This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Bedi, G., Venayagamoorthy, G. K., Singh, R., Brooks, R. R., & Wang, K. C. (2018). Review of Internet of Things (IoT) in electric power and energy systems. IEEE Internet of Things Journal, 5(2), 847-870.BediG.VenayagamoorthyG. K.SinghR.BrooksR. R. & WangK. C. (2018). Review of Internet of Things (IoT) in electric power and energy systems. IEEE Internet of Things Journal, 5(2), 847-870.Search in Google Scholar
Choi, C., & Choi, J. (2019). Ontology-based security context reasoning for power IoT-cloud security service. IEEE Access, 7, 110510-110517.ChoiC. & ChoiJ. (2019). Ontology-based security context reasoning for power IoT-cloud security service. IEEE Access, 7, 110510-110517.Search in Google Scholar
Tang, X., & Ding, C. (2021). Information security terminal architecture of power transportation mobile internet of things based on big data analysis. Wireless Communications and Mobile Computing, 2021(1), 5544716.TangX. & DingC. (2021). Information security terminal architecture of power transportation mobile internet of things based on big data analysis. Wireless Communications and Mobile Computing, 2021(1), 5544716.Search in Google Scholar
Akkad, A., Wills, G., & Rezazadeh, A. (2023). An information security model for an IoT-enabled Smart Grid in the Saudi energy sector. Computers and Electrical Engineering, 105, 108491.AkkadA.WillsG. & RezazadehA. (2023). An information security model for an IoT-enabled Smart Grid in the Saudi energy sector. Computers and Electrical Engineering, 105, 108491.Search in Google Scholar
Serkov, A., Kravets, V., Kasilov, O., Lazurenko, B., & Mickus, A. (2019). The concept of information security in the IoT system. Advanced Information Systems, 3(1), 136-139.SerkovA.KravetsV.KasilovO.LazurenkoB. & MickusA. (2019). The concept of information security in the IoT system. Advanced Information Systems, 3(1), 136-139.Search in Google Scholar
Miloslavskaya, N., & Tolstoy, A. (2019). Internet of Things: information security challenges and solutions. Cluster Computing, 22, 103-119.MiloslavskayaN. & TolstoyA. (2019). Internet of Things: information security challenges and solutions. Cluster Computing, 22, 103-119.Search in Google Scholar
Sarjan, H., Ameli, A., & Ghafouri, M. (2022). Cyber-security of industrial internet of things in electric power systems. IEEE Access, 10, 92390-92409.SarjanH.AmeliA. & GhafouriM. (2022). Cyber-security of industrial internet of things in electric power systems. IEEE Access, 10, 92390-92409.Search in Google Scholar
Vaccari, I., Cambiaso, E., & Aiello, M. (2019). Evaluating security of low-power internet of things networks. International Journal of Computing and Digital Systems, 8(02), 101-114.VaccariI.CambiasoE. & AielloM. (2019). Evaluating security of low-power internet of things networks. International Journal of Computing and Digital Systems, 8(02), 101-114.Search in Google Scholar
Hou, R., Ren, G., Zhou, C., Yue, H., Liu, H., & Liu, J. (2020). Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things. Computer communications, 158, 64-72.HouR.RenG.ZhouC.YueH.LiuH. & LiuJ. (2020). Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things. Computer communications, 158, 64-72.Search in Google Scholar
Yohanandhan, R. V., Elavarasan, R. M., Manoharan, P., & Mihet-Popa, L. (2020). Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications. IEEE Access, 8, 151019-151064.YohanandhanR. V.ElavarasanR. M.ManoharanP. & Mihet-PopaL. (2020). Cyber-physical power system (CPPS): A review on modeling, simulation, and analysis with cyber security applications. IEEE Access, 8, 151019-151064.Search in Google Scholar
Wang, B., Guo, Q., Xia, T., Li, Q., Liu, D., & Zhao, F. (2023). Cooperative IoT data sharing with heterogeneity of participants based on electricity retail. IEEE Internet of Things Journal.WangB.GuoQ.XiaT.LiQ.LiuD. & ZhaoF. (2023). Cooperative IoT data sharing with heterogeneity of participants based on electricity retail. IEEE Internet of Things Journal.Search in Google Scholar
