UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

3 4 5 6 7
hits: 3,802
41.
  • Quantized control for a cla... Quantized control for a class of neural networks with adaptive event‐triggered scheme and complex cyber‐attacks
    Liu, Jinliang; Suo, Wei; Xie, Xiangpeng ... International journal of robust and nonlinear control, 10 July 2021, Volume: 31, Issue: 10
    Journal Article
    Peer reviewed

    This article is concerned with the quantized control problem for neural networks with adaptive event‐triggered scheme (AETS) and complex cyber‐attacks. By fully considering the characteristics of ...
Full text
42.
  • An Explainable and Resilien... An Explainable and Resilient Intrusion Detection System for Industry 5.0
    Javeed, Danish; Gao, Tianhan; Kumar, Prabhat ... IEEE transactions on consumer electronics, 02/2024, Volume: 70, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Industry 5.0 is a emerging transformative model that aims to develop a hyperconnected, automated, and data-driven industrial ecosystem. This digital transformation will boost productivity and ...
Full text
43.
  • Distributed Event-Based Res... Distributed Event-Based Resilient Secondary Control for AC Microgrids: A Trust-Reputation Approach
    Wan, Ying; Wen, Guanghui; Yu, Xinghuo ... IEEE transactions on smart grid, 03/2024, Volume: 15, Issue: 2
    Journal Article
    Peer reviewed

    A new resilient distributed secondary control for AC microgrids is studied based on event-triggered mechanisms and trust-reputation evaluation methods. When distributed generators (DGs) in a ...
Full text
44.
  • Distributed Event-Triggered... Distributed Event-Triggered Economic Environmental Resource Management for Islanded Microgrids Under DoS Attacks
    Liu, Li-Ning; Yang, Guang-Hong; Wasly, Saud IEEE transactions on automation science and engineering, 12/2023
    Journal Article

    This article focuses on the economic environmental resource management for islanded Microgrids. To optimize the competing social welfare and environmental impact objectives simultaneously, by using ...
Full text
45.
  • Decentralized event-trigger... Decentralized event-triggered H∞ control for neural networks subject to cyber-attacks
    Zha, Lijuan; Tian, Engang; Xie, Xiangpeng ... Information sciences, August 2018, 2018-08-00, Volume: 457-458
    Journal Article
    Peer reviewed

    This paper addresses the problem of decentralized event-triggered H∞ control for neural networks subject to limited network-bandwidth and cyber-attacks. In order to alleviate the network transmission ...
Full text
46.
  • Recursive filtering of netw... Recursive filtering of networked nonlinear systems: a survey
    Mao, Jingyang; Sun, Ying; Yi, Xiaojian ... International journal of systems science, 04/2021, Volume: 52, Issue: 6
    Journal Article
    Peer reviewed

    Recursive filtering for nonlinear systems, one of the core technologies of modern industrial systems, is an ever-increasing research topic from the control and computer communities. Some challenges ...
Full text
47.
  • Bandwidth Allocation-Based ... Bandwidth Allocation-Based Distributed Event-Triggered LFC for Smart Grids Under Hybrid Attacks
    Hossain, Md Musabbir; Peng, Chen; Sun, Hong-Tao ... IEEE transactions on smart grid, 2022-Jan., 2022-1-00, 20220101, Volume: 13, Issue: 1
    Journal Article
    Peer reviewed

    In this study, a bandwidth allocation-based distributed event-triggering load frequency control (LFC) has been developed for smart grids to deal with hybrid cyber-attacks, for example, ...
Full text
48.
  • Integrating the Safety Cont... Integrating the Safety Control Against Cyber-Attacks on the Global Information in Coupled Map Car-Following Model Under Connected Vehicles Platoon Environment
    Peng, Guanghan; Li, Xinhai; Tan, Huili IEEE transactions on intelligent transportation systems, 2024
    Journal Article
    Peer reviewed

    The connected vehicles (CVs) technology mainly relies on the traffic cyber physical systems (T-CPS) to realize the interconnection between CVs. However, the vulnerability of open CVs environment ...
Full text
49.
  • An ensemble learning and fo... An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks
    Kumar, Prabhat; Gupta, Govind P.; Tripathi, Rakesh Computer communications, 01/2021, Volume: 166
    Journal Article
    Peer reviewed

    Internet of Medical Things (IoMT), an application of Internet of Things (IoT), is addressing countless limitation of traditional health-care systems such as quality of patient care, healthcare costs, ...
Full text
50.
  • Online Detection of Stealth... Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation
    Ashok, Aditya; Govindarasu, Manimaran; Ajjarapu, Venkataramana IEEE transactions on smart grid, 05/2018, Volume: 9, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    State estimation is one of the fundamental functions in modern power grid operations that provide operators with situational awareness and is used by several applications like contingency analysis ...
Full text
3 4 5 6 7
hits: 3,802

Load filters