JCP 03 00031 3
JCP 03 00031 3
JCP 03 00031 3
net/publication/374217375
CITATIONS READS
12 280
1 author:
Ayat-Allah Bouramdane
Université Internationale de Rabat
60 PUBLICATIONS 308 CITATIONS
SEE PROFILE
All content following this page was uploaded by Ayat-Allah Bouramdane on 27 September 2023.
Article
Cyberattacks in Smart Grids: Challenges and Solving the
Multi-Criteria Decision-Making for Cybersecurity Options,
Including Ones That Incorporate Artificial Intelligence, Using
an Analytical Hierarchy Process
Ayat-Allah Bouramdane
Laboratory of Renewable Energies and Advanced Materials (LERMA), College of Engineering and Architecture,
International University of Rabat (IUR), IUR Campus, Technopolis Park, Rocade Rabat-Salé,
Sala Al Jadida 11103, Morocco; [email protected]
Abstract: Smart grids have emerged as a transformative technology in the power sector, enabling
efficient energy management. However, the increased reliance on digital technologies also exposes
smart grids to various cybersecurity threats and attacks. This article provides a comprehensive
exploration of cyberattacks and cybersecurity in smart grids, focusing on critical components and
applications. It examines various cyberattack types and their implications on smart grids, backed by
real-world case studies and quantitative models. To select optimal cybersecurity options, the study
proposes a multi-criteria decision-making (MCDM) approach using the analytical hierarchy process
(AHP). Additionally, the integration of artificial intelligence (AI) techniques in smart-grid security
is examined, highlighting the potential benefits and challenges. Overall, the findings suggest that
“security effectiveness” holds the highest importance, followed by “cost-effectiveness”, “scalability”,
and “Integration and compatibility”, while other criteria (i.e., “performance impact”, “manageability
and usability”, “compliance and regulatory requirements”, “resilience and redundancy”, “vendor
support and collaboration”, and “future readiness”) contribute to the evaluation but have relatively
Citation: Bouramdane, A.-A. lower weights. Alternatives such as “access control and authentication” and “security information and
Cyberattacks in Smart Grids: event management” with high weighted sums are crucial for enhancing cybersecurity in smart grids,
Challenges and Solving the while alternatives such as “compliance and regulatory requirements” and “encryption” have lower
Multi-Criteria Decision-Making for weighted sums but still provide value in their respective criteria. We also find that “deep learning”
Cybersecurity Options, Including emerges as the most effective AI technique for enhancing cybersecurity in smart grids, followed by
Ones That Incorporate Artificial
“hybrid approaches”, “Bayesian networks”, “swarm intelligence”, and “machine learning”, while
Intelligence, Using an Analytical
“fuzzy logic”, “natural language processing”, “expert systems”, and “genetic algorithms” exhibit
Hierarchy Process. J. Cybersecur. Priv.
lower effectiveness in addressing smart-grid cybersecurity. The article discusses the benefits and
2023, 3, 662–705. https://doi.org/
drawbacks of MCDM-AHP, proposes enhancements for its use in smart-grid cybersecurity, and
10.3390/jcp3040031
suggests exploring alternative MCDM techniques for evaluating security options in smart grids. The
Academic Editor: Danda B. Rawat
approach aids decision-makers in the smart-grid field to make informed cybersecurity choices and
Received: 24 July 2023 optimize resource allocation.
Revised: 22 August 2023
Accepted: 31 August 2023 Keywords: analytical hierarchy process; artificial intelligence; cyberattacks; cybersecurity;
Published: 27 September 2023 multi-criteria decision-making; smart grids
corporates AI techniques and methods needs to be explored. The criteria for evaluation
may include security effectiveness, scalability, integration, and compatibility; performance
impact; cost-effectiveness; manageability and usability; compliance and regulatory require-
ments; resilience and redundancy; vendor support and collaboration; future readiness;
network segmentation; and explainability and transparency.
The advantages and drawbacks of employing AHP to assess cybersecurity options in
smart grids need to be discussed. Furthermore, it is essential to propose enhancements for
its application in smart-grid cybersecurity and to explore alternative MCDM techniques for
evaluating security options in smart grids.
1.5. Methodology
The methodology employed in this study encompasses four main areas related to
cybersecurity in smart grids. First, it involves conducting a comprehensive analysis of
smart-grid components and applications, examining the various types of cyberattacks
that target these systems, and assessing their short-term and long-term impacts on the
technological, economic, safety, and social aspects of smart grids. Real-world case studies
are investigated to provide practical insights into the effects of cyberattacks on operational
smart grids (Section 3.1). Second, the study uses the analytical hierarchy process (AHP) as
a multi-criteria decision making (MCDM) technique to determine the optimal cybersecurity
option. A set of cybersecurity measures, such as access control, authentication, encryption,
IDPS, firewalls, SIEM, vulnerability assessment, and others, are evaluated based on mul-
J. Cybersecur. Priv. 2023, 3 666
1.7. Outline
This article follows a structured outline, starting with an introduction (Section 1) that
establishes the research motivation (Section 1.1), existing studies (Section 1.2), knowledge
gaps (Section 1.3), research questions (Section 1.4), methodology overview (Section 1.5),
and practical implications (Section 1.6). In the methodology section (Section 2), the research
approach and the methodology employed are described in detail. The application of
the analytical hierarchy process (AHP) as a decision-making framework (Section 2.2) for
evaluating cybersecurity options in smart grids is explained, emphasizing its ability to
consider multiple criteria and prioritize options. The results section (Section 3) presents
the key findings obtained through the application of the methodology described earlier.
The discussion section (Section 4) delves deeper into the implications and significance
of the research findings. It examines the advantages and limitations of the methodology
employed, addressing potential challenges and areas for improvement. The conclusion
section (Section 5) summarizes the key findings, insights, and implications discussed
throughout the article.
2. Methodology
The methodology employed in this study combines the principles of multi-criteria
decision-making (MCDM) with artificial intelligence (AI) techniques to address the chal-
lenges of cyberattacks in smart grids and facilitate the selection of effective cybersecu-
rity options.
First, a comprehensive analysis of the cybersecurity landscape in smart grids is con-
ducted to identify the key challenges and potential threats. This analysis includes an
examination of the different types of cyberattacks, their potential impacts on smart-grid
infrastructure, and the specific vulnerabilities that need to be addressed (Section 3.1).
Next, a set of relevant criteria is identified to evaluate the cybersecurity options
available for smart grids. These criteria encompass factors such as security effectiveness,
scalability, integration, and compatibility; performance impact; cost-effectiveness; manage-
ability and usability; compliance with regulatory requirements; resilience and redundancy;
vendor support and regulation; and future readiness. The analytical hierarchy process
J. Cybersecur. Priv. 2023, 3 667
(AHP) (Section 2.2) is then used as the core methodology for the MCDM process. AHP
allows for the systematic comparison and prioritization of the cybersecurity options based
on their performance against each criterion (Section 3.2).
To incorporate AI techniques, MCDM-AHP is applied to choose between different
AI options. These options include machine learning, deep learning, swarm intelligence,
Bayesian networks, etc. (Section 3.3).
Overall, the methodology employed in this study combines MCDM principles, and AI
techniques to create a robust framework for evaluating and selecting cybersecurity options
in smart grids, thereby mitigating the risks associated with cyberattacks and safeguarding
the integrity and security of smart grid systems.
In the energy sector, particularly in the context of smart grids, various multi-criteria
approaches are employed to address complex decision problems [116]. While the ana-
lytical hierarchy process (AHP) is recognized as a significant and widely used MCDM
technique [117,118], its application specifically to cybersecurity in smart grids is relatively
limited (Section 1.3).
AHP provides a structured and systematic approach to decision-making when mul-
tiple criteria or factors need to be considered. It allows decision-makers to evaluate and
prioritize alternatives based on their relative importance and preferences [119,120]. Thomas
Saaty was the one who initially proposed this technique [121,122], and it has been consider-
ably improved since then. In AHP, the problem is constructed as a hierarchy and broken
down into elements. The overall goal is located at the top level, the criteria and sub-criteria
are at the middle level, and the alternatives are at the bottom of the hierarchy [123,124].
The use of AHP typically involves five fundamental steps to facilitate a structured
decision-making process. These steps are as follows [125,126]:
1. Define the decision problem and establish the hierarchy: The first step in using
AHP is to decompose the decision-making problem into a hierarchy of elements,
with the goal to be achieved at the highest level, criteria and sub-criteria at interme-
diate levels, and alternatives to be considered at the lowest level. This hierarchical
structure (Figure 1) helps organize and decompose the problem into manageable com-
ponents.
Figure 1. Hierarchical evaluation framework for cybersecurity measures in smart grids, which
includes distinct levels: a top-level overarching goal, intermediate evaluation criteria, and a bottom
level containing various cybersecurity measures. Source: The author’s own elaboration.
Let C be the pairwise comparison matrix with elements cij representing the importance
of criterion i compared to criterion j (1).
c11 c12 c13 ... c1n
c21 c22 c23 ... c2n
C = [Cij ]nxn = . (1)
..
.. ... ... ... .
cn1 cn2 cn3 ... cnn
Cij is the pairwise comparison rating for the ith and the jth criteria. n is the number
of criteria.
The matrix C is reciprocal, meaning that the elements satisfy the property of reci-
procity: Cij = 1/Cij for all i and j. Reciprocity ensures that the judgments made in
the pairwise comparisons are consistent. It implies that if element A is considered,
for example, twice as important as element B, then B is considered half as important
as A.
Additionally, the diagonal elements of the pairwise comparison matrix are in unity
(Cij = 1 for i = j). This indicates that an element is perfectly equal to itself, which is a
logical requirement.
The entries in the pairwise comparison matrix C are typically taken from a ratio-scale
based on the values 1/9 to 9 [121]. In fact, in the AHP, decision-makers assign numer-
ical values to represent the relative importance or preference between elements in the
pairwise comparisons. The scale is as follows: 1 (equally important), 3 (moderately
more important), 5 (strongly more important), 7 (very strongly more important),
9 (absolutely more important). The reciprocals of these values are used for the re-
verse comparisons: 1/3, 1/5, 1/7, and 1/9. Table 1 shows Saaty’s comparison scale,
also known as the AHP scale of relative importance. It includes the rating scale, its
definition, and an explanation of each rating.
Table 1. Saaty’s comparison scale [121]. Decision-makers use these ratings to express the relative
importance or preference between elements in pairwise comparisons (1).
Pairwise comparisons can be performed using different methods, such as direct judg-
ment, expert opinions, surveys, or historical data. The key is to elicit and capture the
decision-makers’ subjective judgments regarding the relative importance or preference
of the elements being compared.
3. Calculate Priority Weights: Calculate the priority weights for each element in the
hierarchy based on the pairwise comparison judgments. Several methods can be used,
J. Cybersecur. Priv. 2023, 3 670
including the geometric mean and the eigenvector method. The priority weights
reflect the relative importance of each element within its level and enable quantitative
comparison and analysis.
Let gi be the geometric mean of the ith row in the pairwise comparison matrix C. It
can be calculated as (2).
The average column vector A represents the relative weights of each criterion. The
weights wi can be obtained by normalizing the average column vector (5).
wi = a i / ( a1 + a2 + . . . + a n ) (5)
Let O be the matrix representing the options evaluated. Each row ok corresponds to
the values of the options for each criterion. The weighted sum for the kth option is
calculated as (6).
Calculate the eigenvalue (λmax ) and the corresponding eigenvector (V) of the pairwise
comparison matrix C. The eigenvalue equation is given by (7).
(C − λmax ∗ I ) ∗ V = 0 (7)
λmax represents the eigenvalue that we want to solve for; I is the identity matrix
of size nxn; V is the eigenvector associated with the eigenvalue (λmax ). To solve
for the eigenvalue (λmax ), we need to find the values of λ) that satisfy the above
Equation (7). This can be carried out using numerical methods or software tools that
can compute eigenvalues.
4. Check for Consistency: Assess the consistency of the pairwise comparison judgments.
Inconsistencies occur when the assigned values do not meet certain mathematical
properties. Calculate the consistency ratio (CR) using a consistency index (CI) and
a random index (RI). If the CR exceeds a predefined threshold (e.g., 0.10), further
examination or adjustments to the pairwise comparisons are needed. The consistency
index (CI) is calculated using the formula (8):
λmax − n
CI = (8)
( n − 1)
n 1 2 3 4 5 6 7 8 9 10 11
RI 0 0 0.58 0.90 1.12 1.24 1.32 1.41 1.45 1.49 1.51
The consistency ratio (CR) is the ratio of the CI to the RI. It is calculated as (9):
CI
CR = (9)
RI
If the CR is less than or equal to 0.1, the consistency of the matrix is considered
acceptable. If the CR exceeds 0.1, the consistency should be re-evaluated (Figure 2).
Figure 2. Analytical hierarchy process (AHP) algorithm: A methodical approach for assessing and
ranking cybersecurity measures in smart grids. Source: the author’s own elaboration.
3. Results
In this section, we delve into a comprehensive examination of the various aspects
related to cybersecurity in smart grids. First, we provide an overview of smart grids,
including their components and applications (Section 3.1.1). We explore the different types
of cyberattacks (Section 3.1.2) and their potential short-term and long-term impacts on
smart grids, considering their techno–economic–safety–social dimensions (Section 3.1.3).
This examination encompasses the identification of vulnerable components, the cascad-
ing effects of cyberattacks on smart-grid elements (Section 3.1.4), and real-world case
studies of operational smart grids that have been targeted (Section 3.1.5). Additionally,
we discuss the quantitative models and metrics that enable the assessment of cyberat-
tack impacts (Section 3.1.5) and the associated implications for smart-grid cybersecurity
(Sections 3.1.7–3.1.10).
