Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems
Potential malicious cyber-attacks to power systems which are connected to a wide range of
stakeholders from the top to tail will impose significant societal risks and challenges. The …
stakeholders from the top to tail will impose significant societal risks and challenges. The …
Review of cyberattack implementation, detection, and mitigation methods in cyber-physical systems
With the rapid proliferation of cyber-physical systems (CPSs) in various sectors, including
critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing …
critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing …
A survey on attack detection, estimation and control of industrial cyber–physical systems
Cyber–physical systems (CPSs) are complex systems that involve technologies such as
control, communication, and computing. Nowadays, CPSs have a wide range of applications …
control, communication, and computing. Nowadays, CPSs have a wide range of applications …
Generalized graph neural network-based detection of false data injection attacks in smart grids
False data injection attacks (FDIAs) pose a significant threat to smart power grids. Recent
efforts have focused on develo** machine learning (ML)-based defense strategies against …
efforts have focused on develo** machine learning (ML)-based defense strategies against …
Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning
Smart Grid uses electricity and information flows to set up a highly developed, fully
automated, and distributed electricity grid system. To identify the reliability of work and …
automated, and distributed electricity grid system. To identify the reliability of work and …
Covert attack detection for LFC systems of electric vehicles: A dual time-varying coding method
Z Wu, E Tian, H Chen - IEEE/ASME Transactions on …, 2022 - ieeexplore.ieee.org
In recent years, electric vehicles (EVs) have been widely used due to their remarkable
decrease in carbon emissions and gasoline consumption. When the EVs are incorporated …
decrease in carbon emissions and gasoline consumption. When the EVs are incorporated …
Kullback–Leibler divergence-based optimal stealthy sensor attack against networked linear quadratic Gaussian systems
This article concentrates on designing optimal stealthy attack strategies for cyber-physical
systems (CPSs) modeled by the linear quadratic Gaussian (LQG) dynamics, where the …
systems (CPSs) modeled by the linear quadratic Gaussian (LQG) dynamics, where the …
A stream learning approach for real-time identification of false data injection attacks in cyber-physical power systems
This paper presents a novel data-driven framework to aid in system state estimation when
the power system is under unobservable false data injection attacks. The proposed …
the power system is under unobservable false data injection attacks. The proposed …
Cyber attack detection and isolation for a quadrotor UAV with modified sliding innovation sequences
Common vulnerabilities in typical intelligent cyber-physical systems such as unmanned
aerial vehicles (UAVs) can be easily exploited by cyber attackers to cause serious accidents …
aerial vehicles (UAVs) can be easily exploited by cyber attackers to cause serious accidents …
End-edge-cloud collaboration-based false data injection attack detection in distribution networks
False data injection attack (FDIA) can pose a severe threat to the distribution networks (DN),
and the accurate detection of FDIA plays a key role in the safe and reliable operation of the …
and the accurate detection of FDIA plays a key role in the safe and reliable operation of the …