the analysis of the core computational intelligence algorithms used in the smart grid cyber security in power system network security lab, we clearly defined existing smart grid research challenges.