Moving forward, we address the second point by investigating the utilization of the
analytical hierarchy process (AHP) in solving the multi-criteria decision making (MCDM)
J. Cybersecur. Priv. 2023, 3 672
problem for selecting the optimal cybersecurity option. We explore a range of cybersecurity
measures such as access control, encryption, intrusion detection and prevention systems,
firewalls, security incident responses, and more. These measures are evaluated based on
multiple criteria, including security effectiveness, scalability, performance impact, cost-
effectiveness, compliance with regulatory requirements, resilience, and vendor support
(Section 3.2).
Furthermore, we explore the differences between artificial intelligence (AI) and ma-
chine learning (ML) and their potential contributions to cybersecurity in smart grids
(Section 3.3.1). By integrating AI techniques and methods such as machine learning, deep
learning, genetic algorithms, and Bayesian networks, we aim to identify the optimal cy-
bersecurity option. The application of the MCDM-AHP approach enables us to assess the
performance of different AI-based techniques against multiple criteria such as security
effectiveness, scalability, explainability, and transparency (Section 3.3.2).
Through this exploration, we aim to provide insights into the selection of the most
suitable cybersecurity option that effectively addresses the challenges faced in securing
smart grids.
• Denial-of-Service (DoS) Attacks: These attacks aim to temporarily make the targeted
system inaccessible to legitimate users by overwhelming the smart grid’s resources,
such as communication networks or control systems, with an excessive volume of
requests and flooding them with a high volume of traffic, launched from a single
device. This disrupts the grid’s operations and may result in service outages [157].
• Distributed Denial-of-Service (DDoS) Attacks: Similar to DoS attacks, DDoS attacks
involve multiple compromised devices, located worldwide, forming a botnet that
collectively overwhelms the grid’s resources. DDoS attacks are more challenging to
mitigate due to their distributed nature [158,159].
• Malware Attacks: Malware attacks in the context of smart grids refer to the infiltration
of malicious software into the grid’s systems, devices, or networks. Malware infects
the smart grid’s control systems, or human machine interfaces (HMIs), disrupts
operations, compromises data integrity, and potentially gains unauthorized control
over critical infrastructure. Here are some common types of malware attacks in smart
grids [160,161]:
– Viruses: viruses are self-replicating programs that attach themselves to legitimate
files or programs and spread across the grid’s systems. Once activated, viruses
can cause system malfunctions, data corruption, or unauthorized access.
– Worms: worms are standalone programs that replicate and spread across com-
puter networks without requiring a host file. Worms can rapidly infect multi-
ple devices within the smart grid, causing network congestion, system crashes,
or unauthorized activities [162,163].
– Ransomware: ransomware is a type of malware that encrypts files or locks users
out of their systems, demanding a ransom payment in exchange for restoring
access. Ransomware attacks can disrupt smart-grid operations, leading to service
interruptions or financial losses [164,165]. Ransomware attacks have been on
J. Cybersecur. Priv. 2023, 3 675
the rise in recent years. According to a report by SonicWall [166], there were
304.7 million ransomware attacks globally in 2020, representing a 62% increase
compared to the previous year. The financial impact of ransomware attacks is
substantial. Cybersecurity Ventures [167] estimated that ransomware costs will
reach 20 billion dollars in 2021, with a ransomware attack occurring every 11 s.
– Trojan Horses: Trojans disguise themselves as legitimate software or files and
trick users into executing them. Once activated, Trojans can perform various
malicious activities, such as data theft, system control, or backdoor creation for
remote access [168,169].
– Botnets: botnets are networks of compromised devices that are controlled by a
central command and control (C&C) server. Smart-grid devices infected with
botnet malware can be used for coordinated attacks, such as DDoS attacks or
spreading other forms of malware [170,171].
– Keyloggers: keyloggers capture keystrokes on infected devices, including pass-
words, login credentials, or other sensitive information. These data can be used
to gain unauthorized access to smart-grid systems or compromise user accounts.
– Spyware: spyware is designed to collect information about a user’s activities
without their knowledge or consent. In the context of smart grids, spyware
can monitor system operations, gather sensitive data, or capture user behavior,
potentially compromising grid security.
The number of unique malware variants continues to grow rapidly. According to
AV-TEST [172], an independent antivirus testing organization, more than 1 billion new
malware variants were detected in 2020 alone.
• Phishing Attacks: phishing attacks involve the use of deceptive techniques to trick
individuals or organizations into revealing sensitive information, such as login cre-
dentials, financial details, or personal data, or performing malicious actions. These
attacks often come in the form of fraudulent emails, text messages, or websites that
mimic trusted entities or institutions [173]. Phishing attacks continue to be a prevalent
threat. In the 2021 Verizon Data Breach Investigations Report [174], phishing attacks
accounted for 36% of all data breaches analyzed.
• Insider Threats: insider threats refer to attacks perpetrated by individuals who have
authorized access to the smart grid’s systems and misuse their privileges. These
insiders may intentionally or inadvertently compromise the grid’s security, privacy,
or operational integrity [175,176]. Insider threats pose a significant risk to smart
grids. The U.S. Industrial Control Systems Cyber Emergency Response Team (ICS-
CERT) [177] reported that insider threats accounted for approximately 20% of the
cybersecurity incidents in the energy sector.
• Man-in-the-Middle (MitM) Attacks: in MitM attacks, attackers can exploit insecure
or unencrypted Wi-Fi networks to position themselves between the sender and the
recipient, allowing them to eavesdrop on the communication, manipulate the data
exchanged, or even impersonate one or both parties without their knowledge [178,179].
• Advanced Persistent Threats (APTs): APTs are sophisticated, long-term cyberattacks
aimed at gaining stealthy and persistent unauthorized access to the smart grid’s
systems (i.e., login credentials, financial details, or other confidential data being
transmitted). APTs involve multiple stages and often target specific entities or or-
ganizations with the goal of gathering valuable information or sabotaging critical
operations [179,180].
• Data Manipulation Attacks: these attacks involve the unauthorized modification
or manipulation of data within the smart grid. Attackers may alter meter readings,
billing information, or control signals, leading to inaccurate billing, load balancing,
or compromised grid stability [181].
• Supply Chain Attacks: supply chain attacks exploit vulnerabilities in the software or
hardware components used in smart-grid infrastructure. The attackers compromise
J. Cybersecur. Priv. 2023, 3 676
3.1.6. Quantitative Models and Metrics for Assessing the Impacts of Cyberattacks
Various quantitative models and metrics are available to assess the impacts of
cyberattacks on smart grids [198]. Some examples include:
• Economic Impact Model: evaluates financial consequences by quantifying direct and
indirect costs, considering lost revenue, recovery expenses, legal liabilities, and repu-
tation damage.
• Availability and Reliability Metrics: measure cyberattack effects on critical systems’
availability and reliability, including downtime, failure rates, mean time between
failures (MTBF), and mean time to repair (MTTR).
• Risk Assessment Models: assess attack probability and severity using vulnerabil-
ity, threat, and consequence considerations, employing risk matrices, attack trees,
and threat modeling.
• Operational Impact Metrics: gauge cyberattack impact on operational efficiency, en-
compassing performance degradation, response delays, data integrity issues, and work-
flow disruptions.
• Customer Satisfaction Metrics: measure customer trust and satisfaction impact, us-
ing customer complaints, service level agreement (SLAs) violations, churn rates,
and surveys to assess perception.
• Resilience and Recovery Metrics: evaluate recovery effectiveness against cyberat-
tacks by tracking system recovery time, backup capabilities, redundancy levels, and in-
cident response success.
Importantly , the specific models and metrics may vary based on assessment goals
and context. Organizations can adapt existing frameworks or create customized models to
align with their needs.
3.1.9. Quantitative Models and Metrics for Assessing the Implications of Cybersecurity in
Smart Grids
Various models and metrics offer a quantitative approach to measuring the implica-
tions of cybersecurity in smart grids [203]:
• Risk Assessment Models: frameworks such as the National Institute of Standards
and Technology (NIST) Cybersecurity Framework or ISO/IEC 27005 quantify risks
and impacts by evaluating threats and vulnerabilities. They estimate the overall risk
exposure, aiding in risk prioritization and mitigation.
• Economic Impact Models: these assess the financial consequences of cybersecurity
incidents, factoring in downtime, disruptions, data breaches, recovery costs, penalties,
and reputation damage. These models guide investment decisions and assess the
return on investment (ROI) of security measures.
• Availability and Reliability Metrics: metrics such as mean time between failures
(MTBF), mean time to repair (MTTR), system uptime, and service-level agreements
(SLAs) gauge system availability amidst cybersecurity threats. They help evaluate the
impact on performance and customer service.
• Incident Response Metrics: mean time to detect (MTTD), mean time to respond
(MTTR), and mean time to recover (MTTR) assess the response efficiency to incidents,
guiding improvements in incident management capabilities.
J. Cybersecur. Priv. 2023, 3 679
• User Awareness and Training Metrics: these measure the effectiveness of cybersecu-
rity education programs through completion rates, campaign frequency, and policy
adherence.
• Compliance Metrics: these assess adherence to the cybersecurity standards, regula-
tions, and best practices. These metrics cover security controls, patch management,
vulnerability assessments, and audits.
• Resilience Metrics: these evaluate the system’s ability to withstand and recover from
incidents, including redundancy, backup, recovery capabilities, and service restoration
time.
The customization of these models and metrics for specific smart-grid implementa-
tions is crucial. The regular monitoring, analysis, and refinement enable the continuous
improvement of the cybersecurity posture and ensure smart-grid resilience.
cybersecurity, and selecting the most effective and appropriate measures to protect the
smart-grid infrastructure from cyber threats.
When evaluating cybersecurity options for smart grids, several relevant criteria need
to be considered. These criteria help assess the effectiveness, feasibility, and suitability of
different cybersecurity measures [207]. Here are some important criteria to consider:
1. “C1”: Security Effectiveness: the ability of the cybersecurity solution to detect and
prevent cybersecurity threats accurately and effectively.
2. “C2” Scalability: the capability of the solution to scale and accommodate the grow-
ing complexity and size of the smart-grid systems, including the ability to handle
increased data volumes, growing infrastructure requirements, and network traffic.
3. “C3” Integration and Compatibility: the ease with which the cybersecurity solution
can integrate with the existing smart-grid infrastructure, technologies, and tools,
ensuring compatibility and minimal disruption to operations.
4. “C4” Performance Impact: the impact of cybersecurity solutions on the performance
and efficiency of smart-grid systems, including factors such as latency, response time,
and system availability.
5. “C5” Cost-Effectiveness: the overall cost–benefit ratio of implementing the cyberse-
curity solution, considering both upfront costs and ongoing maintenance expenses,
and evaluating the value it brings in terms of risk mitigation.
6. “C6” Manageability and Usability: the ease of managing and administering the
cybersecurity solution, including the user interface, configuration options, and the
ability to monitor and analyze security events effectively.
7. “C7” Compliance and Regulatory Requirements: the extent to which the cybersecu-
rity solution aligns with the relevant industry standards, regulations, and compliance
requirements specific to smart grids, ensuring adherence to legal and operational
obligations.
8. “C8” Resilience and Redundancy: the ability of the cybersecurity solution to provide
resilience and redundancy measures, such as backup systems and failover capabilities,
to ensure continuous operations even in the event of a security breach or system
failure.
9. “C9” Vendor Support and Collaboration: the level of support and collaboration
provided by the cybersecurity solution vendor, including the availability of updates,
patches, and technical assistance, as well as the commitment to the ongoing research
and development.
10. “C10” Future Readiness: the solution’s ability to adapt and evolve with emerging
technologies, threat landscapes, and evolving cybersecurity best practices, ensuring
long-term viability and protection.
11. “C11” Network Segmentation: the ability to segment the smart-grid network into
separate zones or segments to minimize the impact of a security breach and limit the
lateral movement of attackers.
12. “C12” Patch Management: the capability to efficiently manage and apply software
patches and updates to address vulnerabilities and ensure the system is up to date
with the latest security measures.
13. “C13” Threat Intelligence: the use of advanced techniques and tools and access
to timely and accurate threat intelligence information, including real-time threat
detection, analysis, and sharing of indicators of compromise, to enhance the proactive
cybersecurity measures.
14. “C14” Vendor and Supply Chain Security: assessing the security practices and con-
trols of the vendors and suppliers involved in the smart-grid ecosystem to mitigate
risks associated with third-party access and potential supply chain vulnerabilities.
Considering these criteria will help in making informed decisions when selecting and
implementing cybersecurity options in smart grids, ensuring a comprehensive and robust
cybersecurity framework, taking into account various aspects such as the effectiveness
of the security measures, the ability to scale and adapt to evolving threats, integration
with existing systems, performance impact on grid operations, cost-effectiveness, ease
of management and usability, compliance with regulations, resilience and redundancy
J. Cybersecur. Priv. 2023, 3 682
3.2.2. Pairwise Comparison Matrix, Relative Weights of Criteria, and Weighted Sum
of Alternatives
In this section, we explore the evaluation of cybersecurity options by comparing them
against a set of described criteria (Section 3.2.1). We construct a pairwise comparison matrix
(Table 3), which allows us to assess the relative importance of each criterion compared to
the others (Table 4). Using these relative weights, we compute the weighted sum for each
cybersecurity option (Table 5), providing an overall score that considers the importance of
each criterion.
