Subspace Methods for Data Attack on State Estimation: A Data Driven Approach [PDF]
Data attacks on state estimation modify part of system measurements such that the tempered measurements cause incorrect system state estimates. Attack techniques proposed in the literature often require detailed knowledge of system parameters.
Jinsub Kim +3 more
core +1 more source
RADAR: Run-time Adversarial Weight Attack Detection and Accuracy Recovery [PDF]
Adversarial attacks on Neural Network weights, such as the progressive bit-flip attack (PBFA), can cause a catastrophic degradation in accuracy by flipping a very small number of bits.
Jingtao Li +4 more
semanticscholar +1 more source
Detection of Multi-Stage Attacks Through Attack Pattern Segmentation
Advanced cyberattack patterns threatening network assets employ various attack vectors, multi-stage attack processes, and diverse penetration strategies.
Seonghyeon Gong +2 more
doaj +1 more source
Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the ...
Lakshminarayana, Subhash +3 more
core +1 more source
Algorithm Selection Framework for Cyber Attack Detection
The number of cyber threats against both wired and wireless computer systems and other components of the Internet of Things continues to increase annually.
Ajmera Aman +15 more
core +1 more source
Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems
Smart manufacturing (SM) systems utilize run-time data to improve productivity via intelligent decision-making and analysis mechanisms on both machine and system levels.
Efe C. Balta +4 more
semanticscholar +1 more source
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
The popularity of wireless sensor networks for establishing different communication systems is increasing daily. A wireless network consists of sensors prone to various security threats.
Maria Hanif +6 more
semanticscholar +1 more source
Situation Awareness Assessment Approach Based on Attack Traffic and System Vulnerabilities
Network security situation assessment plays an important role in the design and implementation of network defense strategies. The existing situation assessment methods gather the information of both attack and defense to construct an assessment model ...
LI Yan +4 more
doaj +1 more source
A false data attack detection method for power grid based on an improved AIGA
As a typical cyber-physical attack, false data are measured unchanged, thus deceiving the detection based on chi-square detector. To this end, a false data attack detection method for smart grid based on an improved adaptive immune genetic algorithm ...
WANG Xinyu +4 more
doaj +1 more source
Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models
Currently, hidden Markov-based multi-step attack detection models are mainly trained using the unsupervised Baum–Welch algorithm. The Baum–Welch algorithm is sensitive to the initial values of model parameters.
Xu Zhang +7 more
doaj +1 more source

