UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

2 3 4 5 6
hits: 3,802
31.
  • Detection of advanced persi... Detection of advanced persistent threat using machine-learning correlation analysis
    Ghafir, Ibrahim; Hammoudeh, Mohammad; Prenosil, Vaclav ... Future generation computer systems, December 2018, 2018-12-00, Volume: 89
    Journal Article
    Peer reviewed
    Open access

    As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to ...
Full text

PDF
32.
  • Resilient Control of DC Mic... Resilient Control of DC Microgrids Against Cyber Attacks: A Functional Observer Based Approach
    Kachhwaha, Mohit; Modi, Himani; Nehra, Mahesh Kumar ... IEEE transactions on power electronics, 2024-Jan., 2024-1-00, Volume: 39, Issue: 1
    Journal Article
    Peer reviewed

    Direct current microgrids (DCMGs) are swiftly moving toward the realm of communication-dependent distributed cooperative control strategies. The incorporation of cyber layer for robustness, ...
Full text
33.
  • Cyber-Attacks in Modular Mu... Cyber-Attacks in Modular Multilevel Converters
    Burgos-Mellado, Claudio; Donoso, Felipe; Dragicevic, Tomislav ... IEEE transactions on power electronics, 07/2022, Volume: 37, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Distributed control of modular multilevel converter (MMC) submodules (SMs) offers several potential benefits such as flexibility, scalability, and modularity. In this approach, low-level control ...
Full text
34.
  • Distributed Blockchain-Base... Distributed Blockchain-Based Data Protection Framework for Modern Power Systems Against Cyber Attacks
    Liang, Gaoqi; Weller, Steven R.; Luo, Fengji ... IEEE transactions on smart grid, 05/2019, Volume: 10, Issue: 3
    Journal Article
    Peer reviewed

    The cyber security of modern power systems has drawn increasing attention in both academia and industry. Many detection and defense methods for cyber-attacks have therefore been proposed to enhance ...
Full text
35.
  • Hybrid-triggered-based secu... Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks
    Cao, Jie; Da Ding; Liu, Jinliang ... Information sciences, 02/2021, Volume: 548
    Journal Article
    Peer reviewed

    •A hybrid-triggered scheme is introduced to solve the network constraints.•A mathematical model of multiple cyber attacks is established for NCS.•A control protocol is proposed for the ...
Full text
36.
  • Detection and mitigation of... Detection and mitigation of classes of attacks in supervisory control systems
    Carvalho, Lilian Kawakami; Wu, Yi-Chin; Kwong, Raymond ... Automatica (Oxford), November 2018, 2018-11-00, Volume: 97
    Journal Article
    Peer reviewed
    Open access

    The deployment of control systems with network-connected components has made feedback control systems vulnerable to attacks over the network. This paper considers the problem of intrusion detection ...
Full text

PDF
37.
  • Security-based Control for ... Security-based Control for Networked Interval Type-2 Fuzzy Systems with Multiple Cyber-Attacks: an Improved Dynamic Event-Triggered Scheme
    Xing, Jing-Wen; Peng, Chen; Cao, Zhiru ... IEEE transactions on fuzzy systems, 08/2023, Volume: 31, Issue: 8
    Journal Article
    Peer reviewed

    This paper addresses the problem of dynamic event-triggered (DET) control for networked interval type-2 (IT2) fuzzy systems subject to multiple cyber-attacks, which contain deception attacks and ...
Full text
38.
  • Sampled-data stabilization ... Sampled-data stabilization for networked control systems under deception attack and the transmission delay
    Lee, Seok Young; Park, JunMin Communications in nonlinear science & numerical simulation, April 2024, 2024-04-00, Volume: 131
    Journal Article
    Peer reviewed

    For the stability analysis and stabilization synthesis problems, this paper considers networked control systems (NCSs) with the transmission delay and the deception attack under aperiodic samplings, ...
Full text
39.
  • False Data Injection Cyber-... False Data Injection Cyber-Attacks Detection for Multiple DC Microgrid Clusters
    Tan, Sen; Xie, Peilin; Guerrero, Josep M. ... Applied energy, 03/2022, Volume: 310
    Journal Article
    Peer reviewed
    Open access

    DC microgrids are considered as the next generation of power systems because of the possibility of connecting various renewable energy sources to different types of loads based on distributed ...
Full text

PDF
40.
  • Stability analysis and secu... Stability analysis and security-based event-triggered mechanism design for T-S fuzzy NCS with traffic congestion via DoS attack and its application
    Shi, Kaibo; Cai, Xiao; She, Kun ... IEEE transactions on fuzzy systems, 10/2023, Volume: 31, Issue: 10
    Journal Article
    Peer reviewed

    This paper proposes an improved security-based event-triggered fuzzy control (ETFC) method for studying the asymptotic stability (AS) problem of nonlinear networked control systems (NCSs) under ...
Full text
2 3 4 5 6
hits: 3,802

Load filters