“…These tools offer varying contributions in terms of performance and reliability enhancement as some of them are designed and equipped with a variety of outstanding features for efficiency and effectiveness. However, the increasing use of these devices and other cyber presence increases the vulnerabilities and channels through which sabotage, terrorism and intrusion can be perpetuated into the network [ 1 , 2 , 3 ]. The consequences of various high-profile incidences such as the Yemen blackout, Ukrainian power grid blackout, Iran nuclear program attack, etc.…”