Results 51 to 60 of about 6,155,073 (227)

Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]

open access: yes, 2014
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim   +3 more
core   +1 more source

RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery [PDF]

open access: yesDesign, Automation and Test in Europe, 2021
Adversarial attacks on Neural Network weights, such as the progressive bit-flip attack (PBFA), can cause a catastrophic degradation in accuracy by flipping a very small number of bits.
Jingtao Li   +4 more
semanticscholar   +1 more source

Detection of Multi-Stage Attacks Through Attack Pattern Segmentation

open access: yesIEEE Access
Advanced cyberattack patterns threatening network assets employ various attack vectors, multi-stage attack processes, and diverse penetration strategies.
Seonghyeon Gong   +2 more
doaj   +1 more source

Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

open access: yes, 2017
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the ...
Lakshminarayana, Subhash   +3 more
core   +1 more source

Algorithm Selection Framework for Cyber Attack Detection

open access: yes, 2020
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman   +15 more
core   +1 more source

Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems

open access: yesIEEE Transactions on Automation Science and Engineering
Smart manufacturing (SM) systems utilize run-time data to improve productivity via intelligent decision-making and analysis mechanisms on both machine and system levels.
Efe C. Balta   +4 more
semanticscholar   +1 more source

AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks

open access: yesElectronics, 2022
The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats.
Maria Hanif   +6 more
semanticscholar   +1 more source

Situation Awareness Assessment Approach Based on Attack Traffic and System Vulnerabilities

open access: yesShuju Caiji Yu Chuli
Network security situation assessment plays an important role in the design and implementation of network defense strategies. The existing situation assessment methods gather the information of both attack and defense to construct an assessment model ...
LI Yan   +4 more
doaj   +1 more source

A false data attack detection method for power grid based on an improved AIGA

open access: yesZhejiang dianli, 2023
As a typical cyber-physical attack, false data are measured unchanged, thus deceiving the detection based on chi-square detector. To this end, a false data attack detection method for smart grid based on an improved adaptive immune genetic algorithm ...
WANG Xinyu   +4 more
doaj   +1 more source

Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models

open access: yesSensors, 2022
Currently, hidden Markov-based multi-step attack detection models are mainly trained using the unsupervised Baum–Welch algorithm. The Baum–Welch algorithm is sensitive to the initial values of model parameters.
Xu Zhang   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy