Results 41 to 50 of about 66,369 (329)
The false data injection (FDI) attack cannot be detected by the traditional anomaly detection techniques used in the energy system state estimators. In this paper, we demonstrate how FDI attacks can be constructed blindly, i.e., without system knowledge,
Anwar, Adnan +2 more
core +1 more source
Biometric Backdoors: A Poisoning Attack Against Unsupervised Template Updating
In this work, we investigate the concept of biometric backdoors: a template poisoning attack on biometric systems that allows adversaries to stealthily and effortlessly impersonate users in the long-term by exploiting the template update procedure.
Eberz, Simon +2 more
core +1 more source
Since Smart-Islands (SIs) with advanced cyber-infrastructure are incredibly vulnerable to cyber-attacks, increasing attention needs to be applied to their cyber-security.
Moslem Dehghani +6 more
doaj +1 more source
Local Cyber-physical Attack with Leveraging Detection in Smart Grid
A well-designed attack in the power system can cause an initial failure and then results in large-scale cascade failure. Several works have discussed power system attack through false data injection, line-maintaining attack, and line-removing attack ...
Chung, Hwei-Ming +4 more
core +1 more source
On False Data Injection Attack against Building Automation Systems
KNX is one popular communication protocol for a building automation system (BAS). However, its lack of security makes it subject to a variety of attacks. We are the first to study the false data injection attack against a KNX based BAS. We design a man-in-the-middle (MITM) attack to change the data from a temperature sensor and inject false data into ...
Michael Cash +7 more
openaire +2 more sources
False Data Injection Attacks Against Synchronization Systems in Microgrids [PDF]
Synchronization systems play a vital role in the day-to-day operation of power systems and their restoration after cascading failures. Hence, their resilience to cyberattacks is imperative. In this paper, we demonstrate that a well-planned false data injection attack against the synchronization system of a generator is capable of causing tripping ...
Amr S. Mohamed +3 more
openaire +1 more source
Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation
This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the ...
Lakshminarayana, Subhash +3 more
core +1 more source
Detection of False Data Injection Attacks Using the Autoencoder Approach [PDF]
6 pages, 5 figures, 1 table ...
Wang, C. (author) +3 more
openaire +3 more sources
Objective There is growing interest in evaluating new strategies to delay or prevent posttraumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury. Methods Participants with a history of
Kevin Kennedy +9 more
wiley +1 more source
False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang +3 more
core +1 more source

