Security of networked control systems subject to deception attacks: A survey

ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …

A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems

D Du, M Zhu, X Li, M Fei, S Bu, L Wu… - Journal of Modern …, 2022 - ieeexplore.ieee.org
Potential malicious cyber-attacks to power systems which are connected to a wide range of
stakeholders from the top to tail will impose significant societal risks and challenges. The …

Explainable artificial intelligence in cybersecurity: A survey

N Capuano, G Fenza, V Loia, C Stanzione - Ieee Access, 2022 - ieeexplore.ieee.org
Nowadays, Artificial Intelligence (AI) is widely applied in every area of human being's daily
life. Despite the AI benefits, its application suffers from the opacity of complex internal …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Fixed-time resilient edge-triggered estimation and control of surface vehicles for cooperative target tracking under attacks

S Gao, Z Peng, L Liu, D Wang… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
This paper is concerned with the cooperative target tracking of under-actuated unmanned
surface vehicles (USVs) with event-triggered communications subject to denial-of-service …

A general safety-certified cooperative control architecture for interconnected intelligent surface vehicles with applications to vessel train

W Wu, Z Peng, L Liu, D Wang - IEEE Transactions on Intelligent …, 2022 - ieeexplore.ieee.org
This paper considers cooperative control of interconnected intelligent surface vehicles (ISV)
moving in a complex water surface containing multiple static/dynamic obstacles. Each ISV is …

Intrusion detection in iot using deep learning

AM Banaamah, I Ahmad - Sensors, 2022 - mdpi.com
Cybersecurity has been widely used in various applications, such as intelligent industrial
systems, homes, personal devices, and cars, and has led to innovative developments that …

Graph neural networks for intrusion detection: A survey

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …

Event detection in online social network: Methodologies, state-of-art, and evolution

X Hu, W Ma, C Chen, S Wen, J Zhang, Y **ang… - Computer Science …, 2022 - Elsevier
Online social network such as Twitter, Facebook and Instagram are increasingly becoming
the go-to medium for users to acquire information and discuss what is happening globally …

A review of anomaly detection strategies to detect threats to cyber-physical systems

N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …