Results 181 to 190 of about 1,279,940 (244)
Some of the next articles are maybe not open access.

Secure Adaptive Event-Triggered Control for Cyber–Physical Power Systems Under Denial-of-Service Attacks

IEEE Transactions on Cybernetics, 2023
Secure control for cyber–physical power systems (CPPSs) under cyber attacks is a challenging issue. Existing event-triggered control schemes are generally difficult to mitigate the impact of cyber attacks and improve communication efficiency ...
Aimin Wang   +5 more
semanticscholar   +1 more source

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

arXiv.org
Large language models (LLMs) have demonstrated impressive results on natural language tasks, and security researchers are beginning to employ them in both offensive and defensive systems.
Jiacen Xu   +7 more
semanticscholar   +1 more source

Dynamic Event-Based Model Predictive Load Frequency Control for Power Systems Under Cyber Attacks

IEEE Transactions on Smart Grid, 2021
This article is concerned with the load frequency control (LFC) for the multi-area power system (MAPS) in the presence of cyber-attacks and disturbances. A resilient model predictive control (RMPC) strategy combined with the mixed $H_{2} /H_{\infty } $
Yuezhi Liu, Yong Chen, Meng Li
semanticscholar   +1 more source

Discussing cyber attack

Communications of the ACM, 2010
Cyber attack---the other side of cyber defense---deserves a more open discussion than it has been getting.
Peter J. Denning, Dorothy E. Denning
openaire   +1 more source

Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning

Computers & electrical engineering, 2021
Smart Grid uses electricity and information flows to set up a highly developed, fully automated, and distributed electricity grid system. To identify the reliability of work and availability, cyber attacks detection in the smart grids play a significant ...
Sudhakar Sengan   +4 more
semanticscholar   +1 more source

Robust and Resilient Distributed Optimal Frequency Control for Microgrids Against Cyber Attacks

IEEE Transactions on Industrial Informatics, 2022
The optimal frequency control of autonomous microgrids (MGs), i.e., to achieve fast frequency recovery and dynamic power adjustment of the distributed generators in proportion to predefined participation factors, can be achieved in a fully distributed ...
Yun Liu   +5 more
semanticscholar   +1 more source

Security Sliding Mode Control of Interval Type-2 Fuzzy Systems Subject to Cyber Attacks: The Stochastic Communication Protocol Case

IEEE transactions on fuzzy systems, 2021
This article addresses the security control problem of a class of interval type-2 fuzzy systems via the sliding mode control strategy. A stochastic communication scheduling protocol is utilized to govern the transmission from the sensors to the ...
Zhina Zhang, Y. Niu, Z. Cao, Jun Song
semanticscholar   +1 more source

Best ways computation intelligent of face cyber attacks

, 2021
The rising of information and communication technologies brought about new challenges that need to be dealt with is the citizens' security is considered.
Bilal S. A. Alhayani   +3 more
semanticscholar   +1 more source

Consensus of Switched Nonlinear Multiagent Systems Subject to Cyber Attacks

IEEE Systems Journal, 2022
In this article, the output consensus problem is investigated for a class of switched nonlinear multiagent systems, where denial-of-service attacks and faults are considered in communication channels and agents’ actuators, respectively. The cyber attacks
Sheng Li   +3 more
semanticscholar   +1 more source

Futuristic cyber-attacks

International Journal of Knowledge-based and Intelligent Engineering Systems, 2018
In the present day, human beings are living in a world which is networked together, ranging from online banking to connected physical infrastructures. The network security that was once optional has now become an exigency. Cyber-attacks have now emerged as one of the prime concerns globally.
Sibi Chakkaravarthy, S.   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy