Results 1 to 10 of about 317,969 (287)

Secure LQG control for a Quadrotor under false data injection attacks

open access: yesIET Control Theory & Applications, 2022
The linear quadratic Gaussian (LQG) control for a quadrotor unmanned aerial vehicle (UAV) under false data injection attacks is studied. The LQG control depends on optimal state estimation, while this type of attacks makes the optimal state estimation ...
Hong Lin   +4 more
doaj   +1 more source

A multi-stage low-cost false data injection attack method for power CPS

open access: yesZhejiang dianli, 2023
With the rapid development of information and communication technology, the power system has developed into a cyber physical system (CPS) in which the information system and the physical system are deeply coupled. The constant interplay between data flow
YI Na, XU Jianjun, CHEN Yue, PAN Feiyu
doaj   +1 more source

A moving target defense to detect stealthy attacks in cyber-physical systems [PDF]

open access: yes, 2019
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communication patterns when compared to classical information technology networks.
Cardenas, A, Giraldo, J, Sanfelice, RG
core   +1 more source

A methodology for the generation of efficient error detection mechanisms [PDF]

open access: yes, 2011
A dependable software system must contain error detection mechanisms and error recovery mechanisms. Software components for the detection of errors are typically designed based on a system specification or the experience of software engineers, with their
Anand, Sarabjot Singh   +3 more
core   +1 more source

Summed Parallel Infinite Impulse Response (SPIIR) Filters For Low-Latency Gravitational Wave Detection [PDF]

open access: yes, 2011
With the upgrade of current gravitational wave detectors, the first detection of gravitational wave signals is expected to occur in the next decade.
A. V. Oppenheim   +8 more
core   +2 more sources

Detection of False Data Injection Attacks in Smart Grid under Colored Gaussian Noise

open access: yes, 2016
In this paper, we consider the problems of state estimation and false data injection detection in smart grid when the measurements are corrupted by colored Gaussian noise.
He, Haibo   +3 more
core   +1 more source

Pharmacokinetic Analysis of Gd-DTPA Enhancement in dynamic three-dimensional MRI of breast lesions [PDF]

open access: yes, 1997
The purpose of this study was to demonstrate that dynamic MRI covering both breasts can provide sensitivity for tumor detection as well as specificity and sensitivity for differentiation of tumor malignancy.
de Vos, Rob A.I.   +10 more
core   +4 more sources

Coordinated False Data Injection Attacks in AGC System and Its Countermeasure

open access: yesIEEE Access, 2020
The Automatic Generation Control (AGC) system is vital for power system frequency stability. The frequency and tie-line power flow are measured and transmitted to the control room to form Area Control Error (ACE), which is then sent to each generator for
Xi He, Xuan Liu, Peng Li
doaj   +1 more source

Modeling and performance evaluation of stealthy false data injection attacks on smart grid in the presence of corrupted measurements

open access: yes, 2016
The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge,
Anwar, Adnan   +2 more
core   +1 more source

Distributed state estimation of active distribution network considering false data injection attack

open access: yes电力工程技术, 2022
As a key link to ensure the quality of power grid monitoring data,the state estimation provides a reliable data basis for the energy management system. Considering the problems of the large measurement errors and the vulnerability to the cyberattacks in ...
HUANG Chongxin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy