Results 51 to 60 of about 61,083 (243)

Detection of replay attacks in cyber-physical systems using a frequency-based signature [PDF]

open access: yes, 2019
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop ...
Escobet Canal, Teresa   +5 more
core   +2 more sources

Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

open access: yes, 2017
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the ...
Lakshminarayana, Subhash   +3 more
core   +1 more source

Cyber Attack Detection

open access: yesINTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Cyber attack detection is a critical component of modern cybersecurity strategies. With the ever-increasing sophistication of cyber threats the need for robust and efficient detection mechanisms has become paramount. This abstract introduces the concept of cyber attack detection and its significance in safeguarding digital assets.
Prof. Kaustubh Shinde   +4 more
openaire   +1 more source

Unilateral Ankle‐Foot Exoneuromusculoskeleton with Balance‐Sensing Feedback for Self‐Help Telerehabilitation after Stroke

open access: yesAdvanced Robotics Research, EarlyView.
This study introduces a hybrid robot that integrates mechanical assistance by musculoskeletons (i.e., soft pneumatic muscle with rigid exoskeletal extensions), neuromuscular electrical stimulation, and vibrotactile feedback in a lightweight wearable mechatronic complex applicable to the paretic ankle–foot poststroke for gait restoration. The system can
Fuqiang Ye   +16 more
wiley   +1 more source

A Review on IoT Cyber-Attacks Detection Challenges‎ and Solutions

open access: yesAl-Iraqia Journal for Scientific Engineering Research, 2023
 The Internet of Things (IoT) has recast the way we interact with technology and the world around us. The IoT is almost everywhere in our daily lives, and this huge growth in using the IoT increases the need for implementing a high level of security ...
Marwa Jawad Kathem, Tayseer Salman Atia
doaj   +1 more source

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

Intrusion Detection System for Detecting Cyber Attacks

open access: yesInternational Journal of Engineering and Advanced Technology, 2019
The proposed topology for a wireless networked control system is learnt under several cyber-attack situations, and a distributed intrusion detection system (IDS) is created to see the presence of attacks. More particularly, the paper shows a modeling structure for the closed-loop control system with the IDS, and a computational method to create and ...
Dr. A.Annamalai giri   +2 more
openaire   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

A cyber‐attack detection method for load control system based on cyber and physical layer crosscheck mechanism

open access: yesIET Generation, Transmission & Distribution, 2022
Cyber‐attack has become one of the main threats to the safe operation of the load control system in the distribution network. Currently, a large number of methods are developed to detect cyber‐attacks.
Yingjun Wu   +7 more
doaj   +1 more source

A Cyber-Security Methodology for a Cyber-Physical Industrial Control System Testbed

open access: yesIEEE Access, 2021
Due to recent increase in deployment of Cyber-Physical Industrial Control Systems in different critical infrastructures, addressing cyber-security challenges of these systems is vital for assuring their reliability and secure operation in presence of ...
Mohammad Noorizadeh   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy