Results 271 to 280 of about 66,369 (329)
DELP-Net: A Differentiable Entropy Layer Pyramid Network for End-to-End Low-Rate DoS Detection. [PDF]
Wang J, Xu C, Yang J.
europepmc +1 more source
A novel intrusion detection framework using hybrid deep learning to detect IIoT cloud environments attacks. [PDF]
Chen S, Feng X.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Detection, estimation, and compensation of false data injection attack for UAVs
Information Sciences, 2021Abstract The safety issues of unmanned aerial vehicles (UAVs) are ever increasing in focus due to the vulnerability to attack. This paper investigates the safety problem for UAVs under the false data injection attack (FDIA) through wireless data link. First, the attack characteristics and influencing factors of FDIA are explicitly analyzed. Thus, the
Xiang Yu, Jianzhong Qiao
exaly +2 more sources
Secure distributed estimation against false data injection attack
Information Sciences, 2020Abstract With the development of wireless sensor networks, many distributed algorithms have been studied by researchers. This paper considers the situation of distributed estimation with false data injection (FDI) attack. Owing to the fact that Kullback-Leibler (KL) divergence is very effective to detect outliers caused by FDI attack, a distributed ...
Yi Hua, Feng Chen, Shukai Duan
exaly +2 more sources
Data-Driven False Data Injection Attack: A Low-Rank Approach
IEEE Transactions on Smart Grid, 2022Debottam Mukherjee
exaly +2 more sources
Design of False Data Injection Attacks in Cyber-Physical Systems
Information Sciences, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Sushree Padhan, Ashok Kumar Turuk
openaire +2 more sources
False Data Injection Attacks in Bilateral Teleoperation Systems
IEEE Transactions on Control Systems Technology, 2020In this brief, false data injection attacks in bilateral teleoperation systems (BTOSs) are studied, where the attacker can inject false data into the states being exchanged between the master and slave robots. To demonstrate the vulnerability of BTOS, a destabilizing false data injection attack (DFDIA) is designed and experimentally implemented.
Yimeng Dong +2 more
openaire +1 more source

