Results 251 to 260 of about 1,171,713 (299)
Some of the next articles are maybe not open access.

Cyber Attack Detection and Correction Mechanisms in a Distributed DC Microgrid

IEEE transactions on power electronics, 2022
DC microgrids (DCMGs) are evolving into cyber-physical systems with advanced communication networks and computational methodologies, making them sensitive to cyber-attacks. These attacks can threaten the safe operation of a system.
S. Madichetty, S. Mishra
semanticscholar   +1 more source

Cyber Attack Detection and Isolation for a Quadrotor UAV With Modified Sliding Innovation Sequences

IEEE Transactions on Vehicular Technology, 2022
Common vulnerabilities in typical intelligent cyber-physical systems such as unmanned aerial vehicles (UAVs) can be easily exploited by cyber attackers to cause serious accidents and harm.
Jiaping Xiao, Mir Feroskhan
semanticscholar   +1 more source

A Transfer Learning-Based Method for Cyber-Attack Tolerance in Distributed Control of Microgrids

IEEE Transactions on Smart Grid
Distributed secondary control of a microgrid highly relies on information exchange via communication networks, which may be vulnerable to cyber-attacks.
Yang Xia, Yan Xu, S. Mondal, A. Gupta
semanticscholar   +1 more source

Kalman Filters Based Distributed Cyber-Attack Mitigation Layers for DC Microgrids

IEEE Transactions on Circuits and Systems Part 1: Regular Papers
The use of communication links between microgrid components has made the transmitted data vulnerable to cyber-attacks. This paper presents distributed cyber-attack detection and mitigation layers integrated with the primary and secondary control loops of
Ahmed H. El-Ebiary   +4 more
semanticscholar   +1 more source

Secure Adaptive-Event-Triggered Filter Design With Input Constraint and Hybrid Cyber Attack

IEEE Transactions on Cybernetics, 2020
The problem of secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack is investigated in this article. First, a new model of hybrid cyber attack, which considers a deception attack, a replay attack, and a denial-of ...
Jinliang Liu   +4 more
semanticscholar   +1 more source

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey

IEEE/CAA Journal of Automatica Sinica, 2022
With the booming of cyber attacks and cyber criminals against cyber-physical systems (CPSs), detecting these attacks remains challenging. It might be the worst of times, but it might be the best of times because of opportunities brought by machine ...
Jun Zhang   +5 more
semanticscholar   +1 more source

Discussing cyber attack

Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire   +1 more source

Stochastic fault and cyber-attack detection and consensus control in multi-agent systems

International Journal of Control, 2021
In this paper, the stochastic fault and cyber-attack detection and consensus control problems are investigated for multi-agent systems. By using a Markovian approach, Linear Matrix Inequalities (LMI) are derived that incorporate relative information ...
A. Eslami, F. Abdollahi, K. Khorasani
semanticscholar   +1 more source

A Cyber-Attack Resilient Distributed Control Strategy in Islanded Microgrids

IEEE Transactions on Smart Grid, 2020
Considering the high penetration of distributed energy resources (DERs), extensive communication networks are deemed necessary to realize the coordinated control of DERs in microgrids (MGs).
Quan Zhou   +3 more
semanticscholar   +1 more source

IoT Cyber-Attack Detection: A Comparative Analysis

International Conference on Data Technologies and Applications, 2021
A cyber-attack is precautious manipulation of computer systems and networks using malware to conciliate data or restrict processes or operations. These types of attacks are vastly growing over the years.
Abdul Hanan K. Mohammed   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy