Showing 81 - 100 results of 416 for search 'error attacks', query time: 0.09s Refine Results
  1. 81

    A Brief Overview of Optimal Robust Control Strategies for a Benchmark Power System with Different Cyberphysical Attacks by Bo Hu, Hao Wang, Yan Zhao, Hang Zhou, Mingkun Jiang, Mofan Wei

    Published 2021-01-01
    “…Security issue against different attacks is the core topic of cyberphysical systems (CPSs). …”
    Get full text
    Article
  2. 82

    Methodology for detecting anomalies in cyber attack assessment data using Random Forest and Gradient Boosting in machine learning by A. S. Kechedzhiev, O. L. Tsvetkova, A. I. Dubrovina

    Published 2024-10-01
    “…The process includes analyzing important metrics, visualizing solutions, evaluating the performance of each model, and analyzing error matrices for attack categories. Result. The Random Forest model showed an accuracy of about 94% when using the top 10 important features. …”
    Get full text
    Article
  3. 83

    Event-Triggered H∞ Filtering for Markovian Jump Neural Networks under Random Missing Measurements and Deception Attacks by Jinxia Wang, Jinfeng Gao, Tian Tan, Jiaqi Wang, Miao Ma

    Published 2020-01-01
    “…Furthermore, seeing that the communication networks are vulnerable to external malicious attacks, the transferred information via the shared communication network may be changed by the injected false information from the attackers. …”
    Get full text
    Article
  4. 84

    Online and Offline Identification of False Data Injection Attacks in Battery Sensors Using a Single Particle Model by Victoria A. O'Brien, Vittal S. Rao, Rodrigo D. Trevizan

    Published 2024-01-01
    “…Throughout the batch simulations, the CUSUM algorithm detected attacks, with no false positives, in 99.83% of cases, identified the corrupted sensor in 97% of cases, and determined if the attack was positively or negatively biased in 97% of cases.…”
    Get full text
    Article
  5. 85

    Research on detection and defense methods for false data injection attacks in power systems based on state-space decomposition by Chao Hong, Zhihong Liang, Yiwei Yang, Pandeng Li, Lin Chen, Leyi Bi, Yunan Zhang

    Published 2025-07-01
    “…Abstract With increasing renewable energy integration, load frequency control (LFC) faces security risks from false data injection attacks (FDIAs). Existing detection methods struggle to distinguish control input attacks from measurement attacks, affecting system stability. …”
    Get full text
    Article
  6. 86

    Distributed adaptive event‐triggered fault‐tolerant cooperative control of multiple UAVs and UGVs under DoS attacks by Shangkun Liu, Bin Jiang, Zehui Mao, Youmin Zhang

    Published 2024-11-01
    “…It is proven that the tracking errors are uniformly ultimately bounded by utilizing the Lyapunov function approach. …”
    Get full text
    Article
  7. 87

    Adaptive neural network event-triggered secure formation control of nonholonomic mobile robots subject to deception attacks by Kai Wang, Wei Wu, Shaocheng Tong

    Published 2024-12-01
    “…It is proved that all closed-loop signals of controlled systems are bounded and the formation tracking errors converge a neighborhood of the origin in the presence of deception attacks. …”
    Get full text
    Article
  8. 88

    Detection of cyber attacks in electric vehicle charging systems using a remaining useful life generative adversarial network by Hayriye Tanyıldız, Canan Batur Şahin, Özlem Batur Dinler, Hazem Migdady, Kashif Saleem, Aseel Smerat, Amir H. Gandomi, Laith Abualigah

    Published 2025-03-01
    “…On the contrary, the GAN-CNN model displays the best overall performance concerning error consistency and variance explained. According to the results, integrating GAN into these architectures improves predictive accuracy and the model’s ability to identify potential attacks in advance and decreases error rates.…”
    Get full text
    Article
  9. 89

    Zero Trust Architecture for Electric Transportation Systems: A Systematic Survey and Deep Learning Framework for Replay Attack Detection by Grace Muriithi, Behnaz Papari, Ali Arsalan, Laxman Timilsina, Alex Muriithi, Elutunji Buraimoh, Asif Khan, Gokhan Ozkan, Christopher Edrington, Akram Papari

    Published 2025-01-01
    “…The detection system analyzes the Error of Estimation using the IQR technique, demonstrating a 74.25% containment ratio and detecting deviations up to 2.39 units during attack scenarios. …”
    Get full text
    Article
  10. 90

    Neural networks-based event-triggered consensus control for nonlinear multiagent systems with communication link faults and DoS attacks by Yanming Wu, Zelun Wang, Guanglei Meng, Jinguo Liu

    Published 2024-06-01
    “…This paper investigates the consensus control problem for a class of nonlinear multi-agent systems (MASs) with communication link faults and denial-of-service (DoS) attacks. First, considering simultaneously the communication link faults and DoS attacks, an adaptive event-triggered control strategy of MASs is proposed based on distributed adjacency error signals, and the avoidance of the Zeno phenomenon is analyzed. …”
    Get full text
    Article
  11. 91

    Secure performance analysis and pilot spoofing attack detection in cell-free massive MIMO systems with finite-resolution ADCs by Xianyu Zhang, Xiaoqiang Qiao, Tao Liang, Kang An

    Published 2022-01-01
    “…To degrade the impacts of the pilot spoofing attack, an active attack detection approach based on random matrix theory is proposed which can only be operated at one access point. …”
    Get full text
    Article
  12. 92

    OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates by Haiyue Dong, Qian Guo

    Published 2024-12-01
    “… In this paper, we introduce OT-PCA, a novel approach for conducting Plaintext-Checking (PC) oracle based side-channel attacks, specifically designed for Hamming Quasi-Cyclic (HQC). …”
    Get full text
    Article
  13. 93

    Defending Against the Homodyne Detector-Blinding Attack on Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Attenuator by Yijun Wang, Yanyan Li, Wenqi Jiang, Ying Guo

    Published 2025-06-01
    “…In this paper, we propose a countermeasure for the homodyne detector-blinding attack by using an adjustable optical attenuator with a feedback structure. …”
    Get full text
    Article
  14. 94

    Control Conditions for Equal Power Sharing in Multi-Area Power Systems for Resilience Against False Data Injection Attacks by Zahoor Ahmed, Muhammad Nasir, Deema Mohammed Alsekait, Muhammad Zohaib Hassan Shah, Diaa Salama AbdElminaam, Furqan Ahmad

    Published 2024-11-01
    “…Third, a robust adaptive sliding mode observer is used to accurately assess the state of the MAPS to handle state errors robustly and automatically adjust parameters for identifying FDI attacks and load changes. …”
    Get full text
    Article
  15. 95

    Event-Triggered Secure Control Design Against False Data Injection Attacks via Lyapunov-Based Neural Networks by Neslihan Karas Kutlucan, Levent Ucun, Janset Dasdemir

    Published 2025-06-01
    “…A Lyapunov-based stability analysis is conducted, and linear matrix inequality (LMI) conditions are formulated to guarantee the boundedness of estimation and system errors, as well as to determine the triggering threshold used in the event-triggered mechanism. …”
    Get full text
    Article
  16. 96

    Enhancing Security of Error Correction in Quantum Key Distribution Using Tree Parity Machine Update Rule Randomization by Bartłomiej Gdowski, Miralem Mehic, Marcin Niemiec

    Published 2025-07-01
    “…This paper presents a novel approach to enhancing the security of error correction in quantum key distribution by introducing randomization into the update rule of Tree Parity Machines. …”
    Get full text
    Article
  17. 97

    Secure Cryptographic Key Encapsulation and Recovery Scheme in Noisy Network Conditions by Dina Ghanai Miandoab, Michael Logan Garrett, Mahafujul Alam, Saloni Jain, Sareh Assiri, Bertrand Cambou

    Published 2025-03-01
    “…Its novel error-correcting strategy efficiently corrects 20 to 23 bits of errors promptly, eliminating the need for redundant helper data and fuzzy extractors. …”
    Get full text
    Article
  18. 98

    Predictable Paths: Novel ASLR Bypass Methods and Mitigations by Bramwell Brizendine, Bhaskar P. Rimal

    Published 2025-01-01
    “…These techniques negate ASLR’s protections and allow the attack surface for ROP to be expanded, to include Kernel32.dll, Kernelbase.dll, and NTDLL.dll. …”
    Get full text
    Article
  19. 99

    Real-time implementation of nonlinear model predictive control for high angle of attack Maneuvers in fighter aircrafts using deep learning by Muhammad Faheem Manzoor, Joel A. Paulson, Yasir Awais Butt, Fazal-ur Rehman, Aamer Iqbal Bhatti

    Published 2024-12-01
    “…Since not all the states of the system are measured, we also combine the deep learning based NMPC approach with an unscented Kalman filter (UKF) as well as show how this scheme can be easily modified to be offset-free (i.e. remove steady-state error due to persistent disturbances and modelling error). …”
    Get full text
    Article
  20. 100

    MF‐RF: A detection approach based on multi‐features and random forest algorithm for improved collusive interest flooding attack by Meng Yue, Silin Peng, Wenzhi Feng

    Published 2023-05-01
    “…Abstract A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data Networking (NDN). …”
    Get full text
    Article