Siddiqui, F., Beley, J., Zeadally, S., & Braught, G. (2021). Secure and lightweight communication in heterogeneous IoT environments. Internet of Things, 14, 100093.SiddiquiF.BeleyJ.ZeadallyS. & BraughtG. (2021). Secure and lightweight communication in heterogeneous IoT environments. Internet of Things, 14, 100093.Search in Google Scholar
Guo, P., Xiao, K., Wang, X., & Li, D. (2024). Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things. Global Energy Interconnection, 7(1), 94-105.GuoP.XiaoK.WangX. & LiD. (2024). Multi-source heterogeneous data access management framework and key technologies for electric power Internet of Things. Global Energy Interconnection, 7(1), 94-105.Search in Google Scholar
Rajendran, G., Sathyabalu, H. V., Sachi, M., & Devarajan, V. (2019, August). Cyber security in smart grid: Challenges and solutions. In 2019 2nd International Conference on Power and Embedded Drive Control (ICPEDC) (pp. 546-551). IEEE.RajendranG.SathyabaluH. V.SachiM. & DevarajanV. (2019, August). Cyber security in smart grid: Challenges and solutions. In 2019 2nd International Conference on Power and Embedded Drive Control (ICPEDC) (pp. 546-551). IEEE.Search in Google Scholar
Majumder, A. J. A., Veilleux, C. B., & Miller, J. D. (2020). A cyber-physical system to detect IoT security threats of a smart home heterogeneous wireless sensor node. IEEE Access, 8, 205989-206002.MajumderA. J. A.VeilleuxC. B. & MillerJ. D. (2020). A cyber-physical system to detect IoT security threats of a smart home heterogeneous wireless sensor node. IEEE Access, 8, 205989-206002.Search in Google Scholar
Chin, W. L., Li, W., & Chen, H. H. (2017). Energy big data security threats in IoT-based smart grid communications. IEEE Communications Magazine, 55(10), 70-75.ChinW. L.LiW. & ChenH. H. (2017). Energy big data security threats in IoT-based smart grid communications. IEEE Communications Magazine, 55(10), 70-75.Search in Google Scholar
Diyan, M., Nathali Silva, B., Han, J., Cao, Z., & Han, K. (2022). Intelligent Internet of Things gateway supporting heterogeneous energy data management and processing. Transactions on Emerging Telecommunications Technologies, 33(2), e3919.DiyanM.Nathali SilvaB.HanJ.CaoZ. & HanK. (2022). Intelligent Internet of Things gateway supporting heterogeneous energy data management and processing. Transactions on Emerging Telecommunications Technologies, 33(2), e3919.Search in Google Scholar
Islam, M. S., Rahman, M. A., Bin Ameedeen, M. A., Ajra, H., Ismail, Z. B., & Zain, J. M. (2024). Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey. CMES-Computer Modeling in Engineering & Sciences, 138(1).IslamM. S.RahmanM. A.Bin AmeedeenM. A.AjraH.IsmailZ. B. & ZainJ. M. (2024). Blockchain-Enabled Cybersecurity Provision for Scalable Heterogeneous Network: A Comprehensive Survey. CMES-Computer Modeling in Engineering & Sciences, 138(1).Search in Google Scholar
Zhu, Y., Wu, H., Tao, X., & Wang, S. (2024). Game-Theoretic Security Analysis in Heterogeneous IoT Networks: A Competition Perspective. IEEE Internet of Things Journal.ZhuY.WuH.TaoX. & WangS. (2024). Game-Theoretic Security Analysis in Heterogeneous IoT Networks: A Competition Perspective. IEEE Internet of Things Journal.Search in Google Scholar
Qiao, Z., & Ye, Y. (2024, January). Power network security situation awareness method based on heterogeneous data sources. In 2024 3rd International Conference on Big Data, Information and Computer Network (BDICN) (pp. 83-86). IEEE.QiaoZ. & YeY. (2024, January). Power network security situation awareness method based on heterogeneous data sources. In 2024 3rd International Conference on Big Data, Information and Computer Network (BDICN) (pp. 83-86). IEEE.Search in Google Scholar
Qiu, T., Chen, N., Li, K., Atiquzzaman, M., & Zhao, W. (2018). How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials, 20(3), 2011-2027.QiuT.ChenN.LiK.AtiquzzamanM. & ZhaoW. (2018). How can heterogeneous internet of things build our future: A survey. IEEE Communications Surveys & Tutorials, 20(3), 2011-2027.Search in Google Scholar
Knieps, G. (2019, November). Internet of Things (IoT), heterogeneous virtual networks and the future of the Internet. In The Future of the Internet (pp. 19-32). Nomos Verlagsgesellschaft mbH & Co. KG.KniepsG. (2019, November). Internet of Things (IoT), heterogeneous virtual networks and the future of the Internet. In The Future of the Internet (pp. 19-32). Nomos Verlagsgesellschaft mbH & Co. KG.Search in Google Scholar
Li, Z., Shahidehpour, M., & Liu, X. (2018). Cyber-secure decentralized energy management for IoT-enabled active distribution networks. Journal of Modern Power Systems and Clean Energy, 6(5), 900-917.LiZ.ShahidehpourM. & LiuX. (2018). Cyber-secure decentralized energy management for IoT-enabled active distribution networks. Journal of Modern Power Systems and Clean Energy, 6(5), 900-917.Search in Google Scholar
Nurgaliyev, K., Tokhmetov, A., & Tanchenko, L. (2023). AN ANALYSIS OF THE HETEROGENEOUS IOT DEVICE NETWORK INTERACTION IN A CYBER-PHYSICAL SYSTEM. Scientific Journal of Astana IT University.NurgaliyevK.TokhmetovA. & TanchenkoL. (2023). AN ANALYSIS OF THE HETEROGENEOUS IOT DEVICE NETWORK INTERACTION IN A CYBER-PHYSICAL SYSTEM. Scientific Journal of Astana IT University.Search in Google Scholar
Keshk, M., Turnbull, B., Sitnikova, E., Vatsalan, D., & Moustafa, N. (2021). Privacy-preserving schemes for safeguarding heterogeneous data sources in cyber-physical systems. IEEE Access, 9, 55077-55097.KeshkM.TurnbullB.SitnikovaE.VatsalanD. & MoustafaN. (2021). Privacy-preserving schemes for safeguarding heterogeneous data sources in cyber-physical systems. IEEE Access, 9, 55077-55097.Search in Google Scholar
Perumal, S., Rajendiran, S., & Souprayen, S. (2020). Efficient network security architecture for heterogeneous smart meter environment. In Sustainable Communication Networks and Application: ICSCN 2019 (pp. 469-477). Springer International Publishing.PerumalS.RajendiranS. & SouprayenS. (2020). Efficient network security architecture for heterogeneous smart meter environment. In Sustainable Communication Networks and Application: ICSCN 2019 (pp. 469-477). Springer International Publishing.Search in Google Scholar
Fraiji, Y., Azzouz, L. B., Trojet, W., & Saidane, L. A. (2018, April). Cyber security issues of Internet of electric vehicles. In 2018 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-6). IEEE.FraijiY.AzzouzL. B.TrojetW. & SaidaneL. A. (2018, April). Cyber security issues of Internet of electric vehicles. In 2018 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-6). IEEE.Search in Google Scholar
Zhang Jing & Han Zhanwei. (2024). Optimization of uncertain dependent task mapping on heterogeneous computing platforms. The Journal of Supercomputing(11),15868-15893.JingZhang & ZhanweiHan. (2024). Optimization of uncertain dependent task mapping on heterogeneous computing platforms. The Journal of Supercomputing(11),15868-15893.Search in Google Scholar
Venkata Ranga Surya Prasad Alla,Nageswara Rao Medikondu,Leela Santi Parige,Kosaraju Satyanarayana,Vadim S. Kankhva,Navdeep Dhaliwal & Anil Kumar Saxena. (2024). Optimizing task scheduling in cloud computing: a hybrid artificial intelligence approach. Cogent Engineering(1),Surya Prasad AllaVenkata RangaMedikonduNageswara RaoParigeLeela SantiSatyanarayanaKosarajuKankhvaVadim S.DhaliwalNavdeep & SaxenaAnil Kumar. (2024). Optimizing task scheduling in cloud computing: a hybrid artificial intelligence approach. Cogent Engineering(1),Search in Google Scholar
Adil Yousif,Mohammed Bakri Bashir & Awad Ali. (2024). An Evolutionary Algorithm for Task Clustering and Scheduling in IoT Edge Computing. Mathematics(2).YousifAdilBashirMohammed Bakri & AliAwad. (2024). An Evolutionary Algorithm for Task Clustering and Scheduling in IoT Edge Computing. Mathematics(2).Search in Google Scholar