Each element of the matrix (Table 3) represents the relative importance or preference
of one criterion over another. The values in the matrix are the pairwise comparison
judgments based on a scale of 1 to 9, where 1 represents equal importance or preference
and 9 represents extreme importance or preference. For instance, the value of 7 in the cells
C1–C2 indicates that the criterion “Security Effectiveness (C1)” is considered to be seven
times more important than the criterion “Scalability (C2)”. Similarly, the value of 5 in the
cells C4–C10 suggests that the criterion “Performance impact (C4)” is considered to be five
times more important than the criterion “Future Readiness (C10)”.
Table 3. The pairwise comparison matrix between criteria. We assume a scale from 1 to 9, where 1
represents equal importance and 9 represents significantly more importance (Section 2.2). This is a
subjective assessment, and individual opinions may vary based on their perspectives and priorities.
The values in Table 4 indicate the relative contribution of each criterion in the decision-
making process. Higher weights indicate greater importance, while lower weights indicate
lesser importance.
From Table 4, we can categorize the criteria as follows:
• The criteria with high relative weights (above 10%): “Security effectiveness (C1)”
has the highest relative weight (25%), indicating its significant importance in cyber-
security options for smart grids. Emphasizing security effectiveness ensures that the
chosen options can accurately and effectively detect and prevent cybersecurity threats.
• The criteria with medium relative weights (between 7% and 10%) suggest that they
are moderately important in the evaluation process. They should be considered
alongside other factors to ensure the overall suitability and performance of the cyber-
security options.
– “Cost-effectiveness (C5)” (10.18%) holds significant importance in evaluating
cybersecurity options. It indicates the need to consider the overall cost–benefit
J. Cybersecur. Priv. 2023, 3 683
ratio, ensuring that the chosen options provide effective security enhancements
while being cost-effective”.
– “Scalability (C2)” (7.89%): this criterion highlights the importance of considering
the ability of the options to scale and accommodate the growing complexity and
size of the smart-grid systems.
– “Integration and compatibility (C3)” (7.89%): this criterion emphasizes the need
for seamless integration with the existing smart-grid infrastructure and technolo-
gies, minimizing disruptions and ensuring compatibility.
• The criteria with low relative weights (below 7%):
– “Performance impact (C4)” (6.93%): this criterion suggests that the performance
impact of cybersecurity options is relatively less influential but still important to
consider.
– C6 to C14: these criteria, including manageability and usability “C6” (6.32%),
compliance and regulatory requirements “C7” (5.93%), resilience and redundancy
“C8” (4.97%), vendor support and collaboration “C9” (4.84%), and future readiness
“C10” (1.76%), have relatively lower weights but still contribute to the overall
evaluation. While their impact is slightly smaller compared to higher-weighted
criteria, they should be considered in conjunction with other factors.
Table 4. Relative Weights (RWs) of criteria (i.e., the importance or priority assigned to each criterion
in the evaluation of the cybersecurity options). These weights indicate the relative significance of
each criterion in determining the overall effectiveness of the options.
After performing the calculations, the consistency ratio (CR) for the obtained pairwise
comparison matrix (Table 3) is approximately 0.063. The CR value indicates that the matrix
is consistent since it is below the threshold of 0.1. Therefore, the pairwise comparison
matrix satisfies the consistency requirements.
The weighted sums (Table 5) represent the overall scores or evaluations of each
alternative based on the criteria and their corresponding relative weights. The alternatives
with higher weighted sums are considered more suitable or preferable in terms of meeting
the cybersecurity needs of smart grids, while the alternatives with lower weighted sums
may have some limitations or may not perform as strongly in the evaluated criteria.
Based on the weighted sums (Table 5), we can categorize the alternatives as follows:
• The alternatives with high weighted sums (above 5):
– “Access Control and Authentication (A1)” (6.25) has the highest weighted sum,
indicating its effectiveness and importance in enhancing cybersecurity in smart
grids. Implementing strong authentication mechanisms and access controls is
crucial for ensuring only authorized individuals can access critical systems and
data.
J. Cybersecur. Priv. 2023, 3 684
– “Security Information and Event Management (SIEM) (A5)” (5.762) has a rela-
tively high weighted sum, suggesting its significance in smart-grid cybersecurity.
Implementing SIEM solutions enables the collection, analysis, and correlation of
security events and log data, enabling early detection and response to potential
cyber threats.
• The alternatives with medium-weighted sums (between 5 and 5.5) suggest that they
offer a solid performance in the evaluated criteria. They are important components
for detecting and responding to security incidents.
– “Intrusion Detection and Prevention Systems (IDPS) (A3)” (5.487): this alternative
falls within the medium range, indicating its effectiveness in monitoring network
traffic, detecting suspicious activities, and taking preventive actions against
potential threats.
– “Security Incident Response (A7)” (5.297): this alternative also falls within the
medium range, highlighting the importance of establishing a comprehensive inci-
dent response plan to effectively respond to and manage cybersecurity incidents,
minimizing their impact.
• The alternatives with low weighted sums (below 4.5) compared to others. While
they still provide value in their respective criteria, they may not excel as strongly over-
all.
– “Compliance and Regulatory Requirements (A13)” (4.349): this alternative has the
lowest weighted sum among the alternatives, indicating that while compliance
with cybersecurity standards and regulations is important, it may not have as
high a priority as other options in the context of smart-grid cybersecurity.
– “Encryption (A2)” (3.739): this alternative has a relatively low weighted sum,
suggesting that while encryption is important for securing data transmission
and storage, it may not have as significant an impact as other alternatives in the
evaluated criteria.
Overall, the alternatives with high weighted sums (A1 and A5) are considered critical
for enhancing smart-grid cybersecurity, while those with medium- and low-weighted sums
still provide value but may have relatively less impact or priority in the evaluated criteria.
Table 5. Weighted sum for each option. Higher weighted sums indicate better overall performance.
3.3. Enhancing Cybersecurity of Smart Grids: Unveiling the Difference between AI and ML,
Exploring their Potential and Addressing Challenges, and Leveraging MCDM-AHP for Optimal
AI Selection
In this section, we analyze artificial intelligence (AI) techniques for cybersecurity
options in smart grids to enhance the security and decision-making processes.
J. Cybersecur. Priv. 2023, 3 685
3.3.1. Understanding the Difference between AI and ML: Benefits and Challenges for
Cybersecurity in Smart Grids
Indeed, AI and ML are two related concepts that play significant roles in cybersecurity
but have distinct differences [208]. Key differences:
• Scope: AI is a broader field of computer science that encompasses various techniques
to develop intelligent machines or systems capable of performing tasks that typically
require human intelligence and cognitive functions—such as reasoning, problem
solving, decision-making, perception, and natural language processing—while ML is
a specific approach within AI that focuses on learning from data.
• Programming vs. Learning: AI often involves explicitly programming intelligent
behavior or rules, whereas ML is a sunset or application of AI that focuses on training
models to learn patterns and make predictions based on data without being explicitly
programmed.
• Data Dependency: ML heavily relies on large datasets for training models and im-
proving performance. The quality and quantity of data play a crucial role in ML
algorithms’ effectiveness. AI, on the other hand, can utilize various data sources but
may not be solely dependent on them.
• Human Intervention: AI may involve human intervention in designing and speci-
fying rules or heuristics for intelligent systems. ML, however, aims to automate the
learning process and reduce human intervention by allowing models to learn from
data independently.
• Flexibility: ML algorithms are flexible and can adapt to new data and patterns, en-
abling them to handle complex and dynamic tasks. AI, as a broader field, encompasses
both rule-based systems and learning-based systems, providing a wider range of ap-
proaches for different types of problems.
Artificial intelligence (AI) can significantly enhance cybersecurity in smart grids by
providing advanced capabilities for threat detection, prevention, and response. They can
analyze large volumes of data from various sources, such as network traffic, system logs,
and sensor data, to detect anomalies, identify potential cyber threats in real-time, and auto-
mate incident response processes. AI techniques power intrusion detection and prevention
systems (IDPS), predict equipment failures, and optimize maintenance schedules. They
can also analyze threat intelligence data, use behavioral analysis, and employ user and
entity behavior analytics (UEBA) to identify emerging threats, detect unauthorized access,
and mitigate risks. Overall, AI enables smarter threat management, reduces response times,
and enhances the resilience and security of the smart-grid infrastructure [209].
While artificial intelligence (AI) offers significant benefits in enhancing the cybersecu-
rity of smart grids, there are also several challenges that need to be addressed [210]. Here
are some potential challenges:
• Data Quality and Availability: AI algorithms heavily rely on high-quality and rep-
resentative data for training and decision-making. In the context of smart grids,
obtaining labeled and diverse cybersecurity data can be challenging. Collaborating
with smart-grid operators, cybersecurity organizations, and researchers to collect and
share cybersecurity data to ensure the availability, accuracy, completeness, and re-
liability of the data is crucial for the effective training of AI models. Establishing
mechanisms for continuous acquisition and the labeling of training data to keep AI
models updated with the latest threats and attack patterns is also important.
• Adversarial Attacks: AI models can be susceptible to adversarial attacks where mali-
cious actors intentionally manipulate or deceive the models to bypass security defenses.
Adversarial attacks in the context of the smart grid can have severe consequences,
such as disrupting power distribution or causing physical damage. Developing robust
defenses against adversarial attacks is an ongoing challenge.
• Model Interpretability and Explainability: AI models often operate as black boxes,
making it difficult to understand their decision-making processes. In the context
of smart grids, where the consequences of incorrect decisions can be significant,
J. Cybersecur. Priv. 2023, 3 686
the interpretability and explainability of AI models are crucial to gain trust and
enable effective human oversight. Prioritizing the development of interpretable and
explainable AI models for cybersecurity in smart grids enables human analysts to
understand the reasoning behind model decisions and ensures transparency and
accountability in the decision-making process.
• Privacy Concerns: smart-grid systems handle sensitive and personal data, including
energy consumption patterns and user behavior. The application of AI may involve
collecting and processing such data, raising privacy concerns. Ensuring proper data
anonymization, encryption, and compliance with privacy regulations is essential to
protect user privacy.
• Scalability and Performance: Smart grids generate massive amounts of data in real-
time, requiring AI models to process and analyze the data efficiently. Ensuring the
scalability and performance of AI algorithms to handle the volume and velocity of the
data in smart-grid environments is a significant challenge.
• Ethical and Bias Concerns: AI models can inadvertently inherit biases present in
the training data, leading to discriminatory or unfair outcomes. Biases in smart-grid
systems can have societal implications, such as uneven energy distribution or unfair
treatment of certain user groups. Addressing bias and ensuring ethical considerations
in AI models are essential.
• Human Expertise and Collaboration: AI technologies augment human capabilities
but do not replace the need for human expertise in cybersecurity. Collaboration
between domain experts, cybersecurity professionals, and data scientists is crucial
to effectively apply AI techniques to smart-grid cybersecurity. Developing hybrid
systems that combine the strengths of AI algorithms with human expertise for better
decision-making, threat hunting, and incident response is essential.
• Regulatory Compliance: Smart grids are subject to regulatory requirements and stan-
dards to ensure the security and privacy of energy systems. Integrating AI solutions
in compliance with regulatory frameworks, such as data protection and cybersecurity
regulations, presents a challenge that requires careful implementation and validation.
• System Complexity and Integration: smart grids consist of interconnected and hetero-
geneous systems, making the integration of AI solutions complex. Ensuring seamless
integration with the existing infrastructure, legacy systems, and diverse components
while maintaining interoperability and reliability is a challenge when deploying AI in
smart- grid cybersecurity.
Addressing these challenges requires a multidisciplinary approach, involving cyberse-
curity experts, data scientists, policymakers, and industry stakeholders to develop robust
and trustworthy AI solutions that effectively protect smart-grid systems from cyber threats
while addressing privacy, fairness, and regulatory requirements.
3.3.2. Leveraging MCDM-AHP for Selecting the Optimal AI Option for Cybersecurity in
Smart Grids
In this section, we delve into the evaluation of cybersecurity options using AI in the
context of smart grids. We begin by establishing a set of criteria to assess the effectiveness
of these options for ensuring robust cybersecurity. We then employ a pairwise comparison
matrix (Table 6) to determine the relative importance of each criterion when compared to
others (Table 7). These relative weights are used to calculate the weighted sum for each
cybersecurity option (Table 8), yielding a comprehensive score that takes into account the
significance of each criterion. Through this evaluation process, we gain valuable insights
into the strengths and weaknesses of different cybersecurity options considering AI in
addressing the specific needs of smart grids.
In the field of cybersecurity for smart grids, a variety of AI techniques and methods
can be applied to enhance security measures [211]. Here are several types and methods of
AI commonly used in cybersecurity for smart grids:
1. “A1” Machine Learning (ML):
J. Cybersecur. Priv. 2023, 3 687
• Detection Accuracy: the ability of the AI system to accurately detect and identify
security threats and attacks.
• False Positive Rate: the frequency of incorrectly flagging legitimate activities as
security threats.
• False Negative Rate: the frequency of failing to detect actual security threats or
attacks.
2. “C2” Scalability:
• Ability to Handle Large Volumes of Data: the capacity of the AI system to
process and analyze a high volume of data generated by smart-grid systems in
real-time.
• Computational Efficiency: the ability of the AI algorithms to perform complex
computations within acceptable time frames.
3. “C3” Integration and Compatibility:
• Compatibility with Existing Infrastructure: the extent to which the AI cyberse-
curity solution can integrate with the existing smart-grid infrastructure, including
hardware, software, and communication protocols.
• Interoperability: the ability of the AI system to work seamlessly with other
cybersecurity tools and systems in the smart-grid environment.
