[HTML][HTML] Application of artificial immune systems in advanced manufacturing

R Pinto, G Gonçalves - Array, 2022 - Elsevier
In recent years, the application of Advanced Manufacturing Technologies (AMT) in industrial
processes represents the introduction of different Advanced Manufacturing Systems (AMS) …

A pattern mining-based false data injection attack detector for industrial cyber-physical systems

K Guibene, N Messai, M Ayaida… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The implication of cyber-physical systems into industrial processes has introduced some
security breaches due to the lack of security mechanisms. This article aims to come up with a …

Security state estimation for cyber-physical systems against DoS attacks via reinforcement learning and game theory

Z **, S Zhang, Y Hu, Y Zhang, C Sun - Actuators, 2022 - mdpi.com
This paper addressed the optimal policy selection problem of attacker and sensor in cyber-
physical systems (CPSs) under denial of service (DoS) attacks. Since the sensor and the …

Predicting global energy demand for the next decade: A time-series model using nonlinear autoregressive neural networks

Q Abu Al-Haija, O Mohamed… - Energy Exploration & …, 2023 - journals.sagepub.com
Energy demand forecasting has been an indispensable research target for academics,
which has led to creative solutions for energy utilities in terms of power system design …

Resilient countermeasures against Cyber-Attacks on Self-Driving car architecture

JM Qurashi, K Jambi, F Alsolami… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Self-driving cars, believed to be on track to become a seven trillion-dollar industry by 2050,
are likely to be a popular mode of transportation in the near future, as the technology …

Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing Through Modulated Synchronous Taxiing Approach

MR Kamaruzzaman, MD Hossain… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Apart from delay to flight arrivals, occurrence of ghost aircraft from ADS-B message injection
attack will also cause delay to the departure operations. Moreover, if attacks are designed …

Defense Policy Optimization with Linear Temporal Logic Specifications for Interconnected Networks

A Kazeminajafabadi, D Aksaray, M Imani - AIAA SciTech 2025 Forum, 2025 - arc.aiaa.org
The increasing interconnection of aerospace systems presents significant security
challenges. The protection of these systems must be achieved with minimal disruptions to …

Security viewpoint and resilient performance in the urban air mobility operation

R Hoffmann, DP Pereira… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
The rapid development of urban air mobility (UAM) technologies and their integration into
the urban environment brings new security challenges. Threats to aviation and mobility …

[PDF][PDF] A multiple case study of METI cybersecurity education and training: a basis for the development of a guiding framework for educational approaches

J Bacasdoon - 2021 - commons.wmu.se
A multiple case study of METI cybersecurity education and training: a basis for the development of
a guiding framework for educa Page 1 World Maritime University The Maritime Commons: Digital …

ATC level tactical manoeuvring during descent for mitigating impact of ADS-B message injection cyber attack

MR Kamaruzzaman, MD Hossain, Y Taenaka… - Engineering …, 2022 - mdpi.com
To reduce delays caused by an ADS-B Message Injection attack, we propose an Air Traffic
Control (ATC) level tactical manoeuvring framework for maintaining safe flight trajectories …