A systematic review of cyber-resilience assessment frameworks
Cyber-attacks are regarded as one of the most serious threats to businesses worldwide.
Organizations dependent on Information Technology (IT) derive value not only from …
Organizations dependent on Information Technology (IT) derive value not only from …
Cooperative control for cyber–physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks
The paper discusses the cooperative tracking problem of partially known cyber–physical
multi-agent networked systems. In this system, there exist two cascaded chances for cyber …
multi-agent networked systems. In this system, there exist two cascaded chances for cyber …
Adversarial attacks and defenses on cyber–physical systems: A survey
Cyber-security issues on adversarial attacks are actively studied in the field of computer
vision with the camera as the main sensor source to obtain the input image or video data …
vision with the camera as the main sensor source to obtain the input image or video data …
Secure control design for nonlinear cyber–physical systems under DoS, replay, and deception cyber-attacks with multiple transmission channels
This paper introduces the state-/output-feedback control for multi-channel nonlinear cyber–
physical systems (CPSs). Many cyber-attacks are considered such as Denial-of-Service …
physical systems (CPSs). Many cyber-attacks are considered such as Denial-of-Service …
Robust cooperative control strategy for a platoon of connected and autonomous vehicles against sensor errors and control errors simultaneously in a real-world …
In a real-world driving environment, a platoon of connected and autonomous vehicles
(CAVs) is subject to many internal and external disturbances, resulting in uncertain vehicle …
(CAVs) is subject to many internal and external disturbances, resulting in uncertain vehicle …
Robust control strategy for platoon of connected and autonomous vehicles considering falsified information injected through communication links
Abstract Connected and Autonomous Vehicles (CAVs) in a platoon can exchange real-time
information using Vehicle-to-Vehicle (V2V) communication technology to enhance platoon …
information using Vehicle-to-Vehicle (V2V) communication technology to enhance platoon …
Resilient control of cyber‐physical systems using adaptive super‐twisting observer
In this work, the problem of online secure state estimation and attack reconstruction in the
face of offensives that corrupt the sensor measurements and modify the actuator commands …
face of offensives that corrupt the sensor measurements and modify the actuator commands …
Finite-time stability under denial of service
Finite-time stability (FTS) of networked control systems under denial-of-service (DoS) attacks
are investigated in this article, where the communication between the plant and the …
are investigated in this article, where the communication between the plant and the …
Active machine learning adversarial attack detection in the user feedback process
Modern Information and Communication Technology (ICT)-based applications utilize current
technological advancements for purposes of streaming data, as a way of adapting to the …
technological advancements for purposes of streaming data, as a way of adapting to the …
Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things
The performance of Artificial Intelligence (AI) systems reaches or even exceeds that of
humans in an increasing number of complicated tasks. Highly effective non-linear AI models …
humans in an increasing number of complicated tasks. Highly effective non-linear AI models …