4. “C4” Performance Impact:
• System Overhead: the additional computational and resource requirements
imposed by the AI cybersecurity solution on the smart-grid system.
• Latency: the delay introduced by the AI system in detecting and responding to
security threats.
5. “C5” Cost-Effectiveness:
• Implementation Costs: the upfront costs associated with acquiring, deploying,
and maintaining the AI cybersecurity solution.
• Operational Costs: the ongoing expenses related to the operation, monitoring,
and maintenance of the AI system.
6. “C6” Manageability and Usability:
• Ease of Deployment: the simplicity and efficiency of deploying the AI solution
within the smart-grid environment.
• User-Friendliness: the intuitiveness and ease of use for the cybersecurity per-
sonnel responsible for managing and monitoring the AI system.
7. “C7” Compliance and Regulatory Requirements:
• Alignment with Industry Standards: the extent to which the AI cybersecurity
solution complies with the relevant industry standards and best practices.
• Adherence to Legal and Regulatory Requirements: the ability of the AI sys-
tem to meet the specific legal and regulatory obligations governing smart-grid
cybersecurity.
8. “C8” Resilience and Redundancy:
• Robustness: the AI system’s ability to withstand and recover from security
incidents or cyberattacks.
• Redundancy: the availability of backup mechanisms or redundant AI compo-
nents to ensure continuous operation and protection.
9. “C9” Vendor Support and Collaboration:
• Availability of Support: the level of technical support and assistance provided
by the AI solution vendor.
• Collaboration Opportunities: the vendor’s willingness to collaborate with smart-
grid operators, cybersecurity experts, and researchers to enhance the AI system’s
capabilities.
J. Cybersecur. Priv. 2023, 3 689
Based on the calculated relative weights of criteria (Table 7), we can categorize them
into three groups:
• High Relative Weights: C1 “Security Effectiveness” (26.6%) has the highest relative
weight, indicating its significant importance in evaluating cybersecurity options that
incorporate artificial intelligence (AI) techniques. This criterion focuses on the accuracy
of threat detection, false positive, and false negative rates, which are crucial for
effective security measures in smart grids.
• Medium Relative Weights: C3 “Integration and Compatibility” (21.5%) and C4 “Per-
formance Impact” (21.5%) have relatively high weights. These criteria emphasize the
seamless integration of AI cybersecurity solutions with the existing infrastructure and
the impact on system performance, both of which are important considerations in
evaluating options.
• Low Relative Weights: criteria such as C6 “Manageability and Usability” (15.8%)
(i.e., the ease of managing and using the cybersecurity options within the smart-grid
environment, emphasizing user-friendliness and efficient management practices), C5
“Cost-Effectiveness” (8.5%) (i.e., considering the balance between cost and the value of
security enhancements), C8 “Resilience and Redundancy” (8.3%) (i.e., the ability for
the cybersecurity options to provide resilience and redundancy, ensuring the continu-
ity and availability of smart-grid operations even in the face of cyber threats or failures),
C10 “Future Readiness” (7.6%) (i.e., the preparedness of the cybersecurity options to
J. Cybersecur. Priv. 2023, 3 690
We find that the consistency ratio (CR) is 0.857, which is less than the threshold value
of 0.1. This indicates acceptable consistency in the pairwise comparison matrix.
Based on the calculated weighted sums (Table 8), which represent the overall evalua-
tion of each AI technique or method in addressing the cybersecurity needs of smart grids,
considering the given criteria and their relative weights, we can categorize the alternatives
into three groups:
• High Weighted Sum: “Deep Learning (A2)” emerges as the alternative with the high-
est weighted sum (0.635), indicating its strong potential in enhancing cybersecurity in
smart grids. It demonstrates favorable performance across multiple criteria and aligns
well with the specific requirements of the evaluated criteria.
• Medium Weighted Sum:
– “Hybrid approaches (A9)” show a relatively medium weighted sum (0.574),
suggesting their effectiveness in addressing cybersecurity challenges in smart
grids. These approaches combine multiple AI techniques and methods to leverage
their respective strengths and overcome limitations.
– “Bayesian Networks (A8)” (0.531) also fall into the medium-weighted sum cate-
gory, indicating their relevance and potential in addressing cybersecurity needs.
They use probabilistic modeling to capture dependencies and uncertainties in
smart-grid systems.
– “Swarm Intelligence” (A7): This alternative also falls within the medium range of
weighted sums (0.405). Swarm intelligence techniques, such as particle swarm
optimization and ant colony optimization, offer potential benefits for optimizing
cybersecurity solutions in smart grids.
J. Cybersecur. Priv. 2023, 3 691
– “Machine Learning (ML) (A1)”: This alternative has a moderate weighted sum
(0.453), indicating that machine learning techniques have some value but are not
ranked as highly as deep learning or hybrid approaches.
• Low Weighted Sum:
– “Fuzzy Logic (A5)”: This alternative has a relatively lower weighted sum (0.324),
suggesting that fuzzy logic methods may have limited applicability or effective-
ness compared to other alternatives.
– “Natural Language Processing (NLP) (A3)”: this alternative also falls within the
lower range of weighted sums (0.312). While NLP techniques can be useful for
certain cybersecurity tasks, they may not be as prominent or effective as other
alternatives in the context of smart-grid security.
– “Expert Systems (A6)”: this alternative has a lower weighted sum (0.247), indicat-
ing that expert systems may have limitations or are perceived to have less impact
on smart-grid cybersecurity compared to other approaches.
– “Genetic Algorithms (GA) (A4)”: This alternative has the lowest weighted sum
(0.148) among the options, suggesting that genetic algorithms may have limited
applicability or effectiveness for addressing smart-grid cybersecurity challenges.
• Flexibility and Adaptability: AHP can accommodate changes in the decision problem
by allowing decision-makers to revise their judgments and priorities. This flexibility
enables the adjustment of criteria weights and the reassessment of alternatives as new
information becomes available.
• Transparency and Communication: AHP provides a clear structure for decision-
making and facilitates transparent communication among decision-makers. The hier-
archical representation and pairwise comparisons enable stakeholders to understand
the decision rationale and engage in meaningful discussions.
4.3. Enhancing MCDM-AHP for Smart-Grid Cybersecurity: Exploring Strategies for Improvement
Improving the multi-criteria decision making with the analytical hierarchy process
(MCDM-AHP) methodology for smart-grid cybersecurity involves enhancing its effec-
tiveness, adaptability, and robustness in addressing the complex and evolving challenges
posed by cyber threats. Below are several approaches to enhancing MCDM-AHP for
smart-grid cybersecurity:
• Incorporate More Comprehensive Criteria: expand the list of evaluation criteria to
encompass a broader range of factors relevant to smart-grid cybersecurity. Consider
including technical, economic, social, environmental, and regulatory criteria to capture
a holistic view of the cybersecurity landscape.
• Quantify Qualitative Criteria: develop methods to quantify qualitative criteria, such
as expert opinions, using appropriate scales or weights. This allows for a more
objective assessment and comparison of cybersecurity measures.
• Dynamic Weight Adjustments: implement dynamic weight adjustments to reflect
the changing significance of criteria over time or in response to evolving cyber threats.
This ensures that the decision-making process remains adaptable and aligned with
the emerging challenges.
• Consider Uncertainty and Risk: integrate methods to handle uncertainty and risk,
such as probabilistic modeling and sensitivity analysis. This enhances the robustness
J. Cybersecur. Priv. 2023, 3 693
4.4. Exploring MCDM Approaches for Evaluating Cybersecurity Options in Smart Grids
There are several other multi-criteria decision-making (MCDM) methods [94] that
can be implemented to compare the results obtained from the analytical hierarchy process
(AHP) and provide a broader perspective. Here are a few additional MCDM methods:
• Elimination Et Choix Traduisant la Realite (ELECTRE): ELECTRE is a family of
MCDM methods that rank alternatives based on outranking relations. It considers
multiple criteria and assesses the relative performance of alternatives through pairwise
comparisons. The ELECTRE methods are particularly useful when dealing with
imprecise or qualitative data.
• VIseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR): VIKOR is a
multi-criteria decision-making method that combines compromise programming and
outranking techniques. It determines a compromise solution by considering the
maximum “group utility” and the minimum “individual regret”. VIKOR can handle
both quantitative and qualitative criteria.
• Preference Ranking Organization METHod for Enrichment Evaluations II (PROMETHEE
II): PROMETHEE II is an extension of the PROMETHEE method that incorporates
preference functions and pairwise comparisons. It evaluates alternatives based on the
net outranking flows and provides a ranking of alternatives. PROMETHEE II accounts
for both positive and negative preference information.
• Data Envelopment Analysis(DEA): DEA is a non-parametric method that evaluates
the relative efficiency of alternatives. It considers multiple inputs and outputs to
assess the efficiency of the alternatives and identify the most efficient ones. DEA can
be particularly useful when there are limited or imprecise data available.
• Grey Decision-Making Models: grey decision-making models, such as grey rela-
tional analysis (GRA) and grey analytical network process (GANP), consider the
uncertainty and limited information available in decision-making processes. These
models can handle situations where the data are incomplete or imprecise, providing a
different perspective on evaluating alternatives.
J. Cybersecur. Priv. 2023, 3 694
5. Conclusions
5.1. Research Motivation
Smart grids have revolutionized the power sector through the introduction of trans-
formative technologies, enabling efficient energy management, grid optimization, and the
seamless integration of renewable energy sources, thereby fostering a climate-resilient
energy transition [213–217]. Nonetheless, this digitization and increased connectivity also
render smart grids susceptible to a wide range of cybersecurity threats and attacks.
systems”, and “genetic algorithms (GA)”, may have limited applicability or effectiveness
compared to other options. These findings provide insights into the effectiveness and
suitability of AI techniques and methods for enhancing smart-grid cybersecurity.
The advantages and limitations of MCDM-AHP are addressed, highlighting its po-
tential shortcomings in capturing the full complexity of cybersecurity decision-making
and the subjective nature of assigning weights to criteria. The article also proposes future
directions on how to enhance MCDM-AHP for smart-grid cybersecurity and acknowledges
the need for alternative MCDM techniques that can provide a more comprehensive and
robust assessment. These alternative techniques may include the technique for order of
preference by similarity to ideal solution (TOPSIS), preference ranking organization method
for enrichment evaluations (PROMETHEE), and others. Each technique offers unique ad-
vantages and considerations in evaluating and comparing different cybersecurity options,
addressing the limitations of MCDM-AHP.
Funding: This research was supported by the Laboratory of Renewable Energies and Advanced
Materials (LERMA) and the College of Engineering and Architecture of the International University
of Rabat (IUR).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
J. Cybersecur. Priv. 2023, 3 697
Data Availability Statement: The data used in this study, along with the details of the methodology
adopted, are comprehensively described in the methodology section (Section 2) of this article
Acknowledgments: The author extends sincere gratitude to the editorial office and the dedicated
reviewers for their insightful feedback and meticulous review, which have enhanced the clarity of
this article.
Conflicts of Interest: The author declares no conflict of interest.
References
1. Bouramdane, A.A. Climate Resilience: Insights from Global Negotiations and Morocco’s Path to Sustainability; Lambert Academic
Publishing (LAP): London, UK, 2023; ISBN: 978-620-6-75083-3. Available online: https://www.morebooks.shop/shop-ui/shop/
product/9786206750833 (accessed on 3 September 2023).
2. Bouramdane, A.A. Morocco’s Road to a Climate-Resilient Energy Transition: Emissions Drivers, Solutions, and Barriers. 2023.
Available online: https://www.researchgate.net/publication/368602073_Morocco%27s_Road_to_a_Climate-Resilient_Energy_Tr
ansition_Emissions_Drivers_Solutions_and_Barriers?channel=doi&linkId=63efefa531cb6a6d1d0df853&showFulltext=true (ac-
cessed on 3 September 2023).
3. Bouramdane, A.A. Assessment of CMIP6 Multi-Model Projections Worldwide: Which Regions Are Getting Warmer and Are
Going Through a Drought in Africa and Morocco? What Changes from CMIP5 to CMIP6? Sustainability 2023, 15, 690. [CrossRef]
4. Bouramdane, A.A. Determining Vulnerable Areas to Warming and Drought in Africa and Morocco Based on CMIP6 Projections:
Towards the Implementation of Mitigation and Adaptation Measures. In Proceedings of the EGU General Assembly 2023, Vienna,
Austria, 24–28 April 2023; EGU23-2456. [CrossRef]
5. Bouramdane, A.A. Lieux Les Plus Sensibles Au Changement Climatique Nécessitant des Mesures d’Atténuation et d’Adaptation.
Energie/Mines Carrières, 12 May 2023 . Available online: https://zenodo.org/record/7937556 (accessed on 3 September 2023).
6. Bouramdane, A.A. Climate Risks and Energy Transition in Morocco: Vulnerability to Climate Losses and Damages and Uncertainty
in the Renewable Electricity Mix Under Different Penetration; Lambert Academic Publishing (LAP): London, UK, 2023; ISBN:
978-620-6-17980-1. Available online: https://www.morebooks.shop/shop-ui/shop/product/9786206179801 (accessed on 3
September 2023).
7. Bouramdane, A.A. Chaleur Caniculaire, Incendies Gigantesques à Répétition: Des Signes du Changement Climatique? Én-
ergie/Mines Carrières, 2 August 2022. Available online: https://zenodo.org/record/7594264 (accessed on 3 September 2023).
8. Bouramdane, A.A. Sécheresse: L’extrême Va-t-il Progressivement Devenir la Norme? Énergie/Mines Carrières, 12 August 2022.
Available online: https://zenodo.org/record/7594311 (accessed on 3 September 2023).
9. Bouramdane, A.A. Quelle est la Relation entre l’Agriculture et le Changement Climatique? Énergie/Mines Carrières, 20 February
2023. Available online: https://zenodo.org/record/7730008 (accessed on 3 September 2023).
10. Bouramdane, A.A. Solutions Pour Réduire la Pression sur l’Eau. Énergie/Mines Carrières, 26 May 2023. Available online:
https://zenodo.org/record/8021765 (accessed on 3 September 2023).
11. Bouramdane, A.A. Préservation des Ressources d’Eau et Transition Énergétique: Point sur le Photovoltaïque Flottant. Én-
ergie/Mines Carrières, 26 May 2023. Available online: https://zenodo.org/record/8021774 (accessed on 3 September 2023).
12. Bouramdane, A.A. Scenarios of Large-Scale Solar Integration with Wind in Morocco: Impact of Storage, Cost, Spatio-Temporal
Complementarity and Climate Change. Ph.D. Thesis, Physics, Institut Polytechnique de Paris, Paris, France, 2021.
13. Bouramdane, A.-A. RCP 8.5 Climate Change Versus Cost Effect on Optimal Scenario Mixes of Variable and Dispatchable
Technologies in Morocco: Climate Model Inter-Comparison. Ph.D. Thesis, Physics, Institut Polytechnique de Paris, Paris, France,
2021. [CrossRef]
14. RUSI. United Services Institute for Defense and Security Studies, “Security a Net-Zero Future: Cyber Risks to the Energy
Transition”. 2022. Available online: https://rusi.org/explore-our-research/publications/emerging-insights/securing-net-zero-f
uture-cyber-risks-energy-transition (accessed on 4 July 2023).
15. Mo, Y.; Kim, T.H.J.; Brancik, K.; Dickinson, D.P.; Lee, H.; Perrig, A.; Sinopoli, B. Cyber–Physical Security of a Smart Grid
Infrastructure. Proc. IEEE 2012, 100, 195–209.
16. Rekik, M.; Chtourou, Z.; Gransart, C.; Atieh, A. A Cyber-Physical Threat Analysis for Microgrids. In Proceedings of the 2018 15th
International Multi-Conference on Systems, Signals & Devices (SSD), Hammamet, Tunisia, 19–22 March 2018; pp. 731–737.
17. Woo, P.S.; Kim, B.H. Methodology of Cyber Security Assessment in the Smart Grid. J. Electr. Eng. Technol. 2017, 12, 495–501.
[CrossRef]
18. Asrari, A.; Ansari, M.; Khazaei, J.; Cecchi, V. Real-time Blackout Prevention in Response to Decentralized Cyberattacks on a
Smart Grid. In Proceedings of the 2020 IEEE Texas Power and Energy Conference (TPEC), College Station, TX, USA, 6–7 February
2020; pp. 1–5.
19. Ansari, M.; Asrari, A. Reaction to Detected Cyberattacks in Smart Distribution Systems. In Proceedings of the 2020 IEEE Power &
Energy Society Innovative Smart Grid Technologies Conference (ISGT), Washington, DC, USA, 17–20 February 2020; pp. 1–5.
20. Alkuwari, A.N.; Al-Kuwari, S.M.; Qaraqe, M.K. Anomaly Detection in Smart Grids: A Survey From Cybersecurity Perspective.
In Proceedings of the 2022 3rd International Conference on Smart Grid and Renewable Energy (SGRE), Doha, Qatar, 20–22 March
2022; pp. 1–7.
J. Cybersecur. Priv. 2023, 3 698
21. Bhattacharjee, S.; Islam, M.J.; Abedzadeh, S. Robust Anomaly based Attack Detection in Smart Grids under Data Poisoning
Attacks. In Proceedings of the 8th ACM on Cyber-Physical System Security Workshop, Nagasaki, Japan, 30 May 2022.
22. Liu, Q.; Hagenmeyer, V.; Keller, H.B. A Review of Rule Learning-Based Intrusion Detection Systems and Their Prospects in Smart
Grids. IEEE Access 2021, 9, 57542–57564. [CrossRef]
23. Gül, Ö. A Research on Cyber Security Intrusion Detection Against Physical Access Cyber Attacks Using Open Source Software
for Smart Grids. Int. Rev. Electr. Eng. Iree 2021, 16, 136–146. [CrossRef]
24. Bertone, F.; Lubrano, F.; Goga, K. Artificial Intelligence Techniques to Prevent Cyber Attacks on Smart Grids. Ann. Disaster Risk
Sci. 2020, 3, 249381. [CrossRef]
25. Alwageed, H.S. Detection of Cyber Attacks in Smart Grids Using SVM-Boosted Machine Learning Models. Serv. Oriented Comput.
Appl. 2022, 16, 313–326. [CrossRef]
26. Bhattarai, B.P.; Paudyal, S.; Luo, Y.; Mohanpurkar, M.U.; Cheung, K.; Tonkoski, R.; Hovsapian, R.; Myers, K.S.; Zhang, R.; Zhao, P.;
et al. Big Data Analytics in Smart Grids: State-Of-the-Art, Challenges, Opportunities, and Future Directions. IET Smart Grid 2019,
2, 141–154. [CrossRef]
27. Colmenares-Quintero, R.F.; Quiroga-Parra, D.J.; Rojas, N.N.V.; Stansfield, K.; Colmenares-Quintero, J.C. Big Data Analytics in
Smart Grids for Renewable Energy Networks: Systematic Review of Information and Communication Technology Tools. Cogent
Eng. 2021, 8, 1935410. [CrossRef]
28. Zavala-Diaz, J.; Reyes-Archundia, E.; Olivares-Rojas, J.C.; Chavez-Baez, M.V.; Gutiérrez-Gnecchi, J.A.; Méndez-Patiño, A. Study
of Public Key Cryptography Techniques for Authentication in Embedded Devices for Smart Grids. In Proceedings of the IEEE
International Autumn Meeting on Power, Electronics and Computing (ROPEC 2021), Ixtapa, Mexico 10–12 November 2021;
Volume 5; pp. 1–5.
29. Zhai, F.; Yang, T.; Zhao, B.; Chen, H. Privacy-Preserving Outsourcing Algorithms for Multidimensional Data Encryption in Smart
Grids. Sensors 2022, 22, 4365. [CrossRef]
30. Nyangaresi, V.O.; Alsamhi, S.H. Towards Secure Traffic Signaling in Smart Grids. In Proceedings of the 2021 3rd Global Power,
Energy and Communication Conference (GPECOM), Virtual, 5–8 October 2021; pp. 196–201.
31. Dutta, S.; Chukkapalli, S.S.L.; Sulgekar, M.; Krithivasan, S.; Das, P.K.; Joshi, A. Context Sensitive Access Control in Smart Home
Environments. In Proceedings of the 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl
Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS),
Baltimore, MD, USA, 25–27 May 2020; pp. 35–41.
32. Mutsvangwa, A.; Nleya, B.; Nleya, B. Secured Access Control Architecture Consideration for Smart Grids. In Proceedings of the
2016 IEEE PES PowerAfrica, Livingstone, Zambia, 28 June 2016–3 July 2016; pp. 228–233.
33. Wang, H.; Yu, H.; Zheng, H.; Wang, G.; Wang, C.; Li, B. A Secure and Efficient Data Transmission Scheme for Edge Devices
in Smart Grids. In Proceedings of the 2020 IEEE International Conference on Progress in Informatics and Computing (PIC),
Shanghai, China, 18–20 December 2020; pp. 323–327.
34. Sikeridis, D.; Bidram, A.; Devetsikiotis, M.; Reno, M.J. A Blockchain-Based Mechanism for Secure Data Exchange in Smart
Grid Protection Systems. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications & Networking Conference
(CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–6.
35. Genge, B.; Haller, P.; Dumitru, C.D.; Enăchescu, C. Designing Optimal and Resilient Intrusion Detection Architectures for Smart
Grids. IEEE Trans. Smart Grid 2017, 8, 2440–2451. [CrossRef]
36. Höfling, M. Design, Evaluation, and Optimization of Communication Architectures for Smart Grids. Ph.D. Thesis, Universität
Tübingen, Tübingen, Germany, 2017.
37. Cheng, A.J.W. Evaluating the Impacts of Centralized and Decentralized Electric Vehicle Smart Charging Algorithms on the
Electric Grid. Ph.D. Thesis, UC Irvine, Irvine, CA, USA, 2018.
38. Danzi, P. Communication Architectures for Reliable and Trusted Wireless Systems in Smart Grids. Ph.D. Thesis, Aalborg
Universitet, Aalborg, Denmark, 2019.
39. Popovic, M. Redundancy in Communication Networks for Smart Grids. Ph.D. Thesis, École Polytechnique Fédérale de Lausanne,
Lausanne, Switzerland, 2016.
40. Santos, A.A.; Rizk, A.; Steinke, F. Flexible Redundancy Generation for Virtual Network Embedding with an Application to Smart
Grids. In Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Virtual, 22–26 June 2020.
41. Gavriluta, C.; Boudinet, C.; Kupzog, F.; Gómez-Expósito, A.; Caire, R. Cyber-Physical Framework for Emulating Distributed
Control Systems in Smart Grids. Int. J. Electr. Power Energy Syst. 2020, 114, 105375. [CrossRef]
42. Hammad, E.M.; Farraj, A.K.; Kundur, D. On Cyber-Physical Coupling and Distributed Control in Smart Grids. IEEE Trans. Ind.
Informatics 2019, 15, 4418–4429. [CrossRef]
43. Petrenko, S. Ontology of Cyber Security of Self-Recovering Smart Grid. In CEUR Workshop; 2018. Available online: https:
//ceur-ws.org/Vol-2081/paper21.pdf (accessed on 3 September 2023).
44. Fries, S.; Hof, H.J. Regulations and Standards Relevant for Security of the Smart Grid. Available online: https://books.google.co.
jp/books?hl=zh-CN&lr=&id=cgbSBQAAQBAJ&oi=fnd&pg=PA205&dq=Fries,+S.%3B+Hof,+H.J.+Regulations+and+Standa
rds+Relevant+for+Security+of+the+Smart+Grid&ots=O4IQE-OY8W&sig=CBUkLHbDOPFDWh9_HIlvPKmFrIM&redir_esc
=y#v=onepage&q&f=false (accessed on 3 September 2023).
J. Cybersecur. Priv. 2023, 3 699
45. Cespedes, R. Lessons Learned and Future Challenges for the Development of Smart Grids in Latin America. In Proceedings of
the 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), Washington, DC, USA, 16–20 January 2012; p. 1.
46. Ruland, C.; Sassmannshausen, J.; Waedt, K.; Zivic, N.S. Smart Grid Security–An Overview of Standards and Guidelines. E I
Elektrotechnik Und Informationstechnik 2017, 134, 19–25. [CrossRef]
47. Falcis, N.D. Best Sync Practices & Architecture Strategies for Secure, Resilient PNT in Smart Grids. In The Precise Time and Time
Interval Systems and Applications Meeting; Institute of Navigation (ION): Manassas, VA, USA, 2022.
48. Nicol, D.M.; Belovich, E.; Bohara, A. Smart Grid Network Flows Best Practices Checker. In Proceedings of the 2022 IEEE
International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm),
Singapore, 25–28 October 2022; pp. 231–237.
49. Tang, S.; Liu, Z.; Wang, L. Power System Reliability Analysis Considering External and Insider Attacks on the SCADA System.
In Proceedings of the 2020 IEEE/PES Transmission and Distribution Conference and Exposition (T&D), Chicago, IL, USA, 12–15
October 2020; pp. 1–5.
50. Miller, M.Z.; Griendling, K.; Mavris, D.N. Exploring Human Factors Effects in the Smart Grid System of Systems Demand
Response. In Proceedings of the 2012 7th International Conference on System of Systems Engineering (SoSE), Genova, Italy, 16–19
July 2012; pp. 1–6.
51. Collen, A.; Szanto, I.C.; Benyahya, M.; Genge, B.; Nijdam, N.A. Integrating Human Factors in the Visualisation of Usable
Transparency for Dynamic Risk Assessment. Information 2022, 13, 340. [CrossRef]
52. Fredman, D. A Human Side of the Smart Grid: Behavior-Based Energy Efficiency from Renters Using Real-Time Feedback and
Competitive Performance-Based Incentives. Ph.D. Thesis, The University of Vermont and State Agricultural College, Burlington,
VT, USA, 2018.
53. Szekeres, A.; Snekkenes, E.A. Representing Decision-Makers in SGAM-H: The Smart Grid Architecture Model Extended with the
Human Layer. In Proceedings of the GraMSec@CSF, Boston, MA, USA, 22 June 2020.
54. Rodriguez, R.M.; Golob, E.J.; Xu, S. Human Cognition Through the Lens of Social Engineering Cyberattacks. Front. Psychol. 2020,
11, 1755.
55. Siddiqi, M.A.; Pak, W.; Siddiqi, M.A. A Study on the Psychology of Social Engineering-Based Cyberattacks and Existing
Countermeasures. Appl. Sci. 2022, 12, 6042 . [CrossRef]
56. Ray, J.R. Training Programs to Increase Cybersecurity Awareness and Compliance in Non-Profits. 2014. Available online:
https://scholarsbank.uoregon.edu/xmlui/bitstream/handle/1794/19638/Ray2014.pdf (accessed on 3 September 2023).
57. Albediwi, M.; Sadaf, K. A Framework for Cybersecurity Awareness in Saudi Arabia. J. Eng. Appl. Sci. 2023, 10, 35–35 . [CrossRef]
58. Loi, M.; Christen, M. Ethical Frameworks for Cybersecurity. In The International Library of Ethics, Law and Technology; Springer
Nature, Switzerland AG: Basel, Switzerland, 2020.
59. Zojer, G. Theorising Security: A Human Security Perspective on Cybersecurity. 2019. Available online: https://lauda.ulapland.fi/
bitstream/handle/10024/64113/Zojer.Gerald%20part%202.pdf?sequence=1 (accessed on 3 September 2023).
60. Rahman, M.A.; Manshaei, M.H.; Al-Shaer, E.; Shehab, M. Secure and Private Data Aggregation for Energy Consumption
Scheduling in Smart Grids. IEEE Trans. Dependable Secur. Comput. 2017, 14, 221–234. [CrossRef]
61. Aloulou, R.; Meddeb-Makhlouf, A.; Gassara, B.; Fakhfakh, A. Securing a Power Management Chain for Smart Grids. In
Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June
2020; pp. 1713–1718.
62. de Jesus Martins, R.; Knob, L.A.D.; da Silva, E.G.; Wickboldt, J.A.; Filho, A.E.S.; Granville, L.Z. Specialized CSIRT for Incident
Response Management in Smart Grids. J. Netw. Syst. Manag. 2018, 27, 269–285. [CrossRef]
63. Albasrawi, M.N.; Jarus, N.; Joshi, K.; Sarvestani, S.S. Analysis of Reliability and Resilience for Smart Grids. In Proceedings of the
International Computer Software and Applications Conference, Vasteras, Sweden, 21–25 July 2014; pp. 529–534.
64. Kanca, A.M.; Sağiroğlu, Ş. Sharing Cyber Threat Intelligence and Collaboration. In Proceedings of the 2021 International
Conference on Information Security and Cryptology (ISCTURKEY), Ankara, Turkey, 2–3 December 2021; pp. 167–172.
65. Vakilinia, I. Collaborative Analysis of Cybersecurity Information Sharing. Ph.D. Thesis, University of Nevada, Reno, NV,
USA, 2019.
66. Bassiliades, N.; Chalkiadakis, G. Artificial Intelligence Techniques for the Smart Grid. Adv. Build. Energy Res. 2018, 12, 1–2.
[CrossRef]
67. Ahmed, B.; Shuja, M.E.; Mishra, H.M.; Qtaishat, A.; Kumar, M. IoT Based Smart Systems using Artificial Intelligence and Machine
Learning: Accessible and Intelligent Solutions. In Proceedings of the 2023 6th International Conference on Information Systems
and Computer Networks (ISCON), Mathura, India, 3–4 March 2023; pp. 1–6.
68. Parati, N.; Amdani, D.S.Y. Deep Learning for Cyber Security; Journal of Computer Science: Dubai, United Arab Emirates, 2020.
69. Basodi, S.; Tan, S.; Song, W.; Pan, Y. Data Integrity Attack Detection in Smart Grid: A Deep Learning Approach. Int. J. Secur.
Netw. 2020, 15, 15–24. [CrossRef]
70. Aziz, S.; Irshad, M.; Haider, S.A.; Wu, J.; Deng, D.; Ahmad, S. Protection of a Smart Grid with the Detection of Cyber-Malware
Attacks Using Efficient and Novel Machine Learning Models. Front. Energy Res. 2022, 10, 1102. [CrossRef]
71. Pokhrel, S.; Abbas, R.; Aryal, B. IoT Security: Botnet Detection in IoT Using Machine Learning. arXiv 2021, arXiv:2104.02231.
J. Cybersecur. Priv. 2023, 3 700
72. McDonald, C.; Hogue, C.M.; Ashley, J.; Blejski, B.; Barraza, A.; Donner, P.; Leary, T.; Evangelista, P.F.; Leger, A.S. Investigating
Machine Learning for Anomaly Detection in Phasor Measurement Unit Data. In Proceedings of the 2020 52nd North American
Power Symposium (NAPS), Tempe, AZ, USA. 11–13 April 2021; pp. 1–6.
73. Sun, S.; Liu, C.; Zhu, Y.; He, H.; Xiao, S.; Wen, J. Deep Reinforcement Learning for the Detection of Abnormal Data in Smart
Meters. Sensors 2022, 22, 8543. [CrossRef]
74. Li, X.J.; Ma, M.D.; Sun, Y. An Adaptive Deep Learning Neural Network Model to Enhance Machine-Learning-Based Classifiers
for Intrusion Detection in Smart Grids. Algorithms 2023, 16, 288. [CrossRef]
75. Yu, T.; Da, K.; Wang, Z.; Ling, Y.; Li, X.; Bin, D.; Yang, C. An Advanced Accurate Intrusion Detection System for Smart Grid
Cybersecurity Based on Evolving Machine Learning. Front. Energy Res. 2022, 10, 903370. [CrossRef]
76. de Oliveira Saraiva, F.; Asada, E.N. Decision Making in Intelligent Electrical Systems Using Distributed Artificial Intelligence and
Heuristic Methods.In Proceedings of the 2013 IEEE PES Conference on Innovative Smart Grid Technologies (ISGT Latin America),
Sao Paulo, Brazil, 15–17 Apri l 2013.
77. Biaojun, L.; Chuantao, Y.; Feng, Z.; Lin, W.H.; Jiashui, D.; Quanzhou, X. Intelligent Decision Support System for Business
Forecasting Using Artificial Intelligence. Arab. J. Sci. Eng. 2021, 48, 4113.
78. Mohana, P.; Muthuvinayagam, M.; Umasankar, P.; Muthumanickam, T. Automation Using Artificial Intelligence Based Natural
Language Processing. In Proceedings of the 2022 6th International Conference on Computing Methodologies and Communication
(ICCMC), Erode, India, 29–31 March 2022; pp. 1735–1739.
79. Lee, J.; Kim, M.; Park, K.; Noh, S.; Bisht, A.; Das, A.K.; Park, Y. Blockchain-Based Data Access Control and Key Agreement System
in IoT Environment. Sensors 2023, 23, 5173. [CrossRef]
80. Abdulwahid, A.H. Artificial Intelligence-based Control Techniques for HVDC Systems. Emerg. Sci. J. 2023, 7, 643–653. [CrossRef]
81. Kulkarni, Y.; SayfHussain, Z.; Ramamritham, K.; Somu, N. EnsembleNTLDetect: An Intelligent Framework for Electricity Theft
Detection in Smart Grid. In Proceedings of the 2021 International Conference on Data Mining Workshops (ICDMW), Auckland,
New Zealand, 7–10 December 2021; pp. 527–536.
82. Bao, H.; Ren, B.; Li, B.; Kong, Q. BBNP: A Blockchain-Based Novel Paradigm for Fair and Secure Smart Grid Communications.
IEEE Internet Things J. 2022, 9, 12984–12996. [CrossRef]
83. Gope, P.; Sikdar, B.K. Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication. IEEE Trans.
Smart Grid 2019, 10, 3953–3962. [CrossRef]
84. Sri, P.L.; Krishna, C.N.; Sai, A.D.; Roshini, S. Concealing the Data Using Cryptography. In Proceedings of the 2023 Third
International Conference on Artificial Intelligence and Smart Energy (ICAIS), Coimbatore, India, 2–4 February 2023; pp. 368–372.
85. Raghavasimhan, T.V.; Manoj, S.; Sweetlin, J.D.; Rakshit, S. Preventing Cryptographic Attacks Using AI-hard Password Authenti-
cation. In Proceedings of the 2023 International Conference on Networking and Communications (ICNWC), Chennai, India, 5–6
April 2023; pp. 1–6.
86. Choi, I.S.; Hong, J.; Kim, T. Multi-Agent Based Cyber Attack Detection and Mitigation for Distribution Automation System. IEEE
Access 2020, 8, 183495–183504. [CrossRef]
87. Alatwi, H.A.; Morisset, C. Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review. arXiv
2021, arXiv:abs/2112.03315.
88. Janjić, A.; Savic, S.M.; Velimirovic, L.Z.; Nikolić, V. Renewable Energy Integration in Smart Grids-Multicriteria Assessment Using
the Fuzzy Analytical Hierarchy Process. Turk. J. Electr. Eng. Comput. Sci. 2015, 23, 1896–1912. [CrossRef]
89. Omar, F.; Bushby, S.T.; Williams, R.D. Assessing the Performance of Residential Energy Management Control Algorithms:
Multi-Criteria Decision Making Using the Analytical Hierarchy Process. Energy Build. 2018, 199, 537–546. [CrossRef]
90. Alilou, M.; Gharehpetian, G.B.; Ahmadiahangar, R.; Rosin, A.; Anvari-Moghaddam, A. Day-Ahead Scheduling of Electric
Vehicles and Electrical Storage Systems in Smart Homes Using a Novel Decision Vector and AHP Method. Sustainability 2022, 14,
11773. [CrossRef]
91. Ashari, S.; Setiawan, E.A. Optimization of Advanced Metering Infrastructure (AMI) Customer Ecosystem by Using Analytic
Hierarchy Process Method. In Proceedings of the 2022 10th International Conference on Smart Grid (icSmartGrid), Istanbul,
Turkey, 27–29 June 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 240–248.
92. Petrova, V.A. The Hierarchical Decision Model of Cybersecurity Risk Assessment. In Proceedings of the 2021 12th National
Conference with International Participation (ELECTRONICA), Sofia, Bulgaria, 27–28 May 2021; pp. 1–4.
93. Ungkap, P.; Daengsi, T. Cybersecurity Awareness Modeling Associated with Influential Factors Using AHP Technique: A Case
of Railway Organizations in Thailand. In Proceedings of the 2022 International Conference on Decision Aid Sciences and
Applications (DASA), Chiangrai, Thailand., 23–25 March 2022; pp. 1359–1362.
94. Taherdoost, H.; Madanchian, M. Multi-Criteria Decision Making (MCDM) Methods and Concepts. Encyclopedia 2023, 3, 77–87.
[CrossRef]
95. Piwowarski, M.; Nermend, K. Issues of Multi-Criteria Methods Applicability Supporting Complex Business Process Decision-
Making in Management. In Proceedings of the International Conference on Knowledge-Based Intelligent Information &
Engineering Systems, Verona, Italy, 7–9 September 2022.
96. Kumar, V.; Vrat, P.; Shankar, R. Prioritization of Strategies to Overcome the Barriers in Industry 4.0: A Hybrid MCDM Approach.
OPSEARCH 2021, 58, 711–750. [CrossRef]
J. Cybersecur. Priv. 2023, 3 701
97. Youssef, M.I.; Webster, B. A Multi-Criteria Decision Making Approach to the New Product Development Process in Industry.
Rep. Mech. Eng. 2022, 3, 83–93. [CrossRef]
98. Zavadskas, E.K.; Turskis, Z. Multiple Criteria Decision Making (MCDM) Methods in Economics: An Overview. Technol. Econ.
Dev. Econ. 2011, 17, 397–427. [CrossRef]
99. Dymowa, L. MCDM with Applications in Economics and Finance; Springer Nature: Berlin/Heidelberg, Germany, 2011.
100. Ayag, Z. A Comparison Study of Fuzzy-Based Multiple-Criteria Decision-Making Methods to Evaluating Green Concept
Alternatives in a New Product Development Environment. Int. J. Intell. Comput. Cybern. 2021, 14, 412–438. [CrossRef]
101. Macêdo-Júnior, R.O.; Serpa, F.S.; Santos, B.L.P.; Vasconcelos, C.R.D.; Silva, G.F.; Ruzene, D.S.; Silva, D.P. Produced Water
Treatment and Its Green Future in the Oil and Gas Industry: A Multi-Criteria Decision-Making Study. Int. J. Environ. Sci. Technol.
2022, 20, 1369–1384. [CrossRef]
102. Osintsev, N. Multi-Criteria Decision-Making in Transport and Logistics. Transp. Ural. 2021, 4, 3–17 . [CrossRef]
103. Hajduk, S. Multi-Criteria Analysis in the Decision-Making Approach for the Linear Ordering of Urban Transport Based on
TOPSIS Technique. Energies 2021, 15, 274. [CrossRef]
104. Kumar, A.; Sah, B.; Singh, A.R.; Deng, Y.; He, X.; Kumar, P.; Bansal, R.C. A Review of Multi Criteria Decision Making (MCDM)
Towards Sustainable Renewable Energy Development. Renew. Sustain. Energy Rev. 2017, 69, 596–609. [CrossRef]
105. Lenarczyk, A.; Jaskólski, M.; Bućko, P. The Application of a Multi-Criteria Decision-Making for Indication of Directions of the
Development of Renewable Energy Sources in the Context of Energy Policy. Energies 2022, 15, 9629. [CrossRef]
106. Shimray, B.A.; Singh, K.M.; Mehta, R.K. A Survey of Multi-Criteria Decision Making Technique Used in Renewable Energy
Planning. Int. J. Comput. 2017, 4523, 124–140.
107. Witt, T.; Klumpp, M. Multi-Period Multi-Criteria Decision Making under Uncertainty: A Renewable Energy Transition Case from
Germany. Sustainability 2021, 13, 6300. [CrossRef]
108. Bouramdane, A.A. Identifying Large-Scale Photovoltaic and Concentrated Solar Power Hot Spots: Multi-Criteria Decision-Making
Framework. World Acad. Sci. Eng. Technol. Int. J. Energy Power Eng. 2023, 17. [CrossRef]
109. Bouramdane, A.A. Spatial Suitability Assessment of Onshore Wind Systems Using the Analytic Hierarchy Process . World Acad.
Sci. Eng. Technol. Int. J. Energy Power Eng. 2023, 17. [CrossRef]
110. Bouramdane, A.A. Site Suitability of Offshore Wind Energy: A Combination of Geographic Referenced Information and Analytic
Hierarchy Process. World Acad. Sci. Eng. Technol. Int. J. Energy Power Eng. 2023, 17. [CrossRef]
111. Bouramdane, A.A. Potential Site for Offshore Floating Photovoltaic Systems in Morocco: Evaluation Criteria Required Considering Climate
Change Effects to Achieve the Energy Trilemma; Lambert Academic Publishing (LAP): London, UK, 2023. ISBN: 978-620-6-15964-3.
Available online: https://www.morebooks.shop/shop-ui/shop/product/9786206159643 (accessed on 3 September 2023).
112. Sariyildiz, A.Y. Evaluation of the Health Performances of the Regions Affiliated to the Ministry of Health by Multi-Criteria
Decision Making Techniques. J. Health Sci. Med. 2022, 5, 1562–1567 . [CrossRef]
113. Ardalan, S.A.; Mirzaie, A.; Begloo, A.G. Prioritizing the Factors Affecting Adoption of E-Commerce Using Multi-Criteria Decision
Making Techniques in Tehran Hospitals in 2021. J. Fam. Med. Prim. Care 2022, 11, 7842–7849.
114. Castro-Lopez, A.; Cervero, A.; Galve-González, C.; Puente, J.; Bernardo, A.B. Evaluating Critical Success Factors in the
Permanence in Higher Education Using Multi-Criteria Decision-Making. High. Educ. Res. Dev. 2021, 41, 628–646. [CrossRef]
115. Xu, S.; Yeyao, T.; Shabaz, M. Multi-Criteria Decision Making for Determining Best Teaching Method Using Fuzzy Analytical
Hierarchy Process. Soft Comput. 2022, 27, 2795–2807. [CrossRef]
116. Thakkar, N.; Paliwal, P. A State-of-the-Art Review on Multi-criteria Decision Making Approaches for Micro-grid Planning. In
Algorithms for Intelligent Systems; Springer Nature: Berlin/Heidelberg, Germany, 2022.
117. Omar, F. A Residential Energy Control Algorithm Assessment Tool forSmart Grid: Multi-Criteria Decision Making Using the
AnalyticalHierarchy Process. Ph.D. Thesis, Faculty of the School of Engineering and Applied Science, Department of Electrical
and Computer Engineering, University of Virginia, Charlottesville, VA, USA, 2019.
118. Zou, X.; Ma, S.D.; Xin, S. An Analytical Hierarchy Process Approach for Smart City Assessment in Japan. Int. Rev. Spat. Plan.
Sustain. Dev. 2022, 10, 58–72. [CrossRef]
119. Saaty, T.L. Decision Making for Leaders: The Analytical Hierarchy Process for Decisions in a Complex World. 1982, 291.
Available online: https://api.semanticscholar.org/CorpusID:53771268 (accessed on 3 September 2023).
120. Saaty, T.L. Decision Making with the Analytic Hierarchy Process. Int. J. Serv. Sci. 2008, 1, 83–98. [CrossRef]
121. Saaty, T.L. A Scaling Method for Priorities in Hierarchical Structures. J. Math. Psychol. 1977, 15, 234–281. [CrossRef]
122. Saaty, T.L. How to Make a Decision: The Analytic Hierarchy Process. Interfaces 1990, 24, 19–43. [CrossRef]
123. Saaty, T.L. The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation. 1990. Available online: https:
//api.semanticscholar.org/CorpusID:120643630 (accessed on 3 September 2023).
124. Saaty, R.W. The Analytic Hierarchy Process—What It Is and How It Is Used. Math. Model. 1987, 9, 161–176. [CrossRef]
125. Saaty, T.L. What is the Analytic Hierarchy Process; Springer: Berlin/Heidelberg, Germany, 1988.
126. Saaty, T.L. Fundamentals of Decision Making and Priority Theory With the Analytic Hierarchy Process; RWS Publications: Ellsworth
Ave Pittsburgh, PA, USA, 2000.
127. Mancarella, P. Smart Multi-Energy Grids: Concepts, Benefits and Challenges. In Proceedings of the 2012 IEEE Power and Energy
Society General Meeting, San Diego, CA, USA, 22–26 July 2012; pp. 1–2.
128. Abdullah, A.A.; Hassan, T.M. Smart Grid (SG) Properties and Challenges: An Overview. Discov. Energy 2022, 2 , 8. [CrossRef]
J. Cybersecur. Priv. 2023, 3 702
129. Miroshnyk, O.; Moroz, O.; Shchur, T.; Chepizhnyi, A.; Qawaqzeh, M.Z.; Kocira, S. Investigation of Smart Grid Operation Modes
with Electrical Energy Storage System. Energies 2023, 16, 2638. [CrossRef]
130. Simes, M.G.; Farret, F.A. Stand Alone and Grid-Connected Inverters; Wiley-IEEE Press: Hoboken, NJ, USA, 2017; pp. 177–202.
[CrossRef]
131. Ahmetović, H.; Bosovic, A.; Merzic, A.; Music, M. Analysis of Microgrid Operation in Stand-Alone Mode - Sustainable Smart
Tourist Village Case Study. B H Electr. Eng. 2020, 14, 35–42. [CrossRef]
132. Chankaya, M.; Ahmad, A.; Hussain, I. Smart Grid-Tied PV-Battery Storage System Operation under Dynamic Conditions. In
Proceedings of the 2022 1st International Conference on Sustainable Technology for Power and Energy Systems (STPES), Srinagar,
India, 4–6 July 2022; pp. 1–6.
133. Abdukhakimov, A.; Bhardwaj, S.; Gashema, G.; Kim, D.S. Reliability Analysis in Smart Grid Networks Considering Distributed
Energy Resources and Storage Devices. Int. J. Electr. Electron. Eng. Telecommun. 2019, 8, 233–237. [CrossRef]
134. Xu, G.; Yu, W.; Griffith, D.W.; Golmie, N.; Moulema, P. Toward Integrating Distributed Energy Resources and Storage Devices in
Smart Grid. IEEE Internet Things J. 2017, 4, 192–204. [CrossRef]
135. Al-Hallaj, S.; Wilke, S.K.; Schweitzer, B. Energy Storage Systems for Smart Grid Applications. 2017. Available online:
https://link.springer.com/chapter/10.1007/978-3-319-48920-9_8 (accessed on 3 September 2023).
136. Gellings, C.W.; Gellings, C.W. The Smart Grid: Enabling Energy Efficiency and Demand Response; CRC press: Boca Raton, FL,
USA, 2020.
137. Shakeri, M.; Pasupuleti, J.; Amin, N.; Rokonuzzaman, M.; Low, F.W.; Yaw, C.T.; Asim, N.; Samsudin, N.A.; Tiong, S.K.; Hen, C.K.;
et al. An Overview of the Building Energy Management System Considering the Demand Response Programs, Smart Strategies
and Smart Grid. Energies 2020, 13, 3299. [CrossRef]
138. Nawaz, F.; Ahmad, G.; Ihsanullah.; Javed, K.; Khan, I.; Khan, W. An optimal Home Energy Management System Based on Time
of Use pricing Scheme in Smart Grid. Int. J. Sci. Eng. Res. 2017, 8, 882–894.
139. Das, S.; Acharjee, P.; Bhattacharya, A. Charging Scheduling of Electric Vehicle Incorporating Grid-to-Vehicle and Vehicle-to-Grid
Technology Considering in Smart Grid. IEEE Trans. Ind. Appl. 2021, 57, 1688–1702. [CrossRef]
140. Shebanow, A. The Efficacy and Challenges of SCADA and Smart Grid Integration. J. Cyber Secur. Inf. Syst. 2016, 1, 1–7.
141. Tanwar, S.; Tyagi, S.; Kumar, S. The Role of Internet of Things and Smart Grid for the Development of a Smart City; Springer: Singapore,
2018.
142. Winanda, M.; Satriawan, A.; Gondokaryono, Y.S. Smart Grid Secure Data Transmission for High Voltage Grid. In Proceedings
of the 2014 International Conference on Information Technology Systems and Innovation (ICITSI), Bandung, Indonesia, 24–27
November 2014; pp. 70–75.
143. Zolin, D.; Ryzhkova, E. Wide Area Monitoring System (WAMS) Application in Smart Grids. In Proceedings of the 2021 3rd
International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE), Moscow, Russia, 11–13 March
2021; pp. 1–6.
144. Vijayalakshmi, S.; Kavitha, D. Optimal Placement of Phasor Measurement Units for Smart Grid Applications. In Proceedings of
the 2018 National Power Engineering Conference (NPEC), Madurai, India, 9–10 March 2018; pp. 1–6.
145. Peng, F.Z. Flexible AC Transmission Systems (FACTS) and Resilient AC Distribution Systems (RACDS) in Smart Grid. Proc. IEEE
2017, 105, 2099–2115. [CrossRef]
146. Wall, R.L. Intelligent Application of Flexible AC Transmission System Components in an Evolving Power Grid; University of Arkansas:
Fayetteville, AR, USA, 2018.
147. Abrahamsen, F.E.; Ai, Y.; Cheffena, M. Communication Technologies for Smart Grid: A Comprehensive Survey. Sensors 2021, 21,
8087. [CrossRef] [PubMed]
148. Mohtashami, S.; Pudjianto, D.; Strbac, G. Strategic Distribution Network Planning With Smart Grid Technologies. IEEE Trans.
Smart Grid 2017, 8, 2656–2664. [CrossRef]
149. Sachdeva, P. The Role of Advanced Distribution Automation in Smart Grid. Int. J. Eng. Res. 2020, 9. [CrossRef]
150. Nasrallah, M.; Ismeil, M.A. Smart Grid - Reliability, Security, Self-Healing Standpoint, and State of the Art. Svu-Int. J. Eng. Sci.
Appl. 2022, 3, 87–92. [CrossRef]
151. Sarathkumar, D.; Srinivasan, M.; Stonier, A.A.; Samikannu, R.; Dasari, N.R.; Raj, R.A. A Technical Review on Self-Healing Control
Strategy for Smart Grid Power Systems. IOP Conf. Ser. Mater. Sci. Eng. 2021, 1055, 012153. [CrossRef]
152. Halle, P.D.; S., S. SRAMI: Secure and Reliable Advanced Metering Infrastructure Protocol for Smart Grid 2021. Available online:
https://assets.researchsquare.com/files/rs-791353/v1_covered.pdf?c=1632234486 (accessed on 3 September 2023).
153. Ghosal, A.; Conti, M. Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey. IEEE Commun.
Surv. Tutorials 2018, 21, 2831–2848. [CrossRef]
154. Bouramdane, A.A. How to Manage Vulnerabilities in the Renewable Energy Environment? Leadvent Group, Renewable Energy Cyber
Security Forum: Berlin, Germany, 2023. [CrossRef]
155. Lázaro, J.; Astarloa, A.; Rodríguez, M.; Bidarte, U.; Jiménez, J. A Survey on Vulnerabilities and Countermeasures in the
Communications of the Smart Grid. Electronics 2021, 10, 1881. [CrossRef]
156. Gajanan, L.S.; Kirar, M.K.; Raju, M. Cyber-Attacks on Smart Grid System: A Review. In Proceedings of the 2022 IEEE 10th Power
India International Conference (PIICON), New Delhi, India, 25–27 November 2022; pp. 1–6.
J. Cybersecur. Priv. 2023, 3 703
157. Roy, S. Denial of Service Attack on Protocols for Smart Grid Communications. In Research Anthology on Combating Denial-of-Service
Attacks; IGI Global: Hershey, PA, USA, 2021.
158. Said, D. Quantum Computing and Machine Learning for Cybersecurity: Distributed Denial of Service (DDoS) Attack Detection
on Smart Micro-Grid. Energies 2023, 16, 3572. [CrossRef]
159. Monday, H.N.; Li, J.P.; Nneji, G.U.; Yutra, A.Z.; Lemessa, B.D.; Nahar, S.; James, E.C.; ul Haq, A. The Capability of Wavelet
Convolutional Neural Network for Detecting Cyber Attack of Distributed Denial of Service in Smart Grid. In Proceedings of the
2021 18th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP),
Chengdu, China, 17–19 December 2021; pp. 413–418.
160. Eder-Neuhauser, P.; Zseby, T.; Fabini, J. Malware Propagation in Smart Grid Networks: Metrics, Simulation and Comparison of
Three Malware Types. J. Comput. Virol. Hacking Tech. 2018, 15, 109–125. [CrossRef]
161. Akhtar, T.; Gupta, B.B.; Yamaguchi, S. Malware Propagation Effects on SCADA System and Smart Power Grid. In Proceedings of
the 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 12–14 January 2018; pp. 1–6.
162. Li, P.; an Yu, S.; Xiao, L. Smart Grid Worm Detection Based on Deep Reinforcement Learning. In Proceedings of the 2022
IEEE/CIC International Conference on Communications in China (ICCC), Foshan, China, 11–13 August 2022; pp. 684–689.
163. AlMajali, A.; Dweik, W. Analysing and Modelling Worm Propagation Speed in the Smart Grid Communication Infrastructure.
Int. J. Embed. Syst. 2019, 11, 11–21. [CrossRef]
164. Jenkins, A.M. Device-Centric Ransomware Detection using Machine Learning-Based Memory Forensics for Smart Inverters 2022.
Available online: https://www.acsac.org/2022/workshops/icss/2022-icss-jenkins.pdf (accessed on 3 September 2023).
165. Alvee, S.R.B.; Ahn, B.; Kim, T.; Su, Y.; Youn, Y.W.; Ryu, M.H. Ransomware Attack Modeling and Artificial Intelligence-Based
Ransomware Detection for Digital Substations. In Proceedings of the 2021 6th IEEE Workshop on the Electronic Grid (eGRID),
New Orleans, LA, USA, 8–10 November 2021 ; pp. 1–5.
166. SonicWall Cyber Threat Report: Charting Cybercrime’s Shifting Frontlines. 2023. Available online: https://www.sonicwall.com/
2023-cyber-threat-report/ (accessed on 3 September 2023).
167. Cybercrime Magazine, Global Ransomware Damage Costs Predicted to Reach 20 Billion (USD) by 2021. Available online:
https://cybersecurityventures.com/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021/ (accessed on
3 September 2023).
168. Lamble, B. Of Nesting Dolls and Trojan Horses: A Survey of Legal and Policy Issues Attendant to Vehicle-to-Grid Battery Electric
Vehicles. Chicago-Kent 2011, 86, 193.
169. Ozen, A. Malware in Smart Grid. Ph.D. Thesis, Iowa State University, Ames, IA, USA, 2017.
170. Pepin, L.; Wang, L.; Wang, J.; Han, S.; Pishawikar, P.; Herzberg, A.; Zhang, P.; Miao, F. Botnets Breaking Transformers: Localization
of Power Botnet Attacks Against the Distribution Grid. arXiv 2022, arXiv:2203.10158.
171. Yang, H.; Cheng, L.; Chuah, M.C. Detecting Peer-to-Peer Botnets in SCADA Systems. In Proceedings of the 2016 IEEE Globecom
Workshops (GC Wkshps), Washington, DC, USA, 4–8 December 2016; pp. 1–6.
172. AV-TEST Award 2022: Tested and Award-Winning Security. Available online: https://www.av-test.org/en/news/av-test-awar
d-2022-tested-and-award-winning-security/ (accessed on 3 September 2023).
173. Holm, H.; Flores, W.R.; Ericsson, G. Cyber Security for a Smart Grid—What About Phishing? In Proceedings of the IEEE PES
ISGT Europe 2013, Lyngby, Denmark, 6–9 October 2013; pp. 1–5.
174. The 2021 Verizon Data Breach Investigations Report. Available online: https://www.verizon.com/about/news/verizon-2021-da
ta-breach-investigations-report (accessed on 3 September 2023).
175. Stanojevic, M.; Capko, D.; Lendák, I.; Stoja, S.; Jelacic, B. Fighting Insider Threats, with Zero-Trust in Microservice-based, Smart
Grid OT Systems. In Acta Polytechnica Hungarica; Óbuda University: Budapest, Hungary, 2023.
176. Li, B.; Lu, R.; Xiao, G.; Bao, H.; Ghorbani, A.A. Towards Insider Threats Detection in Smart Grid Communication Systems. IET
Commun. 2019, 13, 1728–1736. [CrossRef]
177. Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). Available online: https://www.industrialcybersecurit
ypulse.com/iiot-cloud/key-takeaways-from-2020-ics-cert-vulnerabilities/ (accessed on 3 September 2023).
178. Wlazlo, P.; Sahu, A.; Mao, Z.; Huang, H.; Goulart, A.E.P.; Davis, K.R.; Zonouz, S. Man-in-The-Middle Attacks and Defense in a
Power System Cyber-Physical Testbed. IET Cyper-Phys. Syst. Theory Appl. 2021, 6, 164–177. [CrossRef]
179. Tharzeen, A.; Natarajan, B.; Srinivasan, B. Phasor Data Correction and Transmission System State Estimation Under Man-in-the-
Middle Attack. In Proceedings of the 2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT),
Washington, DC, USA, 16–19 January 2023; pp. 1–5.
180. Akuffo-Badoo, E.B. Understanding Advanced Persistent Threats. Adv. Multidiscip. Sci. Res. J. Publ. 2022. Available online:
https://api.semanticscholar.org/CorpusID:251140813 (accessed on3 September 2023). [CrossRef]
181. Stylianou, L.; Hadjidemetriou, L.; Asprou, M.; Zacharia, L.; Michael, M.K. A Behavioral Model to Detect Data Manipulation
Attacks of Synchrophasor Measurements. In Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies Europe (ISGT
Europe), Espoo, Finland, 18–21 October 2021 ; pp. 1–6.
182. Duman, O.; Wang, L.; Au, M.; Kassouf, M.; Debbabi, M. Hardening Substations Against Supply Chain Attacks Under Operational
Constraints. In Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT),
New Orleans, LA, USA, 24–28 April 2022; pp. 1–5.
J. Cybersecur. Priv. 2023, 3 704
183. Zhang, H.; Liu, B.; Wu, H. Smart Grid Cyber-Physical Attack and Defense: A Review. IEEE Access 2021, 9, 29641–29659.
[CrossRef]
184. Wadhawan, Y.; AlMajali, A.; Neuman, C. A Comprehensive Analysis of Smart Grid Systems against Cyber-Physical Attacks.
Electronics 2018, 7, 249. [CrossRef]
185. Gowtham, M.; Pramod, H.B. Semantic Query-Featured Ensemble Learning Model for SQL-Injection Attack Detection in
IoT-Ecosystems. IEEE Trans. Reliab. 2022, 71, 1057–1074.
186. Stellios, I.; Kotzanikolaou, P.; Psarakis, M. Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things.
In Security and Privacy Trends in the Industrial Internet of Thing; Springer: Cham, Switzerland, 2019.
187. Fursov, I.; Yamkovyi, K.; Shmatko, O. Smart Grid and Wind Generators: An Overview of Cyber Threats and Vulnerabilities of
Power Supply Networks. Radioelectron. Comput. Syst. 2022, 4, 50–63. [CrossRef]
188. Gumrukcu, E.; Arsalan, A.; Muriithi, G.M.; Joglekar, C.; Aboulebdeh, A.; Zehir, M.A.; Papari, B.; Monti, A. Impact of Cyber-
Attacks on EV Charging Coordination: The Case of Single Point of Failure. In Proceedings of the 2022 4th Global Power, Energy
and Communication Conference (GPECOM), Cappadocia, Turkey, 14–17 June 2022; pp. 506–511.
189. Drayer, E.; Routtenberg, T. Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement). In Proceedings
of the International Conference on Cyber Security Cryptography and Machine Learning, Be’er Sheva, Israel, 27–28 June 2019.
190. Salehpour, A.; Al-Anbagi, I.S.; Yow, K.C.; Cheng, X. Modeling Cascading Failures in Coupled Smart Grid Networks. IEEE Access
2022, 10, 81054–81070. [CrossRef]
191. Novikov, O.; Vedmedenko, G.; Stopochkina, I.; Ilin, M. Cyber Attacks Cascading Effects Simulation for Ukraine Power Grid. In
Proceedings of the International Conference on Intelligent Tutoring Systems, Virtual Event, 7–11 June 2021.
192. 2015 Ukraine Power Grid Hack. Available online: https://en.wikipedia.org/wiki/2015_Ukraine_power_grid_hack (accessed on
3 September 2023).
193. DRAGOS 2017, Crashoverride: Analyzing the Malware that Attacks Power Grids. Available online: https://www.wired.com/st
ory/crash-override-malware/ (accessed on 3 September 2023).
194. Industrial Cybersecurity Pulse 2021, Throwback Attack: BlackEnergy Attacks the Ukrainien Power Grid. Available on-
line: https://www.industrialcybersecuritypulse.com/threats-vulnerabilities/throwback-attack-blackenergy-attacks-the-ukra
inian-power-grid/ (accessed on 3 September 2023).
195. Cyberattaque NotPetya. Available online: https://fr.wikipedia.org/wiki/Cyberattaque_NotPetya (accessed on 3 Septem-
ber 2023).
196. Berserk Bear. Available online: https://en.wikipedia.org/wiki/Berserk_Bear (accessed on 3 September 2023).
197. INSIDER 2016, Hackers are Hitting Israel’s Energy Sector with a ‘Severe Cyber Attack. Available online: https://www.business
insider.com/israel-electric-cyberattack-2016-1 (accessed on 3 September 2023).
198. Semertzis, I.; Rajkumar, V.S.; Stefanov, A.; Fransen, F.; Palensky, P. Quantitative Risk Assessment of Cyber Attacks on Cyber-
Physical Systems using Attack Graphs. In Proceedings of the 2022 10th Workshop on Modelling and Simulation of Cyber-Physical
Energy Systems (MSCPES), Milan, Italy, 3 May 2022; pp. 1–6.
199. Chai, K.Y.; Zolkipli, M.F.B. Review on Confidentiality, Integrity and Availability in Information Security. J. Ict Educ. 2021, 8,
34–42. [CrossRef]
200. Edwards, N.; Kiser, S.B.; Haynes, J.B. Answering the Cybersecurity Issues: Confidentiality, Integrity, and Availability. J. Strateg.
Innov. Sustain. 2020, 15, 10–14.
201. Ding, J.; Qammar, A.; Zhang, Z.; Karim, A.; Ning, H. Cyber Threats to Smart Grids: Review, Taxonomy, Potential Solutions, and
Future Directions. Energies 2022, 15, 6799. [CrossRef]
202. Gusrialdi, A.; Qu, Z. Smart Grid Security: Attacks and Defenses. In Smart Grid Control; Springer: Cham, Switzerland, 2018.
203. Smit, T.; van Haastrecht, M.; Spruit, M.R. The Effect of Countermeasure Readability on Security Intentions. J. Cybersecur. Priv.
2021, 1, 675–703. [CrossRef]
204. FORTINET, Fortinet Security Fabric Enables Digital Innovation: Broad, Integrated, and Automated. Available online: https:
//www.fortinet.com/content/dam/fortinet/assets/white-papers/wp-security-fabric.pdf (accessed on 3 September 2023).
205. NIST, Cybersecurity for Smart Grid Systems. Available online: https://www.nist.gov/programs-projects/cybersecurity-smart-g
rid-systems (accessed on 3 September 2023).
206. Faquir, D.; Chouliaras, N.; Sofia, V.; Olga, K.; Maglaras, L. Cybersecurity in Smart Grids, Challenges and Solutions. Aims
Electron. Electr. Eng. 2021, 5, 24–37.
207. Bleier, M.T.; Langer, D.L.; Skopik, F. Smart Grid Cybersecurity Standards: Today and Tomorrow; Computer Science, Engineering; 2013.
Available online: https://api.semanticscholar.org/CorpusID:31361949 (accessed on 3 September 2023).
208. Nvidia. What’s the Difference Between Artificial Intelligence, Machine Learning and Deep Learning? 2016. Available
online: https://blogs.nvidia.com/blog/2016/07/29/whats-difference-artificial-intelligence-machine-learning-deep-learning-ai/
(accessed on 3 September 2023).
209. Srihith, I.V.D.; Kumar, I.V.S.; Varaprasad, R.; Mohan, Y.R.; Srinivas, T.A.S.; Sravanthi, Y. Future of Smart Cities: The Role of
Machine Learning and Artificial Intelligence. South Asian Res. J. Eng. Technol. 2022, 4, 110–119. [CrossRef]
J. Cybersecur. Priv. 2023, 3 705
210. Pullum, L.L.; Jindal, A.; Roopaei, M.; Diggewadi, A.; Andoni, M.; Zobaa, A.F.; Alam, A.; Bani-Ahmed, A.; Ngo, Y.; Vyas, S.;
et al. Big Data Analytics in the Smart Grid: Big Data Analytics, Machine Learning and Artificial Intelligence in the Smart Grid:
Introduction, Benefits, Challenges and Issues. 2017. Available online: https://api.semanticscholar.org/CorpusID:66344530
(accessed on 3 September 2023).
211. Szczepaniuk, H.; Szczepaniuk, E.K. Applications of Artificial Intelligence Algorithms in the Energy Sector. Energies 2022, 16, 347.
[CrossRef]
212. Khazaii, J. Analytical Hierarchy Process (AHP); In Advanced Decision Making for HVAC Engineers; Springer: Cham, Switzerland,
2016. [CrossRef]
213. Bouramdane, A.A. Hydrogène, Captage et Stockage du CO2 et Sobriété Énergétique : Tour d’Horizon. Énergie/Mines Carrières, 27
March 2023. Available online: https://zenodo.org/record/7774592 (accessed on 3 September 2023).
214. Bouramdane, A.A. Mix Électrique Marocain : Défis Face à l’Urgence Climatique. Énergie/Mines Carrières, 26 December 2022.
Available online: https://zenodo.org/record/7594427 (accessed on 3 September 2023).
215. Bouramdane, A.A. PV, CSP et Éolien au Maroc: Intégration à Géométrie Variable. Énergie/Mines Carrières, 15 July 2022. Available
online: https://zenodo.org/record/7594221 (accessed on 3 September 2023).
216. Bouramdane, A.A. Production d’hydrogène vert au Maroc: Quelle technologie est la plus adaptée à différents niveaux de
pénétration renouvelable? Énergie/Mines Carrières, 5 July 2023. Available online:https://zenodo.org/record/8144588 (accessed
on 3 September 2023).
217. Bouramdane, A.A. Pourquoi l’Atténuation et l’Adaptation aux Changements Climatiques sont Complémentaires? Énergie/Mines
Carrières, 10 November 2022. Available online: https://zenodo.org/record/7594404 (accessed on 3 September 2023).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.