UP - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UPUK. For full access, REGISTER.

48 49 50
hits: 3,802
491.
  • High-Stealth False Data Att... High-Stealth False Data Attacks on Overloading Multiple Lines in Power Systems
    Du, Min; Wang, Lianhong; Zhou, Yicong IEEE transactions on smart grid, 03/2023, Volume: 14, Issue: 2
    Journal Article
    Peer reviewed

    In this letter, we present a single mixed-integer linear programming (MILP) model for high-stealth false data attacks (FDAs) on overloading a set of lines by injecting stealthy false data. The ...
Full text
492.
  • Analytical reliability asse... Analytical reliability assessment of cyber-physical distribution system with distributed feeder automation
    Zeng, Guangxuan; Yu, Tao; Wang, Ziyao ... Electric power systems research, July 2022, 2022-07-00, 20220701, Volume: 208
    Journal Article
    Peer reviewed

    •An efficient analytical reliability assessment method is proposed for CPDS with DFA.•The reliability model of cyber system with DFA is built.•Cyber impacts of both device failures and cyber-attacks ...
Full text
493.
  • Distributed Estimation of P... Distributed Estimation of Power System Oscillation Modes Under Attacks on GPS Clocks
    Wang, Yongqiang; Hespanha, Joao P. IEEE transactions on instrumentation and measurement, 07/2018, Volume: 67, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Phasor measurement units (PMUs) are playing an increasingly important role in wide-area monitoring and the control of power systems. PMUs allow synchronous real-time measurements of voltage, phase ...
Full text

PDF
494.
  • A comprehensive approach, a... A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber–Physical Systems
    Sabaliauskaite, Giedre; Ng, Geok See; Ruths, Justin ... Robotics and autonomous systems, December 2017, 2017-12-00, Volume: 98
    Journal Article
    Peer reviewed

    Several methods have been proposed by researchers to detect cyber attacks in Cyber–Physical Systems (CPSs). This paper proposes a comprehensive approach for conducting experiments to assess the ...
Full text
495.
  • Observer‐based event‐trigge... Observer‐based event‐triggered security control for nonlinear networked control systems with cyber attacks
    Huang, Fan; Pan, Yingnan; Lu, Qing International journal of robust and nonlinear control, 10 March 2024, Volume: 34, Issue: 4
    Journal Article
    Peer reviewed

    Summary This paper investigates the observer‐based security control problem for interval type‐2 nonlinear networked control systems with deception attacks and replay attacks. Firstly, to alleviate ...
Full text
496.
  • CyberLearning: Effectivenes... CyberLearning: Effectiveness analysis of machine learning security modeling to detect cyber-anomalies and multi-attacks
    Sarker, Iqbal H. Internet of things (Amsterdam. Online), June 2021, 2021-06-00, Volume: 14
    Journal Article
    Peer reviewed
    Open access

    Detecting cyber-anomalies and attacks are becoming a rising concern these days in the domain of cybersecurity. The knowledge of artificial intelligence, particularly, the machine learning techniques ...
Full text

PDF
497.
  • Cyber supply chain risk man... Cyber supply chain risk management and performance in industry 4.0 era: information system security practices in Malaysia
    Fernando, Yudi; Tseng, Ming-Lang; Wahyuni-Td, Ika Sari ... Journal of industrial and production engineering, 02/2023, Volume: 40, Issue: 2
    Journal Article
    Peer reviewed

    This study aims to investigate the direct and indirect effects of information system security practices that observed the relationship effect between cyber supply chain risk management and supply ...
Full text
498.
  • A statistical unsupervised ... A statistical unsupervised method against false data injection attacks: A visualization-based approach
    Mohammadpourfard, Mostafa; Sami, Ashkan; Seifi, Ali Reza Expert systems with applications, 10/2017, Volume: 84
    Journal Article
    Peer reviewed

    •An unsupervised method is proposed for detecting cyber-attacks after topology changes.•Detection is performed by quantifying the probability distributions of the state vectors.•Quantification is ...
Full text
499.
  • Trusted Operation of Cyber-... Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode
    Basan, Elena; Basan, Alexandr; Nekrasov, Alexey ... Sensors (Basel, Switzerland), 02/2023, Volume: 23, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    We consider the trusted operation of cyber-physical processes based on an assessment of the system's state and operating mode and present a method for detecting anomalies in the behavior of a ...
Full text
500.
  • A New Threat Intelligence S... A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems
    Moustafa, Nour; Adi, Erwin; Turnbull, Benjamin ... IEEE access, 01/2018, Volume: 6
    Journal Article
    Peer reviewed
    Open access

    Industry 4.0 represents the fourth phase of industry and manufacturing revolution, unique in that it provides Internet-connected smart systems, including automated factories, organizations, ...
Full text

PDF

You have reached the maximum number of search results that are displayed.

  • For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
  • Consider using result filters or changing the sort order to explore your results further.
48 49 50
hits: 3,802

Load filters