Security of networked control systems subject to deception attacks: A survey
ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …
utilising communication networks, is a complex intelligent control system with high flexibility …
A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems
Potential malicious cyber-attacks to power systems which are connected to a wide range of
stakeholders from the top to tail will impose significant societal risks and challenges. The …
stakeholders from the top to tail will impose significant societal risks and challenges. The …
Explainable artificial intelligence in cybersecurity: A survey
Nowadays, Artificial Intelligence (AI) is widely applied in every area of human being's daily
life. Despite the AI benefits, its application suffers from the opacity of complex internal …
life. Despite the AI benefits, its application suffers from the opacity of complex internal …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Fixed-time resilient edge-triggered estimation and control of surface vehicles for cooperative target tracking under attacks
This paper is concerned with the cooperative target tracking of under-actuated unmanned
surface vehicles (USVs) with event-triggered communications subject to denial-of-service …
surface vehicles (USVs) with event-triggered communications subject to denial-of-service …
A general safety-certified cooperative control architecture for interconnected intelligent surface vehicles with applications to vessel train
This paper considers cooperative control of interconnected intelligent surface vehicles (ISV)
moving in a complex water surface containing multiple static/dynamic obstacles. Each ISV is …
moving in a complex water surface containing multiple static/dynamic obstacles. Each ISV is …
Intrusion detection in iot using deep learning
AM Banaamah, I Ahmad - Sensors, 2022 - mdpi.com
Cybersecurity has been widely used in various applications, such as intelligent industrial
systems, homes, personal devices, and cars, and has led to innovative developments that …
systems, homes, personal devices, and cars, and has led to innovative developments that …
Graph neural networks for intrusion detection: A survey
T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …
Event detection in online social network: Methodologies, state-of-art, and evolution
Online social network such as Twitter, Facebook and Instagram are increasingly becoming
the go-to medium for users to acquire information and discuss what is happening globally …
the go-to medium for users to acquire information and discuss what is happening globally …
A review of anomaly detection strategies to detect threats to cyber-physical systems
N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …
components. CPS has experienced rapid growth over the past decade in fields as disparate …