2020
DOI: 10.1007/978-3-030-38181-3_7
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Applications in Power Systems: A Bibliometric Analysis

Abstract: Power systems are growing rapidly, due to ever-increasing demand for electrical power. These systems require novel methodologies and modern tools and technologies, to better perform, particularly for communication among different parts. Therefore, power systems are facing new challenges such as energy trading and marketing and cyber threats. Using blockchain in power systems, as a solution, is one of the newest methods. Most studies aim to investigate innovative approaches of blockchain application in power sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 46 publications
(44 reference statements)
0
5
0
Order By: Relevance
“…The bibliometric analysis contains various applications from information science, sociology, history of science, and research evaluation. This method is used to evaluate, monitor, and visualize the structure of scientific fields (Rouzbahani et al, 2020). Bibliometric methods can be divided into two parts: general instructions and publication analysis.…”
Section: Methodsmentioning
confidence: 99%
“…The bibliometric analysis contains various applications from information science, sociology, history of science, and research evaluation. This method is used to evaluate, monitor, and visualize the structure of scientific fields (Rouzbahani et al, 2020). Bibliometric methods can be divided into two parts: general instructions and publication analysis.…”
Section: Methodsmentioning
confidence: 99%
“…The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) stated that more than half of the most important attacks reported across all sectors have been conducted on the electrical power system [11]. Employing a massive number of smart devices along with the new generation of communication infrastructures in IoT-based networks opens the gate for cyber and physical malicious behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…Upon the specification of suitable initial conditions for u, p, m, and r, equations (4), (6), (10), and (11) are sufficient for simulating the flow in the absence of any boundaries.…”
Section: The Standard Edac Formulationmentioning
confidence: 99%
“…The Implicit Incompressible SPH scheme (IISPH) [9] proposes an iterative solution procedure to alleviate some of these issues. Recently, an Artificial Compressibility-based Incompressible SPH (ACISPH) scheme [10] has been proposed which applies a traditional dual-time stepping approach used in Eulerian schemes to satisfy incompressibility. This scheme is also explicit and seems a promising alternative to the traditional ISPH schemes.…”
Section: Introductionmentioning
confidence: 99%