UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 3,802
11.
  • ICSSIM — A framework for bu... ICSSIM — A framework for building industrial control systems security testbeds
    Dehlaghi-Ghadim, Alireza; Balador, Ali; Moghadam, Mahshid Helali ... Computers in industry, 06/2023, Volume: 148
    Journal Article
    Peer reviewed
    Open access

    With the advent of the smart industry, Industrial Control Systems (ICS) moved from isolated environments to connected platforms to meet Industry 4.0 targets. The inherent connectivity in these ...
Full text
12.
  • Dynamic Event-Triggered Out... Dynamic Event-Triggered Output Feedback Control for Networked Systems Subject to Multiple Cyber Attacks
    Zha, Lijuan; Liao, Rongfei; Liu, Jinliang ... IEEE transactions on cybernetics, 12/2022, Volume: 52, Issue: 12
    Journal Article
    Peer reviewed

    This article is concerned with the problem of the <inline-formula> <tex-math notation="LaTeX">H_{\infty } </tex-math></inline-formula> output feedback control for a class of event-triggered networked ...
Full text
13.
  • Stabilization of Networked ... Stabilization of Networked Control Systems With Hybrid-Driven Mechanism and Probabilistic Cyber Attacks
    Liu, Jinliang; Wu, Zheng-Guang; Yue, Dong ... IEEE transactions on systems, man, and cybernetics. Systems, 2021-Feb., 2021-2-00, Volume: 51, Issue: 2
    Journal Article
    Peer reviewed

    This paper investigates the controller design problem of networked control systems subject to cyber attacks. A hybrid-triggering communication strategy is employed to save the limited communication ...
Full text
14.
  • Stealthy False Data Injecti... Stealthy False Data Injection Attacks Detection and Classification in Cyber-Physical Systems Using Deep Reinforcement Learning
    Xin, Liang; He, Guang; Long, Zhiqiang IEEE transactions on automation science and engineering, 2024
    Journal Article

    Cyber-physical systems (CPSs) are increasingly threatened by stealthy false data injection (SFDI) attacks, which compromise system integrity by manipulating control signals and introducing false ...
Full text
15.
  • Survey of machine learning ... Survey of machine learning methods for detecting false data injection attacks in power systems
    Sayghe, Ali; Hu, Yaodan; Zografopoulos, Ioannis ... IET smart grid, October 2020, 2020-10-00, 2020-10-01, Volume: 3, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Over the last decade, the number of cyber attacks targeting power systems and causing physical and economic damages has increased rapidly. Among them, false data injection attacks (FDIAs) are a class ...
Full text

PDF
16.
  • Resilient Operation of Hete... Resilient Operation of Heterogeneous Sources in Cooperative DC Microgrids
    Sahoo, Subham; Dragicevic, Tomislav; Blaabjerg, Frede IEEE transactions on power electronics, 2020-Dec., 2020-12-00, Volume: 35, Issue: 12
    Journal Article
    Peer reviewed
    Open access

    As distributed control layer makes dc microgrids vulnerable toward cyber attacks, the identification and mitigation of attacked agent(s) becomes even more challenging with heterogeneity between each ...
Full text

PDF
17.
  • Distributed filtering based... Distributed filtering based on Cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks
    Song, Haifang; Ding, Derui; Dong, Hongli ... Automatica (Oxford), January 2022, 2022-01-00, Volume: 135
    Journal Article
    Peer reviewed
    Open access

    This paper is concerned with the distributed filtering issue under the Cauchy-kernel-based maximum correntropy for large-scale systems subject to randomly occurring cyber-attacks in non-Gaussian ...
Full text

PDF
18.
  • Finite-time based fault-tol... Finite-time based fault-tolerant control for half-car active suspension system with cyber-attacks: A memory event-triggered approach
    Arumugam, Karthick; Chen, Bor-Sen IEEE transactions on vehicular technology, 2024
    Journal Article
    Peer reviewed
    Open access

    By wielding memory event-triggered scheme (METS), this paper explores the issue of finite-time fault-tolerant control strategy for a sort of half-car active suspension system, which comprises ...
Full text
19.
  • Data-driven attack policy d... Data-driven attack policy design for cyber-physical systems under channel constraints
    Liu, He; Li, Xiao-Jian Information sciences, August 2024, 2024-08-00, Volume: 677
    Journal Article
    Peer reviewed

    This paper is concerned with the design of data-driven sensor injection attack for cyber-physical systems (CPSs) under channel constraints, where the attacker can only access a part of the sensor ...
Full text
20.
Full text
1 2 3 4 5
hits: 3,802

Load filters