Hierarchical-Based Dynamic Scenario-Adaptive Risk Assessment for Power Data Lifecycle
Round 1
Reviewer 1 Report
Comments and Suggestions for AuthorsThe authors present a methodology for dynamic, scenario-adaptive risk assessment designed to address the entire lifecycle of power data. The method is well described but the introduction as well as the tests and results need to be improved. Please consider the following suggestions:
Please enlarge the introduction section by further analyzing previous research work. This will help the readers to understand the contribution of your work better.
Please enlarge Figure 2 to fit the sentences within the flowchart better.
Please avoid using dark backgrounds in Figure 4.
What are the main limitations of your approach? Please elaborate and comment in the paper.
What other applications does the proposed approach might have? Please comment.
I guess section 5 needs a more detailed explanation.
The conclusions mention a “thesis” and mentions a “chapter”. Please check and correct. This is a research paper (instead of a thesis) divided in Sections (instead of chapters).
Author Response
Please see the attachment.
Author Response File: Author Response.pdf
Reviewer 2 Report
Comments and Suggestions for AuthorsAuthors applied predictive analytics and anomaly detection to conduct a thorough examination of diverse data scenarios within the power grid, aiming to proactively identify and mitigate potential security threats. The results of this research demonstrate a significant enhancement in the effectiveness of risk detection and management, leading to improved data protection and operational efficiency. They also studied contributes a scalable, adaptable model for data security risk assessment, meeting the challenges of big data and complex information systems in the power sector.
Author Response
Please see the attachment.
Author Response File: Author Response.pdf
Reviewer 3 Report
Comments and Suggestions for AuthorsThe manuscript titled "Hierarchical Based Dynamic Scenario-Adaptive Risk Assessment for Power Data Lifecycle" proposes a hierarchical analysis method that combines fuzzy comprehensive evaluation to assess data security risks at different stages of the data lifecycle. The manuscript is well-written. However, the description of the fuzzy evaluation method should be improved:
1. On page 9, authors state "A subset of the possible levels of safety for each factor. This is generally categorised into five levels." but then later authors define 6 levels namely, "Very Safe, Safe, Safer, More Safe, More Hazardous, and Hazardous". The authors later refer to the levels using different names, "......10 out of a total 335 of 30 experts consider it to be "very safe", and 5 out of 30 consider it to be "safe". think it is 336 "safe", 5 think it is "relatively safe", 10 think it is "relatively dangerous", and 0 think it is 337 "dangerous". "......". I request the authors to be consistent to avoid confusion among the readers. The grammatical/typing errors should also be removed in this paragraph.
Author Response
Please see the attachment.
Author Response File: Author Response.pdf
Round 2
Reviewer 1 Report
Comments and Suggestions for AuthorsThe authors answered to all my comments.