{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T06:42:40Z","timestamp":1772779360650,"version":"3.50.1"},"reference-count":277,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T00:00:00Z","timestamp":1725148800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1016\/j.engappai.2024.108785","type":"journal-article","created":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T16:55:27Z","timestamp":1718816127000},"page":"108785","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":28,"special_numbering":"C","title":["Resiliency of forecasting methods in different application areas of smart grids: A review and future prospects"],"prefix":"10.1016","volume":"135","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0864-4882","authenticated-orcid":false,"given":"M.A.","family":"Rahman","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8415-0206","authenticated-orcid":false,"given":"Md. Rashidul","family":"Islam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9382-3935","authenticated-orcid":false,"given":"Md. Alamgir","family":"Hossain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7220-3067","authenticated-orcid":false,"given":"M.S.","family":"Rana","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7602-3581","authenticated-orcid":false,"given":"M.J.","family":"Hossain","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3521-5007","authenticated-orcid":false,"given":"Evan MacA.","family":"Gray","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2024.108785_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2021.103523","article-title":"Accuracy improvement of electrical load forecasting against new cyber-attack architectures","volume":"77","author":"Aflaki","year":"2022","journal-title":"Sustainable Cities Soc."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b2","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1109\/TSTE.2017.2747765","article-title":"Short-term spatio-temporal forecasting of photovoltaic power production","volume":"9","author":"Agoua","year":"2018","journal-title":"IEEE Trans. Sustain. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2021.102783","article-title":"Using the internet of things in smart energy systems and networks","volume":"68","author":"Ahmad","year":"2021","journal-title":"Sustainable Cities Soc."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b4","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1109\/TPWRD.2021.3056055","article-title":"Ensemble learning-based dynamic line rating forecasting under cyberattacks","volume":"37","author":"Ahmadi","year":"2022","journal-title":"IEEE Trans. Power Deliv."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b5","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TII.2022.3151748","article-title":"A new false data injection attack detection model for cyberattack resilient energy forecasting","volume":"19","author":"Ahmadi","year":"2023","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.engappai.2024.108785_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.rser.2020.109792","article-title":"A review and evaluation of the state-of-the-art in pv solar power forecasting: Techniques and optimization","volume":"124","author":"Ahmed","year":"2020","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"7","key":"10.1016\/j.engappai.2024.108785_b7","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1049\/iet-rpg.2018.5649","article-title":"Review on forecasting of photovoltaic power generation based on machine learning and metaheuristic techniques","volume":"13","author":"Akhter","year":"2019","journal-title":"IET Renew. Power Gener."},{"key":"10.1016\/j.engappai.2024.108785_b8","series-title":"Predicting cyber-attack using cyber situational awareness: The case of independent power producers (ipps)","author":"Akwetey","year":"2022"},{"key":"10.1016\/j.engappai.2024.108785_b9","doi-asserted-by":"crossref","first-page":"83965","DOI":"10.1109\/ACCESS.2020.2992249","article-title":"An ensemble deep learning-based cyber-attack detection in industrial control system","volume":"8","author":"Al-Abassi","year":"2020","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b10","doi-asserted-by":"crossref","first-page":"1562","DOI":"10.1109\/TSG.2015.2487514","article-title":"Effective utilization of available pev battery capacity for mitigation of solar pv impact and grid support with integrated v2 g functionality","volume":"7","author":"Alam","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2024.108785_b11","doi-asserted-by":"crossref","DOI":"10.1155\/2013\/197690","article-title":"Neural model with particle swarm optimization kalman learning for forecasting in smart grids","volume":"2013","author":"Alanis","year":"2013","journal-title":"Math. Probl. Eng."},{"issue":"6","key":"10.1016\/j.engappai.2024.108785_b12","doi-asserted-by":"crossref","first-page":"1598","DOI":"10.1049\/iet-gtd.2016.1649","article-title":"Forecast ratio and security analysis of rating forecasting methods in an overhead line","volume":"11","author":"Albizu","year":"2017","journal-title":"IET Gener. Transm. Distrib."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b13","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/00207720110067421","article-title":"Electric load forecasting: Literature survey and classification of methods","volume":"33","author":"Alfares","year":"2002","journal-title":"Int. J. Syst. Sci."},{"key":"10.1016\/j.engappai.2024.108785_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.egyai.2021.100060","article-title":"A review and taxonomy of wind and solar energy forecasting methods based on deep learning","volume":"4","author":"Alkhayat","year":"2021","journal-title":"Energy AI"},{"key":"10.1016\/j.engappai.2024.108785_b15","series-title":"2017 IEEE International Conference on Fuzzy Systems","first-page":"1","article-title":"Electricity price forecasting using asymmetric fuzzy neural network systems","author":"Alshejari","year":"2017"},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b16","doi-asserted-by":"crossref","first-page":"26","DOI":"10.3390\/forecast1010003","article-title":"A multi-stage price forecasting model for day-ahead electricity markets","volume":"1","author":"Angamuthu Chinnathambi","year":"2019","journal-title":"Forecasting"},{"key":"10.1016\/j.engappai.2024.108785_b17","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.solener.2016.06.069","article-title":"Review of photovoltaic power forecasting","volume":"136","author":"Antonanzas","year":"2016","journal-title":"Sol. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b18","doi-asserted-by":"crossref","first-page":"1266","DOI":"10.1016\/j.solener.2015.10.023","article-title":"Very short-term irradiance forecasting at unobserved locations using spatio-temporal kriging","volume":"122","author":"Aryaputera","year":"2015","journal-title":"Sol. Energy"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b19","first-page":"1636","article-title":"Online detection of stealthy false data injection attacks in power system state estimation","volume":"9","author":"Ashok","year":"2018","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2024.108785_b20","doi-asserted-by":"crossref","DOI":"10.1016\/j.rser.2021.110992","article-title":"A survey on deep learning methods for power load and renewable energy forecasting in smart microgrids","volume":"144","author":"Aslam","year":"2021","journal-title":"Renew. Sustain. Energy Rev."},{"key":"10.1016\/j.engappai.2024.108785_b21","series-title":"2017 12th IEEE Conference on Industrial Electronics and Applications","first-page":"1421","article-title":"Short-term prediction of distribution network faults based on support vector machine","author":"Bai","year":"2017"},{"key":"10.1016\/j.engappai.2024.108785_b22","series-title":"Real time pricing as a default or optional service for c & icustomers: A comparative analysis of eight case studies","author":"Barbose","year":"2005"},{"key":"10.1016\/j.engappai.2024.108785_b23","doi-asserted-by":"crossref","first-page":"167653","DOI":"10.1109\/ACCESS.2019.2953499","article-title":"A survey on digital twin: Definitions, characteristics, applications, and design implications","volume":"7","author":"Barricelli","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2024.108785_b24","series-title":"2019 IEEE Canadian Conference of Electrical and Computer Engineering","first-page":"1","article-title":"Day-ahead dynamic thermal line rating using numerical weather prediction","author":"Barton","year":"2019"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b25","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1109\/28.585852","article-title":"Practical high-impedance fault detection on distribution feeders","volume":"33","author":"Benner","year":"1997","journal-title":"IEEE Trans. Ind. Appl."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b26","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/TII.2014.2365703","article-title":"Spatial\u2013temporal solar power forecasting for smart grids","volume":"11","author":"Bessa","year":"2015","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.engappai.2024.108785_b27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ref.2020.10.001","article-title":"A comprehensive analysis of vehicle to grid (v2 g) systems and scholarly literature on the application of such systems","volume":"36","author":"Bibak","year":"2021","journal-title":"Renew. Energy Focus"},{"key":"10.1016\/j.engappai.2024.108785_b28","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1049\/iet-epa.2011.0232","article-title":"Transformer winding faults classification based on transfer function analysis by support vector machine","volume":"6","author":"Bigdeli","year":"2012","journal-title":"IET Electr. Power Appl."},{"key":"10.1016\/j.engappai.2024.108785_b29","doi-asserted-by":"crossref","first-page":"36833","DOI":"10.1109\/ACCESS.2019.2904432","article-title":"A hybrid regression model for day-ahead energy price forecasting","volume":"7","author":"Bissing","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2024.108785_b30","series-title":"Renewable Energy Forecasting","first-page":"179","article-title":"6 - short-term solar power forecasting based on satellite images","author":"Blanc","year":"2017"},{"key":"10.1016\/j.engappai.2024.108785_b31","series-title":"System Control Centers and Telecommunications","first-page":"187","author":"Blume","year":"2017"},{"key":"10.1016\/j.engappai.2024.108785_b32","series-title":"Smart Grids: Security and Privacy Issues","first-page":"53","article-title":"Bad data detection","author":"Boroojeni","year":"2017"},{"issue":"6","key":"10.1016\/j.engappai.2024.108785_b33","doi-asserted-by":"crossref","DOI":"10.3390\/rs14061335","article-title":"Digital twin technology challenges and applications: A comprehensive review","volume":"14","author":"Bot\u00edn-Sanabria","year":"2022","journal-title":"Remote Sens."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b34","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1002\/we.107","article-title":"Probabilistic wind power forecasts using local quantile regression","volume":"7","author":"Bremnes","year":"2004","journal-title":"Wind Energy"},{"issue":"8","key":"10.1016\/j.engappai.2024.108785_b35","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1109\/5.940290","article-title":"Renewable energy today and tomorrow","volume":"89","author":"Bull","year":"2001","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.engappai.2024.108785_b36","doi-asserted-by":"crossref","first-page":"132330","DOI":"10.1109\/ACCESS.2020.3010274","article-title":"Anomalous example detection in deep learning: A survey","volume":"8","author":"Bulusu","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2024.108785_b37","series-title":"Curriculum adversarial training","author":"Cai","year":"2018"},{"key":"10.1016\/j.engappai.2024.108785_b38","series-title":"Machine learning vs statistical methods for time series forecasting: Size matters","author":"Cerqueira","year":"2019"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b39","doi-asserted-by":"crossref","first-page":"210","DOI":"10.3390\/e21020210","article-title":"An overview on denial-of-service attacks in control systems: Attack models and security analyses","volume":"21","author":"Cetinkaya","year":"2019","journal-title":"Entropy"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b40","doi-asserted-by":"crossref","first-page":"982","DOI":"10.1109\/TPWRS.2010.2080325","article-title":"Electric load forecasting based on statistical robust methods","volume":"26","author":"Chakhchoukh","year":"2011","journal-title":"IEEE Trans. Power Syst."},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b41","doi-asserted-by":"crossref","DOI":"10.1145\/1541880.1541882","article-title":"Anomaly detection: A survey","volume":"41","author":"Chandola","year":"2009","journal-title":"ACM Comput. Surv."},{"issue":"6","key":"10.1016\/j.engappai.2024.108785_b42","doi-asserted-by":"crossref","first-page":"2875","DOI":"10.1109\/TPWRS.2014.2308537","article-title":"Spatial load forecasting with communication failure using time-forward kriging","volume":"29","author":"Chaojun","year":"2014","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2024.108785_b43","series-title":"2013 North American Power Symposium","first-page":"1","article-title":"Impact analysis of transient stability due to cyber attack on facts devices","author":"Chen","year":"2013"},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b44","doi-asserted-by":"crossref","first-page":"1821","DOI":"10.1109\/TPWRS.2004.835679","article-title":"Load forecasting using support vector machines: a study on eunite competition 2001","volume":"19","author":"Chen","year":"2004","journal-title":"IEEE Trans. Power Syst."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b45","doi-asserted-by":"crossref","first-page":"2158","DOI":"10.1109\/TSG.2018.2790704","article-title":"Evaluation of reinforcement learning-based false data injection attack to automatic voltage control","volume":"10","author":"Chen","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b46","doi-asserted-by":"crossref","first-page":"1634","DOI":"10.1109\/TPWRS.2014.2298463","article-title":"Improving the accuracy of bus load forecasting by a two-stage bad data identification method","volume":"29","author":"Chen","year":"2014","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2024.108785_b47","series-title":"2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids","first-page":"1","article-title":"Is machine learning in power systems vulnerable?","author":"Chen","year":"2018"},{"key":"10.1016\/j.engappai.2024.108785_b48","series-title":"Proceedings of the Tenth ACM International Conference on Future Energy Systems","first-page":"1","article-title":"Exploiting vulnerabilities of load forecasting through adversarial attacks","author":"Chen","year":"2019"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b49","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/0378-7796(95)00977-1","article-title":"Analysis of an adaptive time-series autoregressive moving-average (arma) model for short-term load forecasting","volume":"34","author":"Chen","year":"1995","journal-title":"Electr. Power Syst. Res."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b50","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/TPAS.1971.293123","article-title":"Short-term load forecasting using general exponential smoothing","volume":"PAS-90","author":"Christiaanse","year":"1971","journal-title":"IEEE Trans. Power Appar. Syst."},{"key":"10.1016\/j.engappai.2024.108785_b51","series-title":"Guide for selection of weather parameters for bare overhead conductor ratings","author":"CIGRE","year":"2006"},{"issue":"6","key":"10.1016\/j.engappai.2024.108785_b52","doi-asserted-by":"crossref","first-page":"1725","DOI":"10.1016\/j.rser.2007.01.015","article-title":"A review on the young history of the wind power short-term prediction","volume":"12","author":"Costa","year":"2008","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"5","key":"10.1016\/j.engappai.2024.108785_b53","doi-asserted-by":"crossref","first-page":"5724","DOI":"10.1109\/TSG.2018.2890809","article-title":"Machine learning-based anomaly detection for load forecasting under cyberattacks","volume":"10","author":"Cui","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2024.108785_b54","doi-asserted-by":"crossref","first-page":"912","DOI":"10.1016\/j.rser.2017.08.017","article-title":"Forecasting of photovoltaic power generation and model optimization: A review","volume":"81","author":"Das","year":"2018","journal-title":"Renew. Sustain. Energy Rev."},{"key":"10.1016\/j.engappai.2024.108785_b55","doi-asserted-by":"crossref","DOI":"10.1016\/j.measurement.2021.109947","article-title":"A survey of fault prediction and location methods in electrical energy distribution networks","volume":"184","author":"Dashti","year":"2021","journal-title":"Measurement"},{"key":"10.1016\/j.engappai.2024.108785_b56","series-title":"2017 14th International Conference on the European Energy Market","first-page":"1","article-title":"Short-term forecasting of electricity prices with a computationally efficient hybrid approach","author":"de Marcos","year":"2017"},{"key":"10.1016\/j.engappai.2024.108785_b57","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.neucom.2015.12.114","article-title":"Mean absolute percentage error for regression models","volume":"192","author":"De Myttenaere","year":"2016","journal-title":"Neurocomputing"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b58","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/MIE.2019.2952165","article-title":"Toward intelligent industrial informatics: A review of current developments and future directions of artificial intelligence in industrial applications","volume":"14","author":"De Silva","year":"2020","journal-title":"IEEE Ind. Electron. Mag."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b59","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TII.2016.2614396","article-title":"False data injection on state estimation in power systems\u2014attacks, impacts, and defense: A survey","volume":"13","author":"Deng","year":"2017","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b60","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1016\/j.bdr.2015.03.003","article-title":"Big data analytics for dynamic energy management in smart grids","volume":"2","author":"Diamantoulakis","year":"2015","journal-title":"Big Data Res."},{"key":"10.1016\/j.engappai.2024.108785_b61","series-title":"2018 5th International Conference on Information Science and Control Engineering","first-page":"1123","article-title":"Fault risk prevention model of distribution network based on hidden markov","author":"Diao","year":"2018"},{"key":"10.1016\/j.engappai.2024.108785_b62","doi-asserted-by":"crossref","first-page":"2589","DOI":"10.1016\/j.renene.2019.08.092","article-title":"A survey on smart grid technologies and applications","volume":"146","author":"Dileep","year":"2020","journal-title":"Renew. Energy"},{"issue":"18","key":"10.1016\/j.engappai.2024.108785_b63","doi-asserted-by":"crossref","DOI":"10.3390\/en15186799","article-title":"Cyber threats to smart grids: Review, taxonomy, potential solutions, and future directions","volume":"15","author":"Ding","year":"2022","journal-title":"Energies"},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b64","first-page":"1683","article-title":"Predicting equipment outages due to voltage sags","volume":"31","author":"dos Santos","year":"2016","journal-title":"IEEE Trans. Power Deliv."},{"key":"10.1016\/j.engappai.2024.108785_b65","doi-asserted-by":"crossref","first-page":"565","DOI":"10.1016\/j.ijepes.2019.03.043","article-title":"Overhead lines dynamic line rating based on probabilistic day-ahead forecasting and risk assessment","volume":"110","author":"Dupin","year":"2019","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.engappai.2024.108785_b66","series-title":"2018 IEEE Texas Power and Energy Conference","first-page":"1","article-title":"Deep neural networks for short-term load forecasting in ercot system","author":"Easley","year":"2018"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b67","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1109\/TPWRD.2010.2046654","article-title":"Cyber security and power system communication\u2014essential parts of a smart grid infrastructure","volume":"25","author":"Ericsson","year":"2010","journal-title":"IEEE Trans. Power Deliv."