-
81
A Brief Overview of Optimal Robust Control Strategies for a Benchmark Power System with Different Cyberphysical Attacks
Published 2021-01-01“…Security issue against different attacks is the core topic of cyberphysical systems (CPSs). …”
Get full text
Article -
82
Methodology for detecting anomalies in cyber attack assessment data using Random Forest and Gradient Boosting in machine learning
Published 2024-10-01“…The process includes analyzing important metrics, visualizing solutions, evaluating the performance of each model, and analyzing error matrices for attack categories. Result. The Random Forest model showed an accuracy of about 94% when using the top 10 important features. …”
Get full text
Article -
83
Event-Triggered H∞ Filtering for Markovian Jump Neural Networks under Random Missing Measurements and Deception Attacks
Published 2020-01-01“…Furthermore, seeing that the communication networks are vulnerable to external malicious attacks, the transferred information via the shared communication network may be changed by the injected false information from the attackers. …”
Get full text
Article -
84
Online and Offline Identification of False Data Injection Attacks in Battery Sensors Using a Single Particle Model
Published 2024-01-01“…Throughout the batch simulations, the CUSUM algorithm detected attacks, with no false positives, in 99.83% of cases, identified the corrupted sensor in 97% of cases, and determined if the attack was positively or negatively biased in 97% of cases.…”
Get full text
Article -
85
Research on detection and defense methods for false data injection attacks in power systems based on state-space decomposition
Published 2025-07-01“…Abstract With increasing renewable energy integration, load frequency control (LFC) faces security risks from false data injection attacks (FDIAs). Existing detection methods struggle to distinguish control input attacks from measurement attacks, affecting system stability. …”
Get full text
Article -
86
Distributed adaptive event‐triggered fault‐tolerant cooperative control of multiple UAVs and UGVs under DoS attacks
Published 2024-11-01“…It is proven that the tracking errors are uniformly ultimately bounded by utilizing the Lyapunov function approach. …”
Get full text
Article -
87
Adaptive neural network event-triggered secure formation control of nonholonomic mobile robots subject to deception attacks
Published 2024-12-01“…It is proved that all closed-loop signals of controlled systems are bounded and the formation tracking errors converge a neighborhood of the origin in the presence of deception attacks. …”
Get full text
Article -
88
Detection of cyber attacks in electric vehicle charging systems using a remaining useful life generative adversarial network
Published 2025-03-01“…On the contrary, the GAN-CNN model displays the best overall performance concerning error consistency and variance explained. According to the results, integrating GAN into these architectures improves predictive accuracy and the model’s ability to identify potential attacks in advance and decreases error rates.…”
Get full text
Article -
89
Zero Trust Architecture for Electric Transportation Systems: A Systematic Survey and Deep Learning Framework for Replay Attack Detection
Published 2025-01-01“…The detection system analyzes the Error of Estimation using the IQR technique, demonstrating a 74.25% containment ratio and detecting deviations up to 2.39 units during attack scenarios. …”
Get full text
Article -
90
Neural networks-based event-triggered consensus control for nonlinear multiagent systems with communication link faults and DoS attacks
Published 2024-06-01“…This paper investigates the consensus control problem for a class of nonlinear multi-agent systems (MASs) with communication link faults and denial-of-service (DoS) attacks. First, considering simultaneously the communication link faults and DoS attacks, an adaptive event-triggered control strategy of MASs is proposed based on distributed adjacency error signals, and the avoidance of the Zeno phenomenon is analyzed. …”
Get full text
Article -
91
Secure performance analysis and pilot spoofing attack detection in cell-free massive MIMO systems with finite-resolution ADCs
Published 2022-01-01“…To degrade the impacts of the pilot spoofing attack, an active attack detection approach based on random matrix theory is proposed which can only be operated at one access point. …”
Get full text
Article -
92
OT-PCA: New Key-Recovery Plaintext-Checking Oracle Based Side-Channel Attacks on HQC with Offline Templates
Published 2024-12-01“… In this paper, we introduce OT-PCA, a novel approach for conducting Plaintext-Checking (PC) oracle based side-channel attacks, specifically designed for Hamming Quasi-Cyclic (HQC). …”
Get full text
Article -
93
Defending Against the Homodyne Detector-Blinding Attack on Continuous-Variable Quantum Key Distribution Using an Adjustable Optical Attenuator
Published 2025-06-01“…In this paper, we propose a countermeasure for the homodyne detector-blinding attack by using an adjustable optical attenuator with a feedback structure. …”
Get full text
Article -
94
Control Conditions for Equal Power Sharing in Multi-Area Power Systems for Resilience Against False Data Injection Attacks
Published 2024-11-01“…Third, a robust adaptive sliding mode observer is used to accurately assess the state of the MAPS to handle state errors robustly and automatically adjust parameters for identifying FDI attacks and load changes. …”
Get full text
Article -
95
Event-Triggered Secure Control Design Against False Data Injection Attacks via Lyapunov-Based Neural Networks
Published 2025-06-01“…A Lyapunov-based stability analysis is conducted, and linear matrix inequality (LMI) conditions are formulated to guarantee the boundedness of estimation and system errors, as well as to determine the triggering threshold used in the event-triggered mechanism. …”
Get full text
Article -
96
Enhancing Security of Error Correction in Quantum Key Distribution Using Tree Parity Machine Update Rule Randomization
Published 2025-07-01“…This paper presents a novel approach to enhancing the security of error correction in quantum key distribution by introducing randomization into the update rule of Tree Parity Machines. …”
Get full text
Article -
97
Secure Cryptographic Key Encapsulation and Recovery Scheme in Noisy Network Conditions
Published 2025-03-01“…Its novel error-correcting strategy efficiently corrects 20 to 23 bits of errors promptly, eliminating the need for redundant helper data and fuzzy extractors. …”
Get full text
Article -
98
Predictable Paths: Novel ASLR Bypass Methods and Mitigations
Published 2025-01-01“…These techniques negate ASLR’s protections and allow the attack surface for ROP to be expanded, to include Kernel32.dll, Kernelbase.dll, and NTDLL.dll. …”
Get full text
Article -
99
Real-time implementation of nonlinear model predictive control for high angle of attack Maneuvers in fighter aircrafts using deep learning
Published 2024-12-01“…Since not all the states of the system are measured, we also combine the deep learning based NMPC approach with an unscented Kalman filter (UKF) as well as show how this scheme can be easily modified to be offset-free (i.e. remove steady-state error due to persistent disturbances and modelling error). …”
Get full text
Article -
100
MF‐RF: A detection approach based on multi‐features and random forest algorithm for improved collusive interest flooding attack
Published 2023-05-01“…Abstract A new type of Collusive Interest Flooding Attack (CIFA), Improved Collusive Interest Flooding Attack (I‐CIFA), which originates from CIFA with a stronger concealment, higher attack effect, lower attack cost, and wider attack range in Named Data Networking (NDN). …”
Get full text
Article