Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (940)

Search Parameters:
Keywords = denial

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 9430 KB  
Article
Detection and Localization of the FDI Attacks in the Presence of DoS Attacks in Smart Grid
by Rajendra Shrestha, Manohar Chamana, Olatunji Adeyanju, Mostafa Mohammadpourfard and Stephen Bayne
Smart Cities 2025, 8(5), 144; https://doi.org/10.3390/smartcities8050144 - 1 Sep 2025
Abstract
Smart grids (SGs) are becoming increasingly complex with the integration of communication, protection, and automation technologies. However, this digital transformation has introduced new vulnerabilities, especially false data injection attacks (FDIAs) and Denial of Service (DoS) attacks. FDIAs can subtly corrupt measurement data, misleading [...] Read more.
Smart grids (SGs) are becoming increasingly complex with the integration of communication, protection, and automation technologies. However, this digital transformation has introduced new vulnerabilities, especially false data injection attacks (FDIAs) and Denial of Service (DoS) attacks. FDIAs can subtly corrupt measurement data, misleading operators without triggering traditional bad data detection (BDD) methods in state estimation (SE), while DoS attacks disrupt the availability of sensor data, affecting grid observability. This paper presents a deep learning-based framework for detecting and localizing FDIAs, including under DoS conditions. A hybrid CNN, Transformer, and BiLSTM model captures spatial, global, and temporal correlations to forecast measurements and detect anomalies using a threshold-based approach. For further detection and localization, a Multi-layer Perceptron (MLP) model maps forecast errors to the compromised sensor locations, effectively complementing or replacing BDD methods. Unlike conventional SE, the approach is fully data-driven and does not require knowledge of grid topology. Experimental evaluation on IEEE 14–bus and 118–bus systems demonstrates strong performance for the FDIA condition, including precision of 0.9985, recall of 0.9980, and row-wise accuracy (RACC) of 0.9670 under simultaneous FDIA and DoS conditions. Furthermore, the proposed method outperforms existing machine learning models, showcasing its potential for real-time cybersecurity and situational awareness in modern SGs. Full article
19 pages, 3031 KB  
Article
Cyberattack Detection and Classification of Power Converters in Islanded Microgrids Using Deep Learning Approaches
by Nanthaluxsan Eswaran, Jalini Sivarajah, Kopikanth Karunakaran, Logeeshan Velmanickam, Sisil Kumarawadu and Chathura Wanigasekara
Electronics 2025, 14(17), 3409; https://doi.org/10.3390/electronics14173409 - 27 Aug 2025
Viewed by 233
Abstract
The integration of Internet of Things (IoT) technologies into islanded microgrids has increased their vulnerability to cyberattacks, particularly those targeting critical components such as power converters within an islanded AC microgrid. This study investigates the impact of False Data Injection (FDI) and Denial [...] Read more.
The integration of Internet of Things (IoT) technologies into islanded microgrids has increased their vulnerability to cyberattacks, particularly those targeting critical components such as power converters within an islanded AC microgrid. This study investigates the impact of False Data Injection (FDI) and Denial of Service (DoS) attacks on various power converters, including DC–DC boost converters, DC–AC converters, battery inverters, and DC–DC buck–boost converters, modeled in MATLAB/Simulink. A dataset of healthy and compromised operational parameters, including voltage and current, was generated under simulated attack conditions. To enhance system resilience, a deep learning-based detection and classification framework was proposed. After evaluating various deep learning models, including Deep Neural Networks (DNNs), Artificial Neural Networks (ANNs), Support Vector Machines (SVMs), Long Short-Term Memory (LSTM), and Feedforward Neural Networks (FNNs), the final system integrates an FNN for rapid attack detection and an LSTM model for accurate classification. Real-time simulation validation demonstrated a detection accuracy of 95% and a classification accuracy of 92%, with minimal computational overhead and fast response times. These findings emphasize the importance of implementing intelligent and efficient cybersecurity measures to ensure the secure and reliable operation of islanded microgrids against evolving cyberattacks. Full article
(This article belongs to the Special Issue Deep Learning for Power Transmission and Distribution)
Show Figures

Figure 1

22 pages, 339 KB  
Article
Socially Distancing the ‘Irregular’ Migrant: An Arendtian Political Analysis of Contemporary UK Asylum Law
by Joel Platt
Laws 2025, 14(5), 62; https://doi.org/10.3390/laws14050062 - 27 Aug 2025
Viewed by 315
Abstract
Utilising Arendt’s ‘right to have rights’ thesis not only as an observation on citizenship but as an intrinsic eligibility and political opportunity for the stateless, this paper outlines how the Nationality and Borders Act 2022 and Illegal Migration Act 2023 do not merely [...] Read more.
Utilising Arendt’s ‘right to have rights’ thesis not only as an observation on citizenship but as an intrinsic eligibility and political opportunity for the stateless, this paper outlines how the Nationality and Borders Act 2022 and Illegal Migration Act 2023 do not merely continue the general trend of criminalising migrants but take the further step of socially distancing the securitised migrant object. The recent legislation provides that those who arrive in the UK via ‘irregular means’ (i.e., small boats) will likely have their asylum claims deemed ‘inadmissible’. The lack of a ‘negotiated settlement’ in the asylum complex has been well noted; however, the systematic prejudgement and consequent bureaucratic social distancing inherent in the new legislation now threatens to remove even the prospect of negotiation. The means of arrival instantly proving decisive precludes the possibility for asylum seekers to present evidence that they are genuine refugees, and, with it, the politico-legal space and opportunity for the ‘irregular’ person to generally make themselves seen and heard is maliciously obstructed. The result is not just the denial of humanity and concomitant human dues (rights), but a distinct move towards denial of even the possibility of humanity (the right to have rights). Such works to distance system administrators from issues of vulnerability, assuredly direful consequences, and humanness itself, as is essential for the expansion of a system where basic human rights are so lacking. Full article
17 pages, 1852 KB  
Article
A Hybrid Classical-Quantum Neural Network Model for DDoS Attack Detection in Software-Defined Vehicular Networks
by Varun P. Sarvade, Shrirang Ambaji Kulkarni and C. Vidya Raj
Information 2025, 16(9), 722; https://doi.org/10.3390/info16090722 - 25 Aug 2025
Viewed by 368
Abstract
A typical Software-Defined Vehicular Network (SDVN) is open to various cyberattacks because of its centralized controller-based framework. A cyberattack, such as a Distributed Denial of Service (DDoS) attack, can easily overload the central SDVN controller. Thus, we require a functional DDoS attack recognition [...] Read more.
A typical Software-Defined Vehicular Network (SDVN) is open to various cyberattacks because of its centralized controller-based framework. A cyberattack, such as a Distributed Denial of Service (DDoS) attack, can easily overload the central SDVN controller. Thus, we require a functional DDoS attack recognition system that can differentiate malicious traffic from normal data traffic. The proposed architecture comprises hybrid Classical-Quantum Machine Learning (QML) methods for detecting DDoS threats. In this work, we have considered three different QML methods, such as Classical-Quantum Neural Networks (C-QNN), Classical-Quantum Boltzmann Machines (C-QBM), and Classical-Quantum K-Means Clustering (C-QKM). Emulations were conducted using a custom-built vehicular network with random movements and varying speeds between 0 and 100 kmph. Also, the performance of these QML methods was analyzed for two different datasets. The results obtained show that the hybrid Classical-Quantum Neural Network (C-QNN) method exhibited better performance in comparison with the other two models. The proposed hybrid C-QNN model achieved an accuracy of 99% and 90% for the UNB-CIC-DDoS dataset and Kaggle DDoS dataset, respectively. The hybrid C-QNN model combines PennyLane’s quantum circuits with traditional methods, whereas the Classical-Quantum Boltzmann Machine (C-QBM) leverages quantum probability distributions for identifying anomalies. Full article
Show Figures

Graphical abstract

32 pages, 1483 KB  
Article
MITM- and DoS-Resistant PUF Authentication for Industrial WSNs via Sensor-Initiated Registration
by Ashraf Alyanbaawi
Computers 2025, 14(9), 347; https://doi.org/10.3390/computers14090347 - 23 Aug 2025
Viewed by 213
Abstract
Industrial Wireless Sensor Networks (IWSNs) play a critical role in Industry 4.0 environments, enabling real-time monitoring and control of industrial processes. However, existing lightweight authentication protocols for IWSNs remain vulnerable to sophisticated security attacks because of inadequate initial authentication phases. This study presents [...] Read more.
Industrial Wireless Sensor Networks (IWSNs) play a critical role in Industry 4.0 environments, enabling real-time monitoring and control of industrial processes. However, existing lightweight authentication protocols for IWSNs remain vulnerable to sophisticated security attacks because of inadequate initial authentication phases. This study presents a security analysis of Gope et al.’s PUF-based authentication protocol for IWSNs and identifies critical vulnerabilities that enable man-in-the-middle (MITM) and denial-of-service (DoS) attacks. We demonstrate that Gope et al.’s protocol is susceptible to MITM attacks during both authentication and Secure Periodical Data Collection (SPDC), allowing adversaries to derive session keys and compromise communication confidentiality. Our analysis reveals that the sensor registration phase of the protocol lacks proper authentication mechanisms, enabling attackers to perform unauthorized PUF queries and subsequently mount successful attacks. To address these vulnerabilities, we propose an enhanced authentication scheme that introduces a sensor-initiated registration process. In our improved protocol, sensor nodes generate and control PUF challenges rather than passively responding to gateway requests. This modification prevents unauthorized PUF queries while preserving the lightweight characteristics essential for resource-constrained IWSN deployments. Security analysis demonstrates that our enhanced scheme effectively mitigates the identified MITM and DoS attacks without introducing significant computational or communication overhead. The proposed modifications maintain compatibility with the existing IWSN infrastructure while strengthening the overall security posture. Comparative analysis shows that our solution addresses the security weaknesses of the original protocol while preserving its practical advantages for industrial use. The enhanced protocol provides a practical and secure solution for real-time data access in IWSNs, making it suitable for deployment in mission-critical industrial environments where both security and efficiency are paramount. Full article
(This article belongs to the Section Internet of Things (IoT) and Industrial IoT)
Show Figures

Figure 1

39 pages, 9583 KB  
Article
Neural Network Method of Analysing Sensor Data to Prevent Illegal Cyberattacks
by Serhii Vladov, Vladimir Jotsov, Anatoliy Sachenko, Oleksandr Prokudin, Andrii Ostapiuk and Victoria Vysotska
Sensors 2025, 25(17), 5235; https://doi.org/10.3390/s25175235 - 22 Aug 2025
Viewed by 575
Abstract
This article develops a method for analysing sensor data to prevent cyberattacks using a modified LSTM network. This method development is based on the fact that in the context of the rapid increase in sensor devices used in critical infrastructure, it is becoming [...] Read more.
This article develops a method for analysing sensor data to prevent cyberattacks using a modified LSTM network. This method development is based on the fact that in the context of the rapid increase in sensor devices used in critical infrastructure, it is becoming an urgent task to ensure these systems’ security from various types of attacks, such as data forgery, man-in-the-middle attacks, and denial of service. The method is based on predicting normal system behaviour using a modified LSTM network, which allows for effective prediction of sensor data because the F1 score = 0.90, as well as on analysing anomalies detected through residual values, which makes the method highly sensitive to changes in data. The main result is high accuracy of attack detection (precision = 0.92), achieved through a hybrid approach combining prediction with statistical deviation analysis. During the computational experiment, the developed method demonstrated real-time efficiency with minimal computational costs, providing accuracy up to 92% and recall up to 89%, which is confirmed by high AUC = 0.94 values. These results show that the developed method is effectively protecting critical infrastructure facilities with limited computing resources, which is especially important for cyber police. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

21 pages, 854 KB  
Article
An Event-Triggered Observer-Based Control Approach for Enhancing Resilience of Cyber–Physical Systems Under Markovian Cyberattacks
by Eya Hassine, Assem Thabet, Noussaiba Gasmi and Ghazi Bel Haj Frej
Actuators 2025, 14(8), 412; https://doi.org/10.3390/act14080412 - 21 Aug 2025
Viewed by 204
Abstract
This paper presents a resilient observer-based and event-triggered control scheme for discrete-time Cyber–Physical Systems (CPS) under Markovian Cyber-Attacks (MCA). The proposed framework integrates a Luenberger observer for cyberattack detection with a state-feedback controller designed to preserve system stability in the presence of Denial-of-Service [...] Read more.
This paper presents a resilient observer-based and event-triggered control scheme for discrete-time Cyber–Physical Systems (CPS) under Markovian Cyber-Attacks (MCA). The proposed framework integrates a Luenberger observer for cyberattack detection with a state-feedback controller designed to preserve system stability in the presence of Denial-of-Service (DoS) and False Data Injection (FDI) attacks. Attack detection is achieved through residual signal generation combined with Markovian modeling of the attack dynamics. System stability is guaranteed by formulating relaxed Linear Matrix Inequality (LMI) conditions that incorporate relaxation variables, a diagonal Lyapunov function, the S-procedure, and congruence transformations. Moreover, the Event-Triggered Mechanism (ETM) efficiently reduces communication load without degrading control performance. Numerical simulations conducted on a three-tank system benchmark confirm enhanced detection accuracy, faster recovery, and strong robustness against uncertainties. Full article
Show Figures

Figure 1

19 pages, 991 KB  
Article
Enhancing Machine Learning-Based DDoS Detection Through Hyperparameter Optimization
by Shao-Rui Chen, Shiang-Jiun Chen and Wen-Bin Hsieh
Electronics 2025, 14(16), 3319; https://doi.org/10.3390/electronics14163319 - 20 Aug 2025
Viewed by 396
Abstract
In recent years, the occurrence and complexity of Distributed Denial of Service (DDoS) attacks have escalated significantly, posing threats to the availability, performance, and security of networked systems. With the rapid progression of Artificial Intelligence (AI) and Machine Learning (ML) technologies, attackers can [...] Read more.
In recent years, the occurrence and complexity of Distributed Denial of Service (DDoS) attacks have escalated significantly, posing threats to the availability, performance, and security of networked systems. With the rapid progression of Artificial Intelligence (AI) and Machine Learning (ML) technologies, attackers can leverage intelligent tools to automate and amplify DDoS attacks with minimal human intervention. The increasing sophistication of such attacks highlights the pressing need for more robust and precise detection methodologies. This research proposes a method to enhance the effectiveness of ML models in detecting DDoS attacks based on hyperparameter tuning. By optimizing model parameters, the proposed approach is going to enhance the performance of ML models in identifying DDoS attacks. The CIC-DDoS2019 dataset is utilized in this study as it offers a comprehensive set of real-world DDoS attack scenarios across various protocols and services. The proposed methodology comprises key stages, including data preprocessing, data splitting, and model training, validation, and testing. Three ML models are trained and tuned using an adaptive GridSearchCV (Cross Validation) strategy to identify optimal parameter configurations. The results demonstrate that our method significantly improves performance and efficiency compared with the general GridSearchCV. The SVM model achieves 99.87% testing accuracy and requires approximately 28% less execution time than the general GridSearchCV. The LR model achieves 99.6830% testing accuracy with an execution time of 16.90 s, maintaining the same testing accuracy but reducing the execution time by about 22.8%. The KNN model achieves 99.8395% testing accuracy and 2388.89 s of execution time, also preserving accuracy while decreasing the execution time by approximately 63%. These results indicate that our approach enhances DDoS detection performance and efficiency, offering novel insights into the practical application of hyperparameter tuning for improving ML model performance in real-world scenarios. Full article
(This article belongs to the Special Issue Advancements in AI-Driven Cybersecurity and Securing AI Systems)
Show Figures

Figure 1

20 pages, 3174 KB  
Review
Threat Landscape and Integrated Cybersecurity Framework for V2V and Autonomous Electric Vehicles
by Kithmini Godewatte Arachchige, Ghanem Alkaabi, Mohsin Murtaza, Qazi Emad Ul Haq, Abedallah Zaid Abualkishik and Cheng-Chi Lee
World Electr. Veh. J. 2025, 16(8), 469; https://doi.org/10.3390/wevj16080469 - 18 Aug 2025
Viewed by 635
Abstract
This study conducts a detailed analysis of cybersecurity threats, including artificial intelligence (AI)-driven cyber-attacks targeting vehicle-to-vehicle (V2V) and electric vehicle (EV) communications within the rapidly evolving field of connected and autonomous vehicles (CAVs). As autonomous and electric vehicles become increasingly integrated into daily [...] Read more.
This study conducts a detailed analysis of cybersecurity threats, including artificial intelligence (AI)-driven cyber-attacks targeting vehicle-to-vehicle (V2V) and electric vehicle (EV) communications within the rapidly evolving field of connected and autonomous vehicles (CAVs). As autonomous and electric vehicles become increasingly integrated into daily life, their susceptibility to cyber threats such as replay, jamming, spoofing, and denial-of-service (DoS) attacks necessitates the development of robust cybersecurity measures. Additionally, EV-specific threats, including battery management system (BMS) exploitation and compromised charging interfaces, introduce distinct vulnerabilities requiring specialized attention. This research proposes a comprehensive and integrated cybersecurity framework that rigorously examines current V2V, vehicle-to-everything (V2X), and EV-specific systems through systematic threat assessments, vulnerability analyses, and the deployment of advanced security controls. Unlike previous state-of-the-art approaches, which primarily focus on isolated threats or specific components such as V2V protocols, the proposed framework provides a holistic cybersecurity strategy addressing the entire communication stack, EV subsystems, and incorporates AI-driven threat detection mechanisms. This comprehensive and integrated approach addresses critical gaps found in the existing literature, making it significantly more adaptable and resilient against evolving cyber-attacks. Our framework aligns with industry standards and regulatory requirements, significantly enhancing the security, safety, and reliability of modern transportation systems. By incorporating specialized cryptographic techniques, secure protocols, and continuous monitoring mechanisms, the proposed approach ensures robust protection against sophisticated cyber threats, thereby safeguarding vehicle operations and user privacy. Full article
Show Figures

Figure 1

35 pages, 4321 KB  
Review
An Overview of SDN Issues—A Case Study and Performance Evaluation of a Secure OpenFlow Protocol Implementation
by Hugo Riggs, Asadullah Khalid and Arif I. Sarwat
Electronics 2025, 14(16), 3244; https://doi.org/10.3390/electronics14163244 - 15 Aug 2025
Viewed by 674
Abstract
Software-Defined Networking (SDN) is a network architecture that decouples the control plane from the data plane, enabling centralized, programmable management of network traffic. SDN introduces centralized control and programmability to modern networks, improving flexibility while also exposing new security vulnerabilities across the application, [...] Read more.
Software-Defined Networking (SDN) is a network architecture that decouples the control plane from the data plane, enabling centralized, programmable management of network traffic. SDN introduces centralized control and programmability to modern networks, improving flexibility while also exposing new security vulnerabilities across the application, control, and data planes. This paper provides a comprehensive overview of SDN security threats and defenses, covering recent developments in controller hardening, trust management, route optimization, and anomaly detection. Based on these findings, we present a comparative analysis of SDN controllers in terms of performance, scalability, and deployment complexity. This culminates in the introduction of the Cloud-to-Edge Layer Two (CELT)-Secure switch, a virtual OpenFlow-based data-plane security mechanism. CELT-Secure detects and blocks Internet Control Message Protocol flooding attacks in approximately two seconds and actively disconnects hosts engaging in Address Resolution Protocol-based man-in-the-middle attacks. In comparative testing, it achieved detection performance 10.82 times faster than related approaches. Full article
Show Figures

Figure 1

15 pages, 3236 KB  
Article
Analysis of OpenCV Security Vulnerabilities in YOLO v10-Based IP Camera Image Processing Systems for Disaster Safety Management
by Do-Yoon Jung and Nam-Ho Kim
Electronics 2025, 14(16), 3216; https://doi.org/10.3390/electronics14163216 - 13 Aug 2025
Viewed by 439
Abstract
This paper systematically analyzes security vulnerabilities that may occur during the OpenCV library and IP camera linkage process for the YOLO v10-based IP camera image processing system used in the disaster safety management field. Recently, the use of AI-based real-time image analysis technology [...] Read more.
This paper systematically analyzes security vulnerabilities that may occur during the OpenCV library and IP camera linkage process for the YOLO v10-based IP camera image processing system used in the disaster safety management field. Recently, the use of AI-based real-time image analysis technology in disaster response and safety management systems has been increasing, but it has been confirmed that open source-based object detection frameworks and security vulnerabilities in IP cameras can pose serious threats to the reliability and safety of actual systems. In this study, the structure of an image processing system that applies the latest YOLO v10 algorithm was analyzed, and major security threats (e.g., remote code execution, denial of service, data tampering, authentication bypass, etc.) that might occur during the IP camera image collection and processing process using OpenCV were identified. In particular, the possibility of attacks due to insufficient verification of external inputs (model files, configuration files, image data, etc.), failure to set an initial password, and insufficient encryption of network communication sections were presented with cases. These problems could lead to more serious results in mission-critical environments such as disaster safety management. Full article
Show Figures

Figure 1

29 pages, 919 KB  
Article
DDoS Defense Strategy Based on Blockchain and Unsupervised Learning Techniques in SDN
by Shengmin Peng, Jialin Tian, Xiangyu Zheng, Shuwu Chen and Zhaogang Shu
Future Internet 2025, 17(8), 367; https://doi.org/10.3390/fi17080367 - 13 Aug 2025
Viewed by 435
Abstract
With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from the data plane, allowing a [...] Read more.
With the rapid development of technologies such as cloud computing, big data, and the Internet of Things (IoT), Software-Defined Networking (SDN) is emerging as a new network architecture for the modern Internet. SDN separates the control plane from the data plane, allowing a central controller, the SDN controller, to quickly direct the routing devices within the topology to forward data packets, thus providing flexible traffic management for communication between information sources. However, traditional Distributed Denial of Service (DDoS) attacks still significantly impact SDN systems. This paper proposes a novel dual-layer strategy capable of detecting and mitigating DDoS attacks in an SDN network environment. The first layer of the strategy enhances security by using blockchain technology to replace the SDN flow table storage container in the northbound interface of the SDN controller. Smart contracts are then used to process the stored flow table information. We employ the time window algorithm and the token bucket algorithm to construct the first layer strategy to defend against obvious DDoS attacks. To detect and mitigate less obvious DDoS attacks, we design a second-layer strategy that uses a composite data feature correlation coefficient calculation method and the Isolation Forest algorithm from unsupervised learning techniques to perform binary classification, thereby identifying abnormal traffic. We conduct experimental validation using the publicly available DDoS dataset CIC-DDoS2019. The results show that using this strategy in the SDN network reduces the average deviation of round-trip time (RTT) by approximately 38.86% compared with the original SDN network without this strategy. Furthermore, the accuracy of DDoS attack detection reaches 97.66% and an F1 score of 92.2%. Compared with other similar methods, under comparable detection accuracy, the deployment of our strategy in small-scale SDN network topologies provides faster detection speeds for DDoS attacks and exhibits less fluctuation in detection time. This indicates that implementing this strategy can effectively identify DDoS attacks without affecting the stability of data transmission in the SDN network environment. Full article
(This article belongs to the Special Issue DDoS Attack Detection for Cyber–Physical Systems)
Show Figures

Figure 1

32 pages, 3720 KB  
Article
Stackade Ensemble Learning for Resilient Forecasting Against Missing Values, Adversarial Attacks, and Concept Drift
by Mohd Hafizuddin Bin Kamilin and Shingo Yamaguchi
Appl. Sci. 2025, 15(16), 8859; https://doi.org/10.3390/app15168859 - 11 Aug 2025
Viewed by 311
Abstract
Machine learning is often implemented in smart grids to help with electricity load forecasts, which are challenging to process or compute using conventional approaches. However, most of the proposed techniques were created with the assumption that the data was clean with a consistent [...] Read more.
Machine learning is often implemented in smart grids to help with electricity load forecasts, which are challenging to process or compute using conventional approaches. However, most of the proposed techniques were created with the assumption that the data was clean with a consistent distribution. However, this is not always the case because there can be missing data due to distributed denial-of-service attacks, changes in data patterns that make predictions less accurate, and small perturbations from adversarial attacks that trick the machine learning into making wrong forecasts. While several approaches have been suggested, they are limited to a trivial solution, and the sequential operation needed to correct the input will accumulate errors from inadequate correction. This research proposes a novel approach called Stackade Ensemble Learning. It works by cascading the dependent input corrections with enhanced forecasting models to reduce the error accumulation. Then, the outputs were stacked to combine the results and improve the forecast. The results show 348.4002% of mean absolute error score improvement against the federated solution and 30.3783% against the trivial solution on compounded problem, proving its effectiveness. Full article
Show Figures

Figure 1

20 pages, 1373 KB  
Article
Digital Twin-Driven Intrusion Detection for Industrial SCADA: A Cyber-Physical Case Study
by Ali Sayghe
Sensors 2025, 25(16), 4963; https://doi.org/10.3390/s25164963 - 11 Aug 2025
Viewed by 573
Abstract
The convergence of operational technology (OT) and information technology (IT) in industrial environments, such as water treatment plants, has significantly increased the attack surface of Supervisory Control and Data Acquisition (SCADA) systems. Traditional intrusion detection systems (IDS), which focus solely on network traffic, [...] Read more.
The convergence of operational technology (OT) and information technology (IT) in industrial environments, such as water treatment plants, has significantly increased the attack surface of Supervisory Control and Data Acquisition (SCADA) systems. Traditional intrusion detection systems (IDS), which focus solely on network traffic, often fail to detect stealthy, process-level attacks. This paper proposes a Digital Twin-driven Intrusion Detection (DT-ID) framework that integrates high-fidelity process simulation, real-time sensor modeling, adversarial attack injection, and hybrid anomaly detection using both physical residuals and machine learning. We evaluate the DT-ID framework using a simulated water treatment plant environment, testing against false data injection (FDI), denial-of-service (DoS), and command injection attacks. The system achieves a detection F1-score of 96.3%, a false positive rate below 2.5%, and an average detection latency under 500 ms, demonstrating substantial improvement over conventional rule-based and physics-only IDS in identifying stealthy anomalies. Our findings highlight the potential of cyber-physical digital twins to enhance SCADA security in critical infrastructure. In the following sections, we present the motivation and approach underlying this framework. Full article
(This article belongs to the Section Industrial Sensors)
Show Figures

Figure 1

14 pages, 463 KB  
Article
Stripping Humanity: A Multiple Mediation Analysis of Bias Toward Asexual Parents
by Silvia Di Battista
Sexes 2025, 6(3), 43; https://doi.org/10.3390/sexes6030043 - 7 Aug 2025
Viewed by 274
Abstract
Some studies have shown that the identities of asexual individuals can be devalued and invalidated through processes of dehumanization. However, research examining dehumanization and attitudes toward asexual parents remains scarce. Drawing on the dual model of dehumanization, this experimental study aimed to investigate [...] Read more.
Some studies have shown that the identities of asexual individuals can be devalued and invalidated through processes of dehumanization. However, research examining dehumanization and attitudes toward asexual parents remains scarce. Drawing on the dual model of dehumanization, this experimental study aimed to investigate the denial of traits associated with human nature (HN; denial of basic human emotions) and human uniqueness (HU; denial of a rational mind), as well as perceptions of parenting competence and warmth attributed to different maternal targets. It was hypothesized that asexual mothers would be judged more negatively on the HN dimension, but not on the HU dimension, compared to allosexual mothers. Furthermore, it was hypothesized that perceived behavior toward children, assessed in terms of warmth, would be associated with the denial of HN (but not HU) for asexual mothers. The study involved 298 participants (Mage = 35.97, SD = 15.04), who read one of three scenarios that were identical except for the sexual orientation of the mother: (1) heterosexual allosexual mother; (2) lesbian allosexual mother; and (3) asexual mother. Participants were then asked to evaluate the target with dehumanization measures and perceived parenting behaviors. Results showed that the asexual mother was perceived more negatively than all other targets across all variables. Moreover, parallel mediation analyses revealed that the perception of a lack of warmth in the asexual mother (compared to the other targets) was mediated by the denial of HN, but not HU. In contrast, both HN and HU were found to mediate judgments of parental competence. These findings provide initial evidence of stigma faced by asexual parents, highlighting the need for further research into the attitudes directed toward them. Full article
Show Figures

Figure 1

Back to TopTop