},{"issue":"5","key":"10.1016\/j.engappai.2024.108785_b68","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/MNET.2011.6033036","article-title":"An early warning system against malicious activities for smart grid communications","volume":"25","author":"Fadlullah","year":"2011","journal-title":"IEEE Netw."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b69","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1109\/MCOM.2011.5741147","article-title":"Toward intelligent machine-to-machine communications in smart grid","volume":"49","author":"Fadlullah","year":"2011","journal-title":"IEEE Commun. Mag."},{"issue":"6","key":"10.1016\/j.engappai.2024.108785_b70","first-page":"29","article-title":"W32. stuxnet dossier, white paper, symantec corp.","volume":"5","author":"Falliere","year":"2011","journal-title":"Secur. Resp."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b71","doi-asserted-by":"crossref","first-page":"944","DOI":"10.1109\/SURV.2011.101911.00087","article-title":"Smart grid\u2014the new and improved power grid: A survey","volume":"14","author":"Fang","year":"2012","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.engappai.2024.108785_b72","first-page":"1","article-title":"A deep learning framework for predicting cyber attacks rates","volume":"2019","author":"Fang","year":"2019","journal-title":"EURASIP J. Inf. Secur."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b73","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MPE.2009.934876","article-title":"The path of the smart grid","volume":"8","author":"Farhangi","year":"2010","journal-title":"IEEE Power Energy Mag."},{"issue":"8","key":"10.1016\/j.engappai.2024.108785_b74","doi-asserted-by":"crossref","DOI":"10.3390\/s20082425","article-title":"Predictive maintenance for pump systems and thermal power plants: State-of-the-art review, trends and challenges","volume":"20","author":"Fausing Olesen","year":"2020","journal-title":"Sensors"},{"key":"10.1016\/j.engappai.2024.108785_b75","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.rser.2015.07.149","article-title":"Review of dynamic line rating systems for wind power integration","volume":"53","author":"Fernandez","year":"2016","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b76","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.renene.2011.05.033","article-title":"Current methods and advances in forecasting of wind power generation","volume":"37","author":"Foley","year":"2012","journal-title":"Renew. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b77","series-title":"Nhs Cyber-Attack: Gps and Hospitals Hit by Ransomware","author":"Foxx","year":"2017"},{"key":"10.1016\/j.engappai.2024.108785_b78","series-title":"2024 1st International Conference on Robotics, Engineering, Science, and Technology","first-page":"33","article-title":"Nan attacks: Bit-flipping deep neural network parameters to nan or infinity","author":"Fuengfusin","year":"2024"},{"issue":"10","key":"10.1016\/j.engappai.2024.108785_b79","doi-asserted-by":"crossref","first-page":"1305","DOI":"10.1016\/j.epsr.2006.09.023","article-title":"Analytical prediction of abnormal temporary overvoltages due to ground faults in mv networks","volume":"77","author":"Gatta","year":"2007","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.engappai.2024.108785_b80","series-title":"The Smart Grid: Enabling Energy Efficiency and Demand Response","author":"Gellings","year":"2020"},{"issue":"6","key":"10.1016\/j.engappai.2024.108785_b81","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1109\/JPROC.2011.2124210","article-title":"Smart grid: The electric energy system of the future [scanning the issue]","volume":"99","author":"Gharavi","year":"2011","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.engappai.2024.108785_b82","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2021.100470","article-title":"Federated learning with hyperparameter-based clustering for electrical load forecasting","volume":"17","author":"Gholizadeh","year":"2022","journal-title":"Internet Things"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b83","doi-asserted-by":"crossref","first-page":"1244","DOI":"10.1109\/TSG.2013.2245155","article-title":"Smart grid data integrity attacks","volume":"4","author":"Giani","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2024.108785_b84","doi-asserted-by":"crossref","DOI":"10.1016\/j.rser.2020.110515","article-title":"An overview of performance evaluation metrics for short-term statistical wind power forecasting","volume":"138","author":"Gonz\u00e1lez-Sope\u00f1a","year":"2021","journal-title":"Renew. Sustain. Energy Rev."},{"key":"10.1016\/j.engappai.2024.108785_b85","series-title":"Explaining and harnessing adversarial examples","author":"Goodfellow","year":"2014"},{"key":"10.1016\/j.engappai.2024.108785_b86","series-title":"Forecasting","author":"Goodwin","year":"2020"},{"issue":"5","key":"10.1016\/j.engappai.2024.108785_b87","doi-asserted-by":"crossref","first-page":"2460","DOI":"10.1109\/TPWRS.2014.2305872","article-title":"Investigating the impact of real-time thermal ratings on power network reliability","volume":"29","author":"Greenwood","year":"2014","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2024.108785_b88","series-title":"Nist framework and roadmap for smart grid interoperability standards, release 3.0","author":"Greer","year":"2014"},{"issue":"12","key":"10.1016\/j.engappai.2024.108785_b89","doi-asserted-by":"crossref","first-page":"1558","DOI":"10.1109\/PROC.1987.13927","article-title":"Short-term load forecasting","volume":"75","author":"Gross","year":"1987","journal-title":"Proc. IEEE"},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b90","doi-asserted-by":"crossref","first-page":"1442","DOI":"10.1049\/oap-cired.2017.0610","article-title":"Risk prediction in distribution networks based on the relation between weather and (underground) component failure","volume":"2017","author":"Gu","year":"2017","journal-title":"CIRED Open Access Proc. J."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b91","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TPWRS.2012.2197639","article-title":"Very short-term load forecasting: Wavelet neural networks with data pre-filtering","volume":"28","author":"Guan","year":"2013","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2024.108785_b92","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2019.107094","article-title":"Cyber-security on smart grid: Threats and potential solutions","volume":"169","author":"Gunduz","year":"2020","journal-title":"Comput. Netw."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b93","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/TII.2011.2166794","article-title":"Smart grid technologies: Communication technologies and standards","volume":"7","author":"Gungor","year":"2011","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"13","key":"10.1016\/j.engappai.2024.108785_b94","doi-asserted-by":"crossref","first-page":"4466","DOI":"10.3390\/s21134466","article-title":"A data-driven long time-series electrical line trip fault prediction method using an improved stacked-informer network","volume":"21","author":"Guo","year":"2021","journal-title":"Sensors"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b95","doi-asserted-by":"crossref","first-page":"875","DOI":"10.1109\/TPWRS.2011.2167022","article-title":"Detecting x-outliers in load curve data in power systems","volume":"27","author":"Guo","year":"2012","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2024.108785_b96","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2019.101660","article-title":"A survey on cybersecurity, data privacy, and policy issues in cyber\u2013physical system deployments in smart cities","volume":"50","author":"Habibzadeh","year":"2019","journal-title":"Sustainable Cities Soc."},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b97","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.ejor.2009.01.062","article-title":"Electric load forecasting methods: Tools for decision making","volume":"199","author":"Hahn","year":"2009","journal-title":"European J. Oper. Res."},{"key":"10.1016\/j.engappai.2024.108785_b98","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijcip.2022.100523","article-title":"Estimating the frequency of cyber threats to nuclear power plants based on operating experience analysis","volume":"37","author":"Han","year":"2022","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b99","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TSTE.2016.2604679","article-title":"Variable generation power forecasting as a big data problem","volume":"8","author":"Haupt","year":"2017","journal-title":"IEEE Trans. Sustain. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b100","series-title":"Preliminary exploration on digital twin for power systems: Challenges, framework, and applications","author":"He","year":"2019"},{"key":"10.1016\/j.engappai.2024.108785_b101","series-title":"2011 IEEE Power and Energy Society General Meeting","first-page":"1","article-title":"Assessment of seasonal static thermal ratings of overhead transmission conductors","author":"Heckenbergerova","year":"2011"},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b102","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/59.910780","article-title":"Neural networks for short-term load forecasting: a review and evaluation","volume":"16","author":"Hippert","year":"2001","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2024.108785_b103","series-title":"CIRED 2019 Conference","article-title":"Incipient fault prediction in power quality monitoring","author":"Hoffmann","year":"2019"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b104","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1016\/j.ijforecast.2015.11.011","article-title":"Probabilistic electric load forecasting: A tutorial review","volume":"32","author":"Hong","year":"2016","journal-title":"Int. J. Forecast."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b105","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.ijforecast.2013.07.001","article-title":"Global energy forecasting competition 2012","volume":"30","author":"Hong","year":"2014","journal-title":"Int. J. Forecast."},{"key":"10.1016\/j.engappai.2024.108785_b106","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/OAJPE.2020.3029979","article-title":"Energy forecasting: A review and outlook","volume":"7","author":"Hong","year":"2020","journal-title":"IEEE Open Access J. Power Energy"},{"issue":"32","key":"10.1016\/j.engappai.2024.108785_b107","first-page":"43","article-title":"Energy forecasting: Past, present, and future","author":"Hong","year":"2014","journal-title":"Foresight: Int. J. Appl. Forecast."},{"issue":"8","key":"10.1016\/j.engappai.2024.108785_b108","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TASC.2021.3091116","article-title":"Predicting wind power generation using hybrid deep learning with optimization","volume":"31","author":"Hossain","year":"2021","journal-title":"IEEE Trans. Appl. Supercond."},{"key":"10.1016\/j.engappai.2024.108785_b109","doi-asserted-by":"crossref","DOI":"10.1016\/j.jclepro.2021.126564","article-title":"Very short-term forecasting of wind power generation using hybrid deep learning model","volume":"296","author":"Hossain","year":"2021","journal-title":"J. Clean. Prod."},{"key":"10.1016\/j.engappai.2024.108785_b110","doi-asserted-by":"crossref","first-page":"13960","DOI":"10.1109\/ACCESS.2019.2894819","article-title":"Application of big data and machine learning in smart grid, and associated security concerns: A review","volume":"7","author":"Hossain","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2024.108785_b111","series-title":"Fuzzy Expert Systems: An Application to Short-Term Load Forecasting","first-page":"471","author":"Hsu","year":"1992"},{"key":"10.1016\/j.engappai.2024.108785_b112","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100620","article-title":"Addressing the cybersecurity vulnerabilities of advanced nanogrids: A practical framework","volume":"20","author":"Hueros-Barrios","year":"2022","journal-title":"Internet Things"},{"key":"10.1016\/j.engappai.2024.108785_b113","doi-asserted-by":"crossref","first-page":"177447","DOI":"10.1109\/ACCESS.2020.3026923","article-title":"A survey of denial-of-service attacks and solutions in the smart grid","volume":"8","author":"Huseinovi\u0107","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2024.108785_b114","series-title":"Methods for arc-flash prediction in medium voltage and low voltage switchgear","author":"Hussain","year":"2015"},{"key":"10.1016\/j.engappai.2024.108785_b115","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijcip.2020.100406","article-title":"Vulnerabilities and countermeasures in electrical substations","volume":"33","author":"Hussain","year":"2021","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b116","doi-asserted-by":"crossref","first-page":"2615","DOI":"10.1109\/TIA.2014.2362958","article-title":"Preemptive arc fault detection techniques in switchgear\u2014part iii: From the laboratory to practical installation","volume":"51","author":"Hussain","year":"2015","journal-title":"IEEE Trans. Ind. Appl."},{"issue":"12","key":"10.1016\/j.engappai.2024.108785_b117","doi-asserted-by":"crossref","first-page":"7262","DOI":"10.1109\/JSEN.2015.2474122","article-title":"Online condition monitoring of mv switchgear using d -dot sensor to predict arc-faults","volume":"15","author":"Hussain","year":"2015","journal-title":"IEEE Sens. J."},{"key":"10.1016\/j.engappai.2024.108785_b118","series-title":"Forecasting: Principles and Practice","author":"Hyndman","year":"2018"},{"key":"10.1016\/j.engappai.2024.108785_b119","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2020.115237","article-title":"Machine learning driven smart electric power systems: Current trends and new perspectives","volume":"272","author":"Ibrahim","year":"2020","journal-title":"Appl. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b120","series-title":"ISO new England","author":"ISO-NE","year":"2023"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b121","doi-asserted-by":"crossref","first-page":"435","DOI":"10.3390\/en13020435","article-title":"A partially amended hybrid bi-gru\u2014arima model (pahm) for predicting solar irradiance in short and very-short terms","volume":"13","author":"Jaihuni","year":"2020","journal-title":"Energies"},{"key":"10.1016\/j.engappai.2024.108785_b122","doi-asserted-by":"crossref","DOI":"10.1016\/j.enconman.2021.113905","article-title":"Size estimation of wind\/solar hybrid renewable energy systems without detailed wind and irradiation data: A feasibility study","volume":"234","author":"Jamshidi","year":"2021","journal-title":"Energy Convers. Manage."},{"key":"10.1016\/j.engappai.2024.108785_b123","doi-asserted-by":"crossref","first-page":"8682","DOI":"10.1109\/ACCESS.2017.2705644","article-title":"Sensor fault classification based on support vector machine and statistical time-domain features","volume":"5","author":"Jan","year":"2017","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b124","doi-asserted-by":"crossref","first-page":"788","DOI":"10.1002\/spe.2822","article-title":"Security analytics for real-time forecasting of cyberattacks","volume":"52","author":"Javed","year":"2022","journal-title":"Softw. - Pract. Exp."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b125","doi-asserted-by":"crossref","first-page":"1393","DOI":"10.1109\/TPWRD.2019.2900543","article-title":"Dynamic fault prediction of power transformers based on hidden markov model of dissolved gases analysis","volume":"34","author":"Jiang","year":"2019","journal-title":"IEEE Trans. Power Deliv."},{"key":"10.1016\/j.engappai.2024.108785_b126","series-title":"2018 15th International Conference on Control, Automation, Robotics and Vision","first-page":"937","article-title":"A review on short-term electricity price forecasting techniques for energy markets","author":"Jiang","year":"2018"},{"key":"10.1016\/j.engappai.2024.108785_b127","series-title":"2019 IEEE Power & Energy Society General Meeting","first-page":"1","article-title":"Ensuring cyberattack-resilient load forecasting with a robust statistical method","author":"Jiao","year":"2019"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b128","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1016\/j.ijforecast.2021.06.009","article-title":"Cyberattack-resilient load forecasting with adaptive robust regression","volume":"38","author":"Jiao","year":"2022","journal-title":"Int. J. Forecast."},{"key":"10.1016\/j.engappai.2024.108785_b129","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2020.102384","article-title":"Surveys on the reliability impacts of power system cyber\u2013physical layers","volume":"62","author":"Jimada-Ojuolape","year":"2020","journal-title":"Sustainable Cities Soc."},{"key":"10.1016\/j.engappai.2024.108785_b130","series-title":"20th International Workshop on Large-Scale Integration of Wind Power Into Power Systems as Well as on Transmission Networks for Offshore Wind Power Plants","first-page":"94","article-title":"Wind power forecasting using lstm incorporating fourier transformation based denoising technique","volume":"Vol. 2021","author":"Kahraman","year":"2021"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b131","doi-asserted-by":"crossref","first-page":"1804","DOI":"10.1109\/JSYST.2018.2869825","article-title":"Multivariate spatio-temporal solar generation forecasting: A unified approach to deal with communication failure and invisible sites","volume":"13","author":"Kapourchali","year":"2019","journal-title":"IEEE Syst. J."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b132","doi-asserted-by":"crossref","DOI":"10.3390\/en15020516","article-title":"Comprehensive overview of power system flexibility during the scenario of high penetration of renewable energy in utility grid","volume":"15","author":"Kaushik","year":"2022","journal-title":"Energies"},{"issue":"5","key":"10.1016\/j.engappai.2024.108785_b133","doi-asserted-by":"crossref","first-page":"1388","DOI":"10.1016\/j.renene.2008.09.006","article-title":"Day-ahead wind speed forecasting using f-arima models","volume":"34","author":"Kavasseri","year":"2009","journal-title":"Renew. Energy"},{"issue":"8","key":"10.1016\/j.engappai.2024.108785_b134","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1016\/j.engappai.2011.12.001","article-title":"A new feature selection algorithm and composite neural network for electricity price forecasting","volume":"25","author":"Keynia","year":"2012","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.engappai.2024.108785_b135","doi-asserted-by":"crossref","first-page":"51691","DOI":"10.1109\/ACCESS.2019.2908998","article-title":"Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods","volume":"7","author":"Khalaf","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2024.108785_b136","doi-asserted-by":"crossref","DOI":"10.1016\/j.scs.2020.102275","article-title":"A survey on hyperparameters optimization algorithms of forecasting models in smart grid","volume":"61","author":"Khalid","year":"2020","journal-title":"Sustainable Cities Soc."},{"key":"10.1016\/j.engappai.2024.108785_b137","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105287","article-title":"Machine learning, deep learning and statistical analysis for forecasting building energy consumption\u2014a systematic review","volume":"115","author":"Khalil","year":"2022","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.engappai.2024.108785_b138","doi-asserted-by":"crossref","first-page":"1311","DOI":"10.1016\/j.rser.2015.10.117","article-title":"Load forecasting, dynamic pricing and dsm in smart grid: A review","volume":"54","author":"Khan","year":"2016","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"6","key":"10.1016\/j.engappai.2024.108785_b139","doi-asserted-by":"crossref","first-page":"7109","DOI":"10.1109\/TPWRS.2018.2848207","article-title":"A fuzzy adaptive probabilistic wind power prediction framework using diffusion kernel density estimators","volume":"33","author":"Khorramdel","year":"2018","journal-title":"IEEE Trans. Power Syst."},{"issue":"16","key":"10.1016\/j.engappai.2024.108785_b140","doi-asserted-by":"crossref","DOI":"10.3390\/su12166539","article-title":"Peak-load forecasting for small industries: A machine learning approach","volume":"12","author":"Kim","year":"2020","journal-title":"Sustainability"},{"key":"10.1016\/j.engappai.2024.108785_b141","series-title":"SCADA, and Other Industrial Control Systems","article-title":"Industrial network security: Securing critical infrastructure networks for smart grid","author":"Knapp","year":"2015"},{"issue":"5","key":"10.1016\/j.engappai.2024.108785_b142","doi-asserted-by":"crossref","first-page":"1232","DOI":"10.1049\/iet-gtd.2015.0852","article-title":"Synchrophasor based thermal overhead line monitoring considering line spans and thermal transients","volume":"10","author":"Kubis","year":"2016","journal-title":"IET Gener. Transm. Distrib."},{"key":"10.1016\/j.engappai.2024.108785_b143","series-title":"Artificial Intelligence Safety and Security","first-page":"99","article-title":"Adversarial examples in the physical world","author":"Kurakin","year":"2018"},{"key":"10.1016\/j.engappai.2024.108785_b144","doi-asserted-by":"crossref","first-page":"3263","DOI":"10.1016\/j.egyr.2022.02.085","article-title":"Comprehensive review of the dynamic thermal rating system for sustainable electrical power systems","volume":"8","author":"Lai","year":"2022","journal-title":"Energy Rep."},{"key":"10.1016\/j.engappai.2024.108785_b145","doi-asserted-by":"crossref","first-page":"65193","DOI":"10.1109\/ACCESS.2022.3183606","article-title":"Dynamic thermal rating forecasting methods: A systematic survey","volume":"10","author":"Lawal","year":"2022","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b146","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1016\/j.rser.2008.02.002","article-title":"A review on the forecasting of wind speed and generated power","volume":"13","author":"Lei","year":"2009","journal-title":"Renew. Sustain. Energy Rev."},{"key":"10.1016\/j.engappai.2024.108785_b147","series-title":"Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation","author":"Lewis","year":"2006"},{"issue":"11","key":"10.1016\/j.engappai.2024.108785_b148","doi-asserted-by":"crossref","first-page":"2651","DOI":"10.1109\/TIM.2014.2313035","article-title":"Fault detection and classification in medium voltage dc shipboard power systems with wavelets and artificial neural networks","volume":"63","author":"Li","year":"2014","journal-title":"IEEE Trans. Instrum. Meas."},{"issue":"7","key":"10.1016\/j.engappai.2024.108785_b149","doi-asserted-by":"crossref","first-page":"2313","DOI":"10.1016\/j.apenergy.2009.12.013","article-title":"On comparing three artificial neural networks for wind speed forecasting","volume":"87","author":"Li","year":"2010","journal-title":"Appl. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b150","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2019.114133","article-title":"Study on the impacts of meteorological factors on distributed photovoltaic accommodation considering dynamic line parameters","volume":"259","author":"Li","year":"2020","journal-title":"Appl. Energy"},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b151","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/TSTE.2018.2831238","article-title":"A multi-model combination approach for probabilistic wind power forecasting","volume":"10","author":"Lin","year":"2019","journal-title":"IEEE Trans. Sustain. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b152","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1016\/j.apenergy.2019.04.188","article-title":"Data processing strategies in wind energy forecasting models and applications: A comprehensive review","volume":"249","author":"Liu","year":"2019","journal-title":"Appl. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b153","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1016\/j.enconman.2019.05.020","article-title":"Deterministic wind energy forecasting: A review of intelligent predictors and auxiliary methods","volume":"195","author":"Liu","year":"2019","journal-title":"Energy Convers. Manage."},{"key":"10.1016\/j.engappai.2024.108785_b154","doi-asserted-by":"crossref","DOI":"10.1016\/j.enconman.2020.113324","article-title":"A review on multi-objective optimization framework in wind energy forecasting techniques and applications","volume":"224","author":"Liu","year":"2020","journal-title":"Energy Convers. Manage."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b155","first-page":"730","article-title":"Probabilistic load forecasting via quantile regression averaging on sister forecasts","volume":"8","author":"Liu","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2024.108785_b156","unstructured":"Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M., Liu, M., 2015. Cloudy with a chance of breach: Forecasting cyber security incidents. In: 24th {USENIX} Security Symposium. {USENIX} Security 15, pp. 1009\u20131024."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b157","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1109\/TIA.2012.2199449","article-title":"Short-term wind-power prediction based on wavelet transform\u2013support vector machine and statistic-characteristics analysis","volume":"48","author":"Liu","year":"2012","journal-title":"IEEE Trans. Ind. Appl."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b158","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.ijforecast.2017.08.004","article-title":"Benchmarking robustness of load forecasting models under data integrity attacks","volume":"34","author":"Luo","year":"2018","journal-title":"Int. J. Forecast."},{"issue":"5","key":"10.1016\/j.engappai.2024.108785_b159","doi-asserted-by":"crossref","first-page":"5397","DOI":"10.1109\/TSG.2018.2881562","article-title":"Robust regression models for load forecasting","volume":"10","author":"Luo","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b160","doi-asserted-by":"crossref","first-page":"1005","DOI":"10.1016\/j.ijforecast.2022.04.001","article-title":"A robust support vector regression model for electric load forecasting","volume":"39","author":"Luo","year":"2023","journal-title":"Int. J. Forecast."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b161","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1007\/s40565-017-0351-7","article-title":"Real-time anomaly detection for very short-term load forecasting","volume":"6","author":"Luo","year":"2018","journal-title":"J. Mod. Power Syst. Clean Energy"},{"key":"10.1016\/j.engappai.2024.108785_b162","series-title":"The system price of electricity on nord pool: A matter of fundamental factors?","author":"M\u00e4\u00e4tt\u00e4","year":"2011"},{"key":"10.1016\/j.engappai.2024.108785_b163","series-title":"Towards deep learning models resistant to adversarial attacks","author":"Madry","year":"2017"},{"issue":"16","key":"10.1016\/j.engappai.2024.108785_b164","doi-asserted-by":"crossref","first-page":"5078","DOI":"10.3390\/en14165078","article-title":"The current state of the art in research on predictive maintenance in smart grid distribution network: Fault\u2019s types, causes, and prediction methods\u2014a systematic review","volume":"14","author":"Mahmoud","year":"2021","journal-title":"Energies"},{"key":"10.1016\/j.engappai.2024.108785_b165","doi-asserted-by":"crossref","first-page":"46117","DOI":"10.1109\/ACCESS.2021.3066494","article-title":"Machine learning based pv power generation forecasting in alice springs","volume":"9","author":"Mahmud","year":"2021","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b166","doi-asserted-by":"crossref","first-page":"1975","DOI":"10.1109\/TPWRD.2004.829125","article-title":"Voltage sag stochastic prediction using an electromagnetic transients program","volume":"19","author":"Martinez","year":"2004","journal-title":"IEEE Trans. Power Deliv."},{"key":"10.1016\/j.engappai.2024.108785_b167","doi-asserted-by":"crossref","first-page":"54558","DOI":"10.1109\/ACCESS.2021.3071269","article-title":"Deep learning in smart grid technology: A review of recent advancements and future prospects","volume":"9","author":"Massaoudi","year":"2021","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b168","doi-asserted-by":"crossref","first-page":"487","DOI":"10.3390\/app10020487","article-title":"Advanced methods for photovoltaic output power forecasting: A review","volume":"10","author":"Mellit","year":"2020","journal-title":"Appl. Sci."},{"key":"10.1016\/j.engappai.2024.108785_b169","doi-asserted-by":"crossref","first-page":"1713","DOI":"10.1016\/j.rser.2015.07.134","article-title":"Forecasting for dynamic line rating","volume":"52","author":"Michiorri","year":"2015","journal-title":"Renew. Sustain. Energy Rev."},{"key":"10.1016\/j.engappai.2024.108785_b170","doi-asserted-by":"crossref","DOI":"10.1016\/j.enconman.2022.115852","article-title":"A cyber-secure generalized supermodel for wind power forecasting based on deep federated learning and image processing","volume":"267","author":"Moayyed","year":"2022","journal-title":"Energy Convers. Manage."