1. IEEE Standards Coordinating Committee 21. 2011. IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation With the Electric Power System (EPS) , End-Use Applications, and Loads . IEEE Std 2030 -2011 (2011), 1–126. https://doi.org/10.1109/IEEESTD.2011.6018239 10.1109/IEEESTD.2011.6018239 IEEE Standards Coordinating Committee 21. 2011. IEEE Guide for Smart Grid Interoperability of Energy Technology and Information Technology Operation With the Electric Power System (EPS), End-Use Applications, and Loads. IEEE Std 2030-2011 (2011), 1–126. https://doi.org/10.1109/IEEESTD.2011.6018239
2. Mohamed Abdel-Basset , Nour Moustafa , and Hossam Hawash . 2022. Privacy-preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semi-supervised Approach . IEEE Transactions on Industrial Informatics( 2022 ), 1–11. https://doi.org/10.1109/TII.2022.3165869 10.1109/TII.2022.3165869 Mohamed Abdel-Basset, Nour Moustafa, and Hossam Hawash. 2022. Privacy-preserved Generative Network for Trustworthy Anomaly Detection in Smart Grids: A Federated Semi-supervised Approach. IEEE Transactions on Industrial Informatics(2022), 1–11. https://doi.org/10.1109/TII.2022.3165869
3. Shaashwat Agrawal , Sagnik Sarkar , Ons Aouedi , Gokul Yenduri , Kandaraj Piamrat , Sweta Bhattacharya , Praveen Kumar Reddy Maddikunta, and Thippa Reddy Gadekallu . 2021 . Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions . (2021). https://doi.org/10.48550/ARXIV.2106.09527 arXiv:2106.09527 10.48550/ARXIV.2106.09527 Shaashwat Agrawal, Sagnik Sarkar, Ons Aouedi, Gokul Yenduri, Kandaraj Piamrat, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, and Thippa Reddy Gadekallu. 2021. Federated Learning for Intrusion Detection System: Concepts, Challenges and Future Directions. (2021). https://doi.org/10.48550/ARXIV.2106.09527 arXiv:2106.09527
4. Role of Information and Communication Technologies in the Smart Grid;Al-Omar Ban;Journal of Emerging Trends in Computing and Information Sciences,2012
5. Scalable, graph-based network vulnerability analysis