Results 221 to 230 of about 45,766 (284)
Data Poisoning Vulnerabilities Across Health Care Artificial Intelligence Architectures: Analytical Security Framework and Defense Strategies. [PDF]
Abtahi F +3 more
europepmc +1 more source
Mathematical modeling of adaptive information security strategies using composite behavior models. [PDF]
Nuaim AA, Nuaim AA, Nadeem M, Agrawal A.
europepmc +1 more source
Optimized ensemble machine learning model for cyberattack classification in industrial IoT. [PDF]
Alabdullah B, Sankaranarayanan S.
europepmc +1 more source
D3O-IIoT: deep reinforcement learning-driven dynamic deception orchestration for industrial IoT security. [PDF]
Wushishi U +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
False-Data-Injection Attacks on Remote Distributed Consensus Estimation
IEEE Transactions on Cybernetics, 2022This article studies a security issue in remote distributed consensus estimation where sensors transmit their measurements to remote estimators via a wireless communication network. The relative entropy is utilized as a stealthiness metric to detect whether the data transmitted through the wireless network are attacked.
Hao Liu, Ben Niu, Yuzhe Li
openaire +2 more sources
Distributed filtering under false data injection attacks
Automatica, 2019zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Wen +4 more
openaire +2 more sources
False Data Injection Attacks in Electricity Markets
2010 First IEEE International Conference on Smart Grid Communications, 2010We present a potential class of cyber attack, named false data injection attack, against the state estimation in deregulated electricity markets. With the knowledge of the system configuration, we show that such attacks will circumvent the bad data measurement detection equipped in present SCADA systems, and lead to profitable financial misconduct such
Le Xie, Yilin Mo, Bruno Sinopoli
openaire +1 more source
Secure distributed estimation against false data injection attack
Information Sciences, 2020Abstract With the development of wireless sensor networks, many distributed algorithms have been studied by researchers. This paper considers the situation of distributed estimation with false data injection (FDI) attack. Owing to the fact that Kullback-Leibler (KL) divergence is very effective to detect outliers caused by FDI attack, a distributed ...
Yi Hua +4 more
openaire +1 more source

