Results 41 to 50 of about 46,655 (287)

False Data Injection Attacks on Phasor Measurements That Bypass Low-rank Decomposition

open access: yes, 2017
This paper studies the vulnerability of phasor measurement units (PMUs) to false data injection (FDI) attacks. Prior work demonstrated that unobservable FDI attacks that can bypass traditional bad data detectors based on measurement residuals can be ...
Chu, Zhigang   +3 more
core   +1 more source

PMU Placement in Electric Transmission Networks for Reliable State Estimation against False Data Injection Attacks [PDF]

open access: yes, 2017
Currently the false data injection (FDI) attack bring direct challenges in synchronized phase measurement unit (PMU) based network state estimation in wide-area measurement system (WAMS), resulting in degraded system reliability and power supply security.
Hao, W   +5 more
core   +1 more source

A Novel Diagnosis Scheme against Collusive False Data Injection Attack

open access: yesSensors, 2023
The collusive false data injection attack (CFDIA) is a false data injection attack (FIDA), in which false data are injected in a coordinated manner into some adjacent pairs of captured nodes of an attacked wireless sensor network (WSN). As a result, the defense of WSN against a CFDIA is much more difficult than defense against ordinary FDIA. This paper
Jiamin Hu, Xiaofan Yang, Luxing Yang
openaire   +3 more sources

Energy Market Manipulation via False-Data Injection Attacks: A Review

open access: yesIEEE Access
Locational Marginal Prices (LMPs) are critical indicators in modern energy markets, representing the cost of delivering electricity at specific locations while considering the generation and transmission constraints.
Ghadeer O. Alsharif   +2 more
doaj   +1 more source

Applying an Ethical Lens to the Treatment of People With Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT The practice of neurology requires an understanding of clinical ethics for decision‐making. In multiple sclerosis (MS) care, there are a wide range of ethical considerations that may arise. These involve shared decision‐making around selection of a disease‐modifying therapy (DMT), risks and benefits of well‐studied medications in comparison to
Methma Udawatta, Farrah J. Mateen
wiley   +1 more source

HYBRID INTRUSION DETECTION SYSTEM USING FUZZY LOGIC INFERENCE ENGINE FOR SQL INJECTION ATTACK

open access: yesJurnal Ilmiah Kursor: Menuju Solusi Teknologi Informasi, 2018
SQL injection attacks toward web application increasingly prevalent. Testing to the web that will published is the one of preventive measures. However, this method sometimes ineffective because constrained by various things. Instrusion detection system (
Rajif Agung Yunmar
doaj   +1 more source

Detection-based active defense of biased injection attack based on robust adaptive controller

open access: yesInternet of Things and Cyber-Physical Systems, 2023
As the promising technology, the cooperative cyber-physical system can enhance the operating efficiency and reliability of smart grids. Meanwhile, the characteristics that deep integration of cyber-physical system can make smart grid face new security ...
Xinyu Wang   +3 more
doaj   +1 more source

Gotta Catch 'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks

open access: yes, 2020
Deep neural networks (DNN) are known to be vulnerable to adversarial attacks. Numerous efforts either try to patch weaknesses in trained models, or try to make it difficult or costly to compute adversarial examples that exploit them.
Li, Bo   +5 more
core   +1 more source

Preferences for post‐traumatic osteoarthritis prevention strategies in individuals with anterior cruciate ligament injury

open access: yesArthritis Care &Research, Accepted Article.
Objectives There is growing interest in evaluating new strategies to delay or prevent post‐traumatic osteoarthritis (PTOA) in individuals who have sustained anterior cruciate ligament (ACL) injury. This study sought to determine characteristics of potential treatments that are acceptable to patients with ACL injury.
Kevin Kennedy   +9 more
wiley   +1 more source

Efficient detection of false data injection attack with invertible automatic encoder and long-short-term memory

open access: yesIET Cyber-Physical Systems, 2019
The false data injection attack can tamper with the measurement information collected by the Supervisory Control and Data Acquisition, threat the security of state estimation. Therefore, the analysing methods and detection methods of false data injection
Yuancheng Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy