UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

1 2 3 4 5
hits: 3,802
21.
  • Detection and Localization ... Detection and Localization of Stealthy Cyber Attacks in Cyber-Physical Discrete Event Systems
    Fritz, Raphael; Zhang, Ping IEEE transactions on automatic control, 03/2023
    Journal Article
    Peer reviewed

    The widespread use of cyber-physical systems (CPS) not only brings new opportunities with it but also introduces the risk of cyber attacks on the system. One of the most dangerous and sophisticated ...
Full text
22.
  • The 2015 Ukraine Blackout: ... The 2015 Ukraine Blackout: Implications for False Data Injection Attacks
    Gaoqi Liang; Weller, Steven R.; Junhua Zhao ... IEEE transactions on power systems, 2017-July, 2017-7-00, 20170701, Volume: 32, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    In a false data injection attack (FDIA), an adversary stealthily compromises measurements from electricity grid sensors in a coordinated fashion, with a view to evading detection by the power system ...
Full text

PDF
23.
  • Cyber Security in Control o... Cyber Security in Control of Grid-Tied Power Electronic Converters-Challenges and Vulnerabilities
    Sahoo, Subham; Dragicevic, Tomislav; Blaabjerg, Frede IEEE journal of emerging and selected topics in power electronics, 10/2021, Volume: 9, Issue: 5
    Journal Article
    Peer reviewed
    Open access

    Grid-tied power electronic converters are key enabling technologies for interfacing renewable energy sources, energy storage, electrical vehicles, microgrids, and high-voltage dc transmission lines ...
Full text

PDF
24.
  • Outlier-Resistant Recursive... Outlier-Resistant Recursive Security Filtering for Multirate Networked Systems Under Fading Measurements and Round-Robin Protocol
    Liu, Jinliang; Gong, Enyu; Zha, Lijuan ... IEEE transactions on control of network systems, 12/2023, Volume: 10, Issue: 4
    Journal Article
    Peer reviewed

    This paper investigates the recursive filtering problem with fading measurements and cyber attacks for multisensor multirate networked systems (MRNSs) under Round-Robin protocol (RRP). By exploiting ...
Full text
25.
  • Reachability Analysis for L... Reachability Analysis for Linear Discrete-Time Systems Under Stealthy Cyber Attacks
    Liu, Hao; Niu, Ben; Qin, Jiahu IEEE transactions on automatic control, 09/2021, Volume: 66, Issue: 9
    Journal Article
    Peer reviewed

    In this article, the reachability analysis is investigated for the linear discrete-time systems in the presence of malicious cyber attacks. Moreover, the system disturbance and measurement noise are ...
Full text
26.
  • Adaptive event-triggered co... Adaptive event-triggered consensus control of linear multi-agent systems with cyber attacks
    Yuan, Shuo; Yu, Chengpu; Sun, Jian Neurocomputing (Amsterdam), 06/2021, Volume: 442
    Journal Article
    Peer reviewed

    This paper investigates the adaptive event-triggered consensus control problem for a class of linear multi-agent systems subject to cyber attacks and communication delays. To effectively alleviate ...
Full text
27.
  • Cyber-security on smart gri... Cyber-security on smart grid: Threats and potential solutions
    Gunduz, Muhammed Zekeriya; Das, Resul Computer networks (Amsterdam, Netherlands : 1999), 03/2020, Volume: 169
    Journal Article
    Peer reviewed

    The smart grid is one of the most significant applications of the Internet of Things (IoT). As information and communication technologies (ICT) developed and applied in traditional power systems, the ...
Full text
28.
  • Towards a Cyber Resilience ... Towards a Cyber Resilience Quantification Framework (CRQF) for IT infrastructure
    AlHidaifi, Saleh Mohamed; Asghar, Muhammad Rizwan; Ansari, Imran Shafique Computer networks (Amsterdam, Netherlands : 1999), June 2024, 2024-06-00, Volume: 247
    Journal Article
    Peer reviewed
    Open access

    Cyber resilience quantification is the process of evaluating and measuring an organisation’s ability to withstand, adapt to, and recover from cyber-attacks. It involves estimating IT systems, ...
Full text
29.
  • Decentralized Secure Load F... Decentralized Secure Load Frequency Control for Multi-Area Power Systems Under Complex Cyber Attacks
    Jia, Xinchun; Lv, Teng; Li, Bin ... IEEE transactions on smart grid, 2024
    Journal Article
    Peer reviewed

    This paper investigates the problem of decentralized secure load frequency control (LFC) for multi-area power systems (MAPSs) under complex cyber attacks launched by a malicious attacker. Firstly, a ...
Full text
30.
  • Robust Observer-Based Defen... Robust Observer-Based Defense Strategy Against Actuator and Sensor Cyber-Attacks in DCMGs
    Kachhwaha, Mohit; Modi, Himani; Nehra, Mahesh Kumar ... IEEE transactions on industrial informatics, 06/2024
    Journal Article

    For the implementation of distributed cooperative control of the dc microgrid (DCMG), dependency on the communication layer is inevitable. Consequently, the DCMG, a typical cyber-physical system, is ...
Full text
1 2 3 4 5
hits: 3,802

Load filters