Results 281 to 290 of about 67,029 (331)
Some of the next articles are maybe not open access.
False Data Injection Attacks in Bilateral Teleoperation Systems
IEEE Transactions on Control Systems Technology, 2020In this brief, false data injection attacks in bilateral teleoperation systems (BTOSs) are studied, where the attacker can inject false data into the states being exchanged between the master and slave robots. To demonstrate the vulnerability of BTOS, a destabilizing false data injection attack (DFDIA) is designed and experimentally implemented.
Yimeng Dong +2 more
openaire +1 more source
Design of False Data Injection Attacks in Cyber-Physical Systems
Information Sciences, 2022zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Padhan, Sushree, Turuk, Ashok Kumar
openaire +2 more sources
Distributed Estimation With Cross-Verification Under False Data-Injection Attacks
IEEE Transactions on Cybernetics, 2023Under false data-injection (FDI) attacks, the data of some agents are tampered with by the FDI attackers, which causes that the distributed algorithm cannot estimate the ideal unknown parameter. Due to the concealment of the malicious data tampered with by the FDI attacks, many detection algorithms against FDI attacks often have poor detection results ...
Yi Hua +4 more
openaire +2 more sources
Power grid resilience against false data injection attacks
2016 IEEE Power and Energy Society General Meeting (PESGM), 2016Smart Grid security has motivated numerous researches from multiple disciplines. Among the recently discovered security challenges, the False Data Injection (FDI) has drawn great attention from power and energy, computer, and communication research community, because of its potential to manipulate measurements in state estimation (SE) without being ...
Yan, Jun +4 more
openaire +2 more sources
Securing SCADA systems from false data injection attacks
2023The Supervisory Control and Data Acquisition (SCADA) system controls and monitors industrial operations, such as electricity, gas, railway, traffic, water, and waste. With the increased advancement of technologies in the SCADA system, there have been an increasing number of attacks targeting the SCADA system.
openaire +2 more sources
Consensus-based filtering under false data injection attacks
European Journal of Control, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xia, Yuanyuan, Yang, Wen, Zhao, Zhiyun
openaire +2 more sources
False data injection attacks identification for smart grids
2015 Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2015False Data Injection Attacks (FDIA) in Smart Grid is considered to be the most threatening cyber-physics attack. According to the variety of measurement categories in power system, a new method for false data detection and identification is presented.
Zongshuai Hu +5 more
openaire +1 more source
A Data-Based Detection Method Against False Data Injection Attacks
IEEE Design & Test, 2020Editor’s notes: CPSs are vulnerable to process-aware attacks that aim to disrupt the proper functioning or hamper performance/efficiency/stability/safety of the physical systems/processes of the CPSs. This article considers utilization of state estimators in smart grids for detection of false data injection attacks using data-driven anomaly detection ...
Charalambos Konstantinou +1 more
openaire +1 more source
False Data Injection Attacks in Internet of Things
2018Internet of Things (IoT) facilitates networking among different types of electronic devices. The emerging false data injection attacks (FDIAs) have drawn attention and heavily researched in power systems and smart grid. The cyber criminals compromise a networked device and inject data.
Biozid Bostami +2 more
openaire +1 more source
Optimal False Data Injection Attacks on MTC
IEEE Transactions on Vehicular Technology, 2022Yanan Du +3 more
openaire +1 more source

