Results 161 to 170 of about 1,279,940 (244)
Cyber attack and fault detection in DC microgrids by designing an event-triggered based-robust algorithm. [PDF]
Hosseini Rostami SM +2 more
europepmc +1 more source
Practical Predefined-Time Sliding-Mode Adaptive Resilient Control for PMSM Cyber-Physical Systems. [PDF]
Wang Z, Zhang S, Jiang Y, Yin C.
europepmc +1 more source
A hybrid XGBoost-SVM ensemble framework for robust cyber-attack detection in the internet of medical things (IoMT). [PDF]
Abdelhaq M +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Automatic Control, 2023
This technical note investigates the problem of extended dissipative finite-time control for Markov jump systems (MJSs) with cyber-attacks and actuator failures.
Haiyang Chen +3 more
semanticscholar +1 more source
This technical note investigates the problem of extended dissipative finite-time control for Markov jump systems (MJSs) with cyber-attacks and actuator failures.
Haiyang Chen +3 more
semanticscholar +1 more source
A Survey of Cyber Attacks on Cyber Physical Systems: Recent Advances and Challenges
IEEE/CAA Journal of Automatica Sinica, 2022A cyber physical system (CPS) is a complex system that integrates sensing, computation, control and networking into physical processes and objects over Internet. It plays a key role in modern industry since it connects physical and cyber worlds. In order
Wenli Duo, Mengchu Zhou, A. Abusorrah
semanticscholar +1 more source
IEEE Transactions on Automation Science and Engineering, 2023
Information and communication technology tremendously facilitates the operation efficiency and economy of modern power systems in recent years. However, risks such as bandwidth constraints and malicious attacks threaten the secure load frequency control (
Meng Zhang +4 more
semanticscholar +1 more source
Information and communication technology tremendously facilitates the operation efficiency and economy of modern power systems in recent years. However, risks such as bandwidth constraints and malicious attacks threaten the secure load frequency control (
Meng Zhang +4 more
semanticscholar +1 more source
IEEE Transactions on Network Science and Engineering, 2023
Consensus control of multi-agent systems (MASs) has applications in various domains. As MASs work in networked environments, their security control becomes critically desirable in response to cyber-attacks.
G. Narayanan +4 more
semanticscholar +1 more source
Consensus control of multi-agent systems (MASs) has applications in various domains. As MASs work in networked environments, their security control becomes critically desirable in response to cyber-attacks.
G. Narayanan +4 more
semanticscholar +1 more source
IEEE Transactions on Industrial Informatics, 2022
Distributed algorithms are increasingly being used to solve the economic dispatch problem of integrated energy systems (IESs) because of their high flexibility and strong robustness, but those algorithms also bring more risk of cyber-attacks in IESs.
Bonan Huang +4 more
semanticscholar +1 more source
Distributed algorithms are increasingly being used to solve the economic dispatch problem of integrated energy systems (IESs) because of their high flexibility and strong robustness, but those algorithms also bring more risk of cyber-attacks in IESs.
Bonan Huang +4 more
semanticscholar +1 more source
IEEE Transactions on Cybernetics, 2022
This article addresses the problem of lateral control problem for networked-based autonomous vehicle systems. A novel solution is presented for nonlinear autonomous vehicles to smoothly follow the planned path under external disturbances and network ...
Zhi Lian, Peng Shi, C. Lim, Xin Yuan
semanticscholar +1 more source
This article addresses the problem of lateral control problem for networked-based autonomous vehicle systems. A novel solution is presented for nonlinear autonomous vehicles to smoothly follow the planned path under external disturbances and network ...
Zhi Lian, Peng Shi, C. Lim, Xin Yuan
semanticscholar +1 more source