},{"key":"10.1016\/j.engappai.2024.108785_b171","series-title":"2016 IEEE Canadian Conference on Electrical and Computer Engineering","first-page":"1","article-title":"Effective input features selection for electricity price forecasting","author":"Mohamed","year":"2016"},{"key":"10.1016\/j.engappai.2024.108785_b172","series-title":"2022 10th International Conference on Smart Grid","first-page":"249","article-title":"Image processing-based data integrity attack detection in dynamic line rating forecasting applications","author":"Moradzadeh","year":"2022"},{"issue":"7","key":"10.1016\/j.engappai.2024.108785_b173","doi-asserted-by":"crossref","first-page":"4417","DOI":"10.1109\/TII.2021.3105932","article-title":"Turn-to-turn short circuit fault localization in transformer winding via image processing and deep learning method","volume":"18","author":"Moradzadeh","year":"2022","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.engappai.2024.108785_b174","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2022.108257","article-title":"Deep learning-based cyber resilient dynamic line rating forecasting","volume":"142","author":"Moradzadeh","year":"2022","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b175","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1016\/j.rser.2011.07.151","article-title":"What is the global potential for renewable energy?","volume":"16","author":"Moriarty","year":"2012","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b176","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1109\/TPWRD.2006.874108","article-title":"Analytical calculation and stochastic assessment of voltage sags","volume":"21","author":"Moschakis","year":"2006","journal-title":"IEEE Trans. Power Deliv."},{"key":"10.1016\/j.engappai.2024.108785_b177","article-title":"Lightweight sustainable intelligent load forecasting platform for smart grid applications","volume":"25","author":"Mukherjee","year":"2020","journal-title":"Sustain. Comput.: Inform. Syst."},{"key":"10.1016\/j.engappai.2024.108785_b178","series-title":"2020 8th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems","first-page":"1","article-title":"Online testbed for evaluating vulnerability of deep learning based power grid load forecasters","author":"Neema","year":"2020"},{"key":"10.1016\/j.engappai.2024.108785_b179","series-title":"Proceedings of the 45th Session of the Council on Large Electric Systems","article-title":"Operational experience with dynamic line rating forecast-based solutions to increase usable network transfer capacity","author":"Nguyen","year":"2014"},{"key":"10.1016\/j.engappai.2024.108785_b180","series-title":"22nd International Conference and Exhibition on Electricity Distribution","first-page":"1","article-title":"Dynamic line rating and ampacity forecasting as the keys to optimise power line assets with the integration of res. The European project twenties demonstration inside central western Europe","author":"Nguyen","year":"2013"},{"key":"10.1016\/j.engappai.2024.108785_b181","series-title":"Adversarial attacks, regression, and numerical stability regularization","author":"Nguyen","year":"2018"},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b182","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1325651.1325652","article-title":"Mitigating dos attacks against broadcast authentication in wireless sensor networks","volume":"4","author":"Ning","year":"2008","journal-title":"ACM Trans. Sens. Netw."},{"key":"10.1016\/j.engappai.2024.108785_b183","series-title":"Nrel solar power data","author":"NREL","year":"2017"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b184","doi-asserted-by":"crossref","first-page":"548","DOI":"10.3390\/smartcities4020029","article-title":"Artificial intelligence techniques in smart grid: A survey","volume":"4","author":"Omitaomu","year":"2021","journal-title":"Smart Cities"},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b185","doi-asserted-by":"crossref","first-page":"1535","DOI":"10.1109\/59.99410","article-title":"A regression-based approach to short-term system load forecasting","volume":"5","author":"Papalexopoulos","year":"1990","journal-title":"IEEE Trans. Power Syst."},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b186","doi-asserted-by":"crossref","first-page":"1655","DOI":"10.1109\/TPWRD.2006.886795","article-title":"Stochastic estimation of voltage sags in a large meshed network","volume":"22","author":"Park","year":"2007","journal-title":"IEEE Trans. Power Deliv."},{"key":"10.1016\/j.engappai.2024.108785_b187","series-title":"2018 IEEE Conference on Dependable and Secure Computing","first-page":"1","article-title":"Differentiating and predicting cyberattack behaviors using lstm","author":"Perry","year":"2018"},{"key":"10.1016\/j.engappai.2024.108785_b188","series-title":"Seven Deadliest Network Attacks","first-page":"1","article-title":"Chapter 1 - denial of service","author":"Prowell","year":"2010"},{"key":"10.1016\/j.engappai.2024.108785_b189","doi-asserted-by":"crossref","DOI":"10.1016\/j.epsr.2020.106914","article-title":"Fault classification in power system distribution network integrated with distributed generators using cnn","volume":"192","author":"Rai","year":"2021","journal-title":"Electr. Power Syst. Res."},{"key":"10.1016\/j.engappai.2024.108785_b190","series-title":"2016 International Joint Conference on Neural Networks","first-page":"727","article-title":"Short-term load forecasting using wavenet ensemble approaches","author":"Ribeiro","year":"2016"},{"key":"10.1016\/j.engappai.2024.108785_b191","series-title":"Simulation and the Monte Carlo Method","author":"Rubinstein","year":"2016"},{"key":"10.1016\/j.engappai.2024.108785_b192","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2021.117773","article-title":"Wind and solar generation may reduce the inter-annual variability of peak residual load in certain electricity systems","volume":"305","author":"Ruggles","year":"2022","journal-title":"Appl. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b193","series-title":"2016 International Conference on Recent Advances and Innovations in Engineering","first-page":"1","article-title":"And svm","author":"Saini","year":"2016"},{"key":"10.1016\/j.engappai.2024.108785_b194","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2019.100111","article-title":"Security aspects of internet of things aided smart grids: A bibliometric survey","volume":"14","author":"Sakhnini","year":"2021","journal-title":"Internet Things"},{"key":"10.1016\/j.engappai.2024.108785_b195","series-title":"Intelligent Systems","first-page":"634","article-title":"Photovoltaic generation forecast: Model training and adversarial attack aspects","volume":"vol. 12320","author":"Santana","year":"2020"},{"issue":"10","key":"10.1016\/j.engappai.2024.108785_b196","doi-asserted-by":"crossref","DOI":"10.3390\/info12100394","article-title":"Detecting and mitigating adversarial examples in regression tasks: A photovoltaic power generation forecasting case study","volume":"12","author":"Santana","year":"2021","journal-title":"Information"},{"key":"10.1016\/j.engappai.2024.108785_b197","series-title":"Analysis of false data injection impact on ai based solar photovoltaic power generation forecasting","author":"Sarp","year":"2021"},{"issue":"5","key":"10.1016\/j.engappai.2024.108785_b198","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1049\/iet-stg.2020.0015","article-title":"Survey of machine learning methods for detecting false data injection attacks in power systems","volume":"3","author":"Sayghe","year":"2020","journal-title":"IET Smart Grid"},{"key":"10.1016\/j.engappai.2024.108785_b199","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.neucom.2018.04.027","volume":"307","author":"Shaham","year":"2018","journal-title":"Neurocomputing"},{"issue":"5","key":"10.1016\/j.engappai.2024.108785_b200","doi-asserted-by":"crossref","first-page":"2466","DOI":"10.1109\/TSG.2015.2502140","article-title":"A data-driven approach for estimating the power generation of invisible solar sites","volume":"7","author":"Shaker","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"10.1016\/j.engappai.2024.108785_b201","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1109\/TSG.2016.2533164","article-title":"Estimating power generation of invisible solar sites using publicly available data","volume":"7","author":"Shaker","year":"2016","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2024.108785_b202","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2020.115733","article-title":"Artificial intelligence techniques for stability analysis and control in smart grids: Methodologies, applications, challenges and future directions","volume":"278","author":"Shi","year":"2020","journal-title":"Appl. Energy"},{"issue":"8","key":"10.1016\/j.engappai.2024.108785_b203","doi-asserted-by":"crossref","first-page":"1389","DOI":"10.1016\/S0031-3203(98)00174-5","article-title":"Noise impact on time-series forecasting using an intelligent pattern matching technique","volume":"32","author":"Singh","year":"1999","journal-title":"Pattern Recognit."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b204","article-title":"Digital twin: Origin to future","volume":"4","author":"Singh","year":"2021","journal-title":"Appl. Syst. Innov."},{"key":"10.1016\/j.engappai.2024.108785_b205","series-title":"2020 IEEE Power & Energy Society General Meeting","first-page":"1","article-title":"Testbed-based performance evaluation of attack resilient control for wind farm scada system","author":"Singh","year":"2020"},{"key":"10.1016\/j.engappai.2024.108785_b206","doi-asserted-by":"crossref","DOI":"10.1016\/j.measurement.2020.108691","article-title":"A probabilistic sequence classification approach for early fault prediction in distribution grids using long short-term memory neural networks","volume":"170","author":"Skydt","year":"2021","journal-title":"Measurement"},{"key":"10.1016\/j.engappai.2024.108785_b207","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1016\/j.enconman.2017.11.019","article-title":"Solar photovoltaic generation forecasting methods: A review","volume":"156","author":"Sobri","year":"2018","journal-title":"Energy Convers. Manage."},{"issue":"7","key":"10.1016\/j.engappai.2024.108785_b208","doi-asserted-by":"crossref","first-page":"8997","DOI":"10.1007\/s11063-023-11189-1","article-title":"Switching-like event-triggered state estimation for reaction\u2013diffusion neural networks against dos attacks","volume":"55","author":"Song","year":"2023","journal-title":"Neural Process. Lett."},{"key":"10.1016\/j.engappai.2024.108785_b209","doi-asserted-by":"crossref","DOI":"10.1016\/j.neucom.2023.126498","article-title":"Bipartite synchronization for cooperative-competitive neural networks with reaction\u2013diffusion terms via dual event-triggered mechanism","volume":"550","author":"Song","year":"2023","journal-title":"Neurocomputing"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b210","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1109\/TSG.2014.2298195","article-title":"Model-based attack detection and mitigation for automatic generation control","volume":"5","author":"Sridhar","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b211","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/JPROC.2011.2165269","article-title":"Cyber\u2013physical system security for the electric power grid","volume":"100","author":"Sridhar","year":"2012","journal-title":"Proc. IEEE"},{"key":"10.1016\/j.engappai.2024.108785_b212","series-title":"Testing and measurement techniques\u2014power quality measurement methods","author":"Standard","year":"2003"},{"key":"10.1016\/j.engappai.2024.108785_b213","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijepes.2020.106269","article-title":"Wavelet group method of data handling for fault prediction in electrical power insulators","volume":"123","author":"Stefenon","year":"2020","journal-title":"Int. J. Electr. Power Energy Syst."},{"key":"10.1016\/j.engappai.2024.108785_b214","series-title":"German nuclear plant infected with computer viruses, operator says","author":"Steitz","year":"2016"},{"key":"10.1016\/j.engappai.2024.108785_b215","series-title":"2021 American Control Conference","first-page":"4586","article-title":"Data-driven probabilistic anomaly detection for electricity market under cyber attacks","author":"Sun","year":"2021"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b216","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1049\/iet-gtd.2012.0117","article-title":"Flexible load shedding strategy considering real-time dynamic thermal line rating","volume":"7","author":"Sun","year":"2013","journal-title":"IET Gener. Transm. Distrib."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b217","doi-asserted-by":"crossref","DOI":"10.1002\/wene.365","article-title":"The future of forecasting for renewable energy","volume":"9","author":"Sweeney","year":"2020","journal-title":"WIREs Energy Environ."},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b218","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1049\/iet-rpg.2019.0642","article-title":"Stochastic framework for planning studies of energy systems: a case of ehs","volume":"14","author":"Taheri","year":"2020","journal-title":"IET Renew. Power Gener."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b219","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2790298","article-title":"Integrity attacks on real-time pricing in electric power grids","volume":"18","author":"Tan","year":"2015","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b220","doi-asserted-by":"crossref","DOI":"10.3390\/app8010093","article-title":"Generative adversarial networks based heterogeneous data integration and its application for intelligent power distribution and utilization","volume":"8","author":"Tan","year":"2018","journal-title":"Appl. Sci."},{"key":"10.1016\/j.engappai.2024.108785_b221","series-title":"2019 IEEE Power & Energy Society General Meeting","first-page":"1","article-title":"Enabling cyberattack-resilient load forecasting through adversarial machine learning","author":"Tang","year":"2019"},{"issue":"8","key":"10.1016\/j.engappai.2024.108785_b222","doi-asserted-by":"crossref","first-page":"1697","DOI":"10.1049\/iet-gtd.2017.1168","article-title":"Hybrid method for power system transient stability prediction based on two-stage computing resources","volume":"12","author":"Tang","year":"2018","journal-title":"IET Gener. Transm. Distrib."},{"key":"10.1016\/j.engappai.2024.108785_b223","series-title":"2021 IEEE Global Communications Conference","first-page":"1","article-title":"Adversarial attacks to solar power forecast","author":"Tang","year":"2021"},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b224","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1109\/TSTE.2018.2884500","article-title":"Extreme photovoltaic power analytics for electric utilities","volume":"11","author":"Tang","year":"2020","journal-title":"IEEE Trans. Sustain. Energy"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b225","doi-asserted-by":"crossref","first-page":"1295","DOI":"10.1109\/TSTE.2016.2544929","article-title":"Compressive spatio-temporal forecasting of meteorological quantities and photovoltaic power","volume":"7","author":"Tascikaraoglu","year":"2016","journal-title":"IEEE Trans. Sustain. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b226","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/j.rser.2014.03.033","article-title":"A review of combined approaches for prediction of short-term wind speed and power","volume":"34","author":"Tascikaraoglu","year":"2014","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b227","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1016\/j.ijforecast.2008.07.007","article-title":"An evaluation of methods for very short-term load forecasting using minute-by-minute British data","volume":"24","author":"Taylor","year":"2008","journal-title":"Int. J. Forecast."},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b228","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/S0169-2070(01)00123-6","article-title":"Using weather ensemble predictions in electricity demand forecasting","volume":"19","author":"Taylor","year":"2003","journal-title":"Int. J. Forecast."},{"key":"10.1016\/j.engappai.2024.108785_b229","doi-asserted-by":"crossref","first-page":"26765","DOI":"10.1109\/ACCESS.2018.2824238","article-title":"Prospects of using the dynamic thermal rating system for reliable electrical networks: A review","volume":"6","author":"Teh","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.engappai.2024.108785_b230","series-title":"2014 American Control Conference","first-page":"4372","article-title":"Security of smart distribution grids: Data integrity attacks on integrated volt\/var control and countermeasures","author":"Teixeira","year":"2014"},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b231","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1109\/TSMCA.2010.2048028","article-title":"Cybersecurity for critical infrastructures: Attack and defense modeling","volume":"40","author":"Ten","year":"2010","journal-title":"IEEE Trans. Syst. Man Cybern. A"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b232","doi-asserted-by":"crossref","first-page":"3306","DOI":"10.1109\/TPWRS.2017.2786470","article-title":"Understanding the benefits of dynamic line rating under multiple sources of uncertainty","volume":"33","author":"Teng","year":"2018","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2024.108785_b233","series-title":"Power System SCADA and Smart Grids","author":"Thomas","year":"2017"},{"key":"10.1016\/j.engappai.2024.108785_b234","doi-asserted-by":"crossref","first-page":"29705","DOI":"10.1007\/s11042-018-6463-x","article-title":"A brief review on multi-task learning","volume":"77","author":"Thung","year":"2018","journal-title":"Multimedia Tools Appl."},{"issue":"12","key":"10.1016\/j.engappai.2024.108785_b235","doi-asserted-by":"crossref","first-page":"13699","DOI":"10.1109\/TCYB.2021.3125345","article-title":"Joint adversarial example and false data injection attacks for state estimation in power systems","volume":"52","author":"Tian","year":"2022","journal-title":"IEEE Trans. Cybern."},{"key":"10.1016\/j.engappai.2024.108785_b236","series-title":"Monju power plant facility pc infected with virus","author":"Today","year":"2014"},{"key":"10.1016\/j.engappai.2024.108785_b237","series-title":"Ensemble adversarial training: Attacks and defenses","author":"Tram\u00e8r","year":"2017"},{"key":"10.1016\/j.engappai.2024.108785_b238","series-title":"2020 IEEE Conference on Industrial Cyberphysical Systems","first-page":"393","article-title":"A hybrid cyber physical digital twin approach for smart grid fault prediction","volume":"Vol. 1","author":"Tzanis","year":"2020"},{"key":"10.1016\/j.engappai.2024.108785_b239","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1016\/j.ijepes.2014.09.034","article-title":"Estimation method for dynamic line rating potential and economic benefits","volume":"65","author":"Uski","year":"2015","journal-title":"Int. J. Electr. Power Energy Syst."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b240","doi-asserted-by":"crossref","first-page":"1573","DOI":"10.1016\/j.ijforecast.2022.10.004","article-title":"Robust regression for electricity demand forecasting against cyberattacks","volume":"39","author":"VandenHeuvel","year":"2023","journal-title":"Int. J. Forecast."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b241","first-page":"1092","article-title":"Artificial neural networks for spot electricity price forecasting: A review","volume":"5","author":"Vijayalakshmi","year":"2015","journal-title":"Int. J. Energy Econ. Policy"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b242","doi-asserted-by":"crossref","first-page":"2593","DOI":"10.1109\/TSG.2018.2805723","article-title":"Deep learning-based socio-demographic information identification from smart meter data","volume":"10","author":"Wang","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b243","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1016\/j.ijforecast.2015.09.006","article-title":"Electric load forecasting with recency effect: A big data approach","volume":"32","author":"Wang","year":"2016","journal-title":"Int. J. Forecast."},{"key":"10.1016\/j.engappai.2024.108785_b244","doi-asserted-by":"crossref","DOI":"10.1016\/j.apenergy.2019.113315","article-title":"A comparison of day-ahead photovoltaic power forecasting models based on deep learning neural network","volume":"251","author":"Wang","year":"2019","journal-title":"Appl. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b245","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.renene.2014.11.011","article-title":"Medium-term wind speeds forecasting utilizing hybrid models for three different sites in Xinjiang, China","volume":"76","author":"Wang","year":"2015","journal-title":"Renew. Energy"},{"key":"10.1016\/j.engappai.2024.108785_b246","doi-asserted-by":"crossref","first-page":"1292","DOI":"10.1016\/j.energy.2019.03.009","article-title":"Deep learning aided interval state prediction for improving cyber security in energy internet","volume":"174","author":"Wang","year":"2019","journal-title":"Energy"},{"issue":"10","key":"10.1016\/j.engappai.2024.108785_b247","doi-asserted-by":"crossref","first-page":"5505","DOI":"10.1109\/TII.2019.2902163","article-title":"Dynamic data injection attack detection of cyber physical power systems with uncertainties","volume":"15","author":"Wang","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"10.1016\/j.engappai.2024.108785_b248","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111660","article-title":"Rope: Defending against backdoor attacks in federated learning systems","volume":"293","author":"Wang","year":"2024","journal-title":"Knowl.-Based Syst."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b249","doi-asserted-by":"crossref","first-page":"3664","DOI":"10.1109\/TSG.2018.2833869","article-title":"Combining probabilistic load forecasts","volume":"10","author":"Wang","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2024.108785_b250","series-title":"Modeling and Forecasting Electricity Loads and Prices: A Statistical Approach","author":"Weron","year":"2006"},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b251","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1016\/j.ijforecast.2014.08.008","article-title":"Electricity price forecasting: A review of the state-of-the-art with a look into the future","volume":"30","author":"Weron","year":"2014","journal-title":"Int. J. Forecast."},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b252","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1016\/j.ijforecast.2015.11.005","article-title":"Gefcom2014 probabilistic electric load forecasting: An integrated solution with forecast combination and residual simulation","volume":"32","author":"Xie","year":"2016","journal-title":"Int. J. Forecast."},{"key":"10.1016\/j.engappai.2024.108785_b253","article-title":"Defending against model poisoning attack in federated learning: A variance-minimization approach","volume":"82","author":"Xu","year":"2024","journal-title":"J. Inf. Secur. Appl."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b254","doi-asserted-by":"crossref","first-page":"3282","DOI":"10.1109\/TIA.2021.3073652","article-title":"Frequency-domain decomposition and deep learning based solar pv power ultra-short-term forecasting model","volume":"57","author":"Yan","year":"2021","journal-title":"IEEE Trans. Ind. Appl."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b255","doi-asserted-by":"crossref","first-page":"2680","DOI":"10.1109\/TDSC.2021.3069258","article-title":"Monitoring-based differential privacy mechanism against query flooding-based model extraction attack","volume":"19","author":"Yan","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b256","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1109\/SURV.2012.010912.00035","article-title":"A survey on cyber security for smart grid communications","volume":"14","author":"Yan","year":"2012","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.engappai.2024.108785_b257","series-title":"2005 International Power Engineering Conference","first-page":"1","article-title":"Historical load curve correction for short-term load forecasting","author":"Yang","year":"2005"},{"issue":"1","key":"10.1016\/j.engappai.2024.108785_b258","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/TSTE.2014.2359974","article-title":"Multitime-scale data-driven spatio-temporal forecast of photovoltaic generation","volume":"6","author":"Yang","year":"2015","journal-title":"IEEE Trans. Sustain. Energy"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b259","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1109\/TPWRD.2005.858774","article-title":"Bayesian networks-based approach for power systems fault diagnosis","volume":"21","author":"Yongli","year":"2006","journal-title":"IEEE Trans. Power Deliv."},{"issue":"9","key":"10.1016\/j.engappai.2024.108785_b260","doi-asserted-by":"crossref","first-page":"2805","DOI":"10.1109\/TNNLS.2018.2886017","article-title":"Adversarial examples: Attacks and defenses for deep learning","volume":"30","author":"Yuan","year":"2019","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"10.1016\/j.engappai.2024.108785_b261","series-title":"2016 IEEE International Conference on Aircraft Utility Systems","first-page":"135","article-title":"Fault diagnosis and remaining useful life estimation of aero engine using lstm neural network","author":"Yuan","year":"2016"},{"key":"10.1016\/j.engappai.2024.108785_b262","series-title":"2017 IEEE Power & Energy Society General Meeting","first-page":"1","article-title":"An integrated anomaly detection method for load forecasting data under cyberattacks","author":"Yue","year":"2017"},{"issue":"6","key":"10.1016\/j.engappai.2024.108785_b263","doi-asserted-by":"crossref","first-page":"5964","DOI":"10.1109\/TSG.2019.2894334","article-title":"Descriptive analytics-based anomaly detection for cybersecure load forecasting","volume":"10","author":"Yue","year":"2019","journal-title":"IEEE Trans. Smart Grid"},{"key":"10.1016\/j.engappai.2024.108785_b264","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2020.103852","article-title":"A novel integrated price and load forecasting method in smart grid environment based on multi-level structure","volume":"95","author":"Zhang","year":"2020","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"3","key":"10.1016\/j.engappai.2024.108785_b265","doi-asserted-by":"crossref","first-page":"362","DOI":"10.17775\/CSEEJPES.2018.00520","article-title":"Review on the research and practice of deep learning and reinforcement learning in smart grids","volume":"4","author":"Zhang","year":"2018","journal-title":"CSEE J. Power Energy Syst."},{"issue":"7","key":"10.1016\/j.engappai.2024.108785_b266","doi-asserted-by":"crossref","first-page":"4362","DOI":"10.1109\/TII.2019.2891261","article-title":"Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data","volume":"15","author":"Zhang","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"7","key":"10.1016\/j.engappai.2024.108785_b267","first-page":"2578","article-title":"Adversarial examples: Opportunities and challenges","volume":"31","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"15","key":"10.1016\/j.engappai.2024.108785_b268","doi-asserted-by":"crossref","DOI":"10.3390\/en13153780","article-title":"Robustness of short-term wind power forecasting against false data injection attacks","volume":"13","author":"Zhang","year":"2020","journal-title":"Energies"},{"key":"10.1016\/j.engappai.2024.108785_b269","doi-asserted-by":"crossref","first-page":"7675","DOI":"10.1109\/ACCESS.2017.2785763","article-title":"Data-based line trip fault prediction in power systems using lstm networks and svm","volume":"6","author":"Zhang","year":"2018","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b270","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1049\/iet-its.2016.0208","article-title":"lstm network: a deep learning approach for short-term traffic forecast","volume":"11","author":"Zhao","year":"2017","journal-title":"IET Intell. Transp. Syst."},{"key":"10.1016\/j.engappai.2024.108785_b271","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2022.118467","article-title":"An asymmetric bisquare regression for mixed cyberattack-resilient load forecasting","volume":"210","author":"Zhao","year":"2022","journal-title":"Expert Syst. Appl."},{"issue":"4","key":"10.1016\/j.engappai.2024.108785_b272","doi-asserted-by":"crossref","first-page":"1580","DOI":"10.1109\/TSG.2015.2492827","article-title":"Short-term state forecasting-aided method for detection of smart grid general false data injection attacks","volume":"8","author":"Zhao","year":"2017","journal-title":"IEEE Trans. Smart Grid"},{"issue":"7","key":"10.1016\/j.engappai.2024.108785_b273","doi-asserted-by":"crossref","DOI":"10.1002\/2050-7038.12103","article-title":"Load forecasting under data corruption based on anomaly detection and combined robust regression","volume":"30","author":"Zheng","year":"2020","journal-title":"Int. Trans. Electr. Energy Syst."},{"issue":"8","key":"10.1016\/j.engappai.2024.108785_b274","first-page":"2729","article-title":"Hijacking unmanned aerial vehicle by exploiting civil gps vulnerabilities using software-defined radio","volume":"32","author":"Zheng","year":"2020","journal-title":"Sens. Mater."},{"issue":"2","key":"10.1016\/j.engappai.2024.108785_b275","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1109\/TPWRS.2022.3175252","article-title":"Robust load forecasting towards adversarial attacks via Bayesian learning","volume":"38","author":"Zhou","year":"2023","journal-title":"IEEE Trans. Power Syst."},{"key":"10.1016\/j.engappai.2024.108785_b276","series-title":"2019 Resilience Week","first-page":"206","article-title":"Evaluating resilience of grid load predictions under stealthy adversarial attacks","volume":"Vol. 1","author":"Zhou","year":"2019"},{"key":"10.1016\/j.engappai.2024.108785_b277","series-title":"2014 IEEE PES General Meeting \u2014 Conference & Exposition","first-page":"1","article-title":"Frequency-based real-time line trip detection and alarm trigger development","author":"Zhou","year":"2014"}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197624009436?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197624009436?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T06:42:20Z","timestamp":1723099340000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197624009436"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9]]},"references-count":277,"alternative-id":["S0952197624009436"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2024.108785","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2024,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Resiliency of forecasting methods in different application areas of smart grids: A review and future prospects","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2024.108785","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"108785"}}