Results 281 to 290 of about 67,029 (331)
Some of the next articles are maybe not open access.

False Data Injection Attacks in Bilateral Teleoperation Systems

IEEE Transactions on Control Systems Technology, 2020
In this brief, false data injection attacks in bilateral teleoperation systems (BTOSs) are studied, where the attacker can inject false data into the states being exchanged between the master and slave robots. To demonstrate the vulnerability of BTOS, a destabilizing false data injection attack (DFDIA) is designed and experimentally implemented.
Yimeng Dong   +2 more
openaire   +1 more source

Design of False Data Injection Attacks in Cyber-Physical Systems

Information Sciences, 2022
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Padhan, Sushree, Turuk, Ashok Kumar
openaire   +2 more sources

Distributed Estimation With Cross-Verification Under False Data-Injection Attacks

IEEE Transactions on Cybernetics, 2023
Under false data-injection (FDI) attacks, the data of some agents are tampered with by the FDI attackers, which causes that the distributed algorithm cannot estimate the ideal unknown parameter. Due to the concealment of the malicious data tampered with by the FDI attacks, many detection algorithms against FDI attacks often have poor detection results ...
Yi Hua   +4 more
openaire   +2 more sources

Power grid resilience against false data injection attacks

2016 IEEE Power and Energy Society General Meeting (PESGM), 2016
Smart Grid security has motivated numerous researches from multiple disciplines. Among the recently discovered security challenges, the False Data Injection (FDI) has drawn great attention from power and energy, computer, and communication research community, because of its potential to manipulate measurements in state estimation (SE) without being ...
Yan, Jun   +4 more
openaire   +2 more sources

Securing SCADA systems from false data injection attacks

2023
The Supervisory Control and Data Acquisition (SCADA) system controls and monitors industrial operations, such as electricity, gas, railway, traffic, water, and waste. With the increased advancement of technologies in the SCADA system, there have been an increasing number of attacks targeting the SCADA system.
openaire   +2 more sources

Consensus-based filtering under false data injection attacks

European Journal of Control, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Xia, Yuanyuan, Yang, Wen, Zhao, Zhiyun
openaire   +2 more sources

False data injection attacks identification for smart grids

2015 Third International Conference on Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2015
False Data Injection Attacks (FDIA) in Smart Grid is considered to be the most threatening cyber-physics attack. According to the variety of measurement categories in power system, a new method for false data detection and identification is presented.
Zongshuai Hu   +5 more
openaire   +1 more source

A Data-Based Detection Method Against False Data Injection Attacks

IEEE Design & Test, 2020
Editor’s notes: CPSs are vulnerable to process-aware attacks that aim to disrupt the proper functioning or hamper performance/efficiency/stability/safety of the physical systems/processes of the CPSs. This article considers utilization of state estimators in smart grids for detection of false data injection attacks using data-driven anomaly detection ...
Charalambos Konstantinou   +1 more
openaire   +1 more source

False Data Injection Attacks in Internet of Things

2018
Internet of Things (IoT) facilitates networking among different types of electronic devices. The emerging false data injection attacks (FDIAs) have drawn attention and heavily researched in power systems and smart grid. The cyber criminals compromise a networked device and inject data.
Biozid Bostami   +2 more
openaire   +1 more source

Optimal False Data Injection Attacks on MTC

IEEE Transactions on Vehicular Technology, 2022
Yanan Du   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy