Results 221 to 230 of about 46,655 (287)
Quantum-aware secure blockchain intrusion detection system for industrial IoT networks. [PDF]
Hussain N +4 more
europepmc +1 more source
Hybrid GNN-LSTM defense with differential privacy and secure multi-party computation for edge-optimized neuromorphic autonomous systems. [PDF]
Rekik S, Mehmood S.
europepmc +1 more source
Sensor-Based Cyber Risk Management in Railway Infrastructure Under the NIS2 Directive. [PDF]
Wachnik R, Chruzik K, Pochopień B.
europepmc +1 more source
Dataset of SCADA traffic captures from a medical waste incinerator with injected cyberattacks. [PDF]
Al-Duwairi B +3 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
False-Data-Injection Attacks on Remote Distributed Consensus Estimation
IEEE Transactions on Cybernetics, 2022This article studies a security issue in remote distributed consensus estimation where sensors transmit their measurements to remote estimators via a wireless communication network. The relative entropy is utilized as a stealthiness metric to detect whether the data transmitted through the wireless network are attacked.
Hao Liu, Ben Niu, Yuzhe Li
openaire +2 more sources
Distributed filtering under false data injection attacks
Automatica, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Wen +4 more
openaire +2 more sources

