A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future
Due to the advancement in communication networks, metering and smart control systems,
as well as the prevalent use of Internet-based structures, new forms of power systems have …
as well as the prevalent use of Internet-based structures, new forms of power systems have …
Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges
Abstract Cyber Physical Systems (CPS) are almost everywhere; they can be accessed and
controlled remotely. These features make them more vulnerable to cyber attacks. Since …
controlled remotely. These features make them more vulnerable to cyber attacks. Since …
Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection
The enormous growth in internet usage has led to the development of different malicious
software posing serious threats to computer security. The various computational activities …
software posing serious threats to computer security. The various computational activities …
An overview on denial-of-service attacks in control systems: Attack models and security analyses
In this paper, we provide an overview of recent research efforts on networked control
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …
A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems
Power systems are complex systems that have great importance to socio-economic
development due to the fact that the entire world relies on the electric network power supply …
development due to the fact that the entire world relies on the electric network power supply …
A deep autoencoder trust model for mitigating jamming attack in IoT assisted by cognitive radio
This article proposes deep learning (DL) framework constructed using deep autoencoder
(DAE) to detect the malicious nodes in an Internet of Things (IoT) network assisted by the …
(DAE) to detect the malicious nodes in an Internet of Things (IoT) network assisted by the …
Data offloading techniques through vehicular ad hoc networks: A survey
Recently, for satisfying users' various mobile Internet service requests for data exchange
anytime and anywhere even in their moving vehicles, the generated mobile data traffic has …
anytime and anywhere even in their moving vehicles, the generated mobile data traffic has …
Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks
In this paper, we predict nodes' social contact patterns from the temporal perspective, and
propose a novel approach to improve the performance of data forwarding in opportunistic …
propose a novel approach to improve the performance of data forwarding in opportunistic …
Reinforcement learning solution for cyber-physical systems security against replay attacks
Y Yu, W Yang, W Ding, J Zhou - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The security problem of state estimation plays a critical role in monitoring and managing
operation of cyber-physical systems (CPS). This paper considers the problem of network …
operation of cyber-physical systems (CPS). This paper considers the problem of network …
Robust and efficient energy harvested-aware routing protocol with clustering approach in body area networks
Wireless body area network (WBAN) is one of the specialized branches of wireless sensor
networks (WSNs), which draws attention from various fields of science, such as medicine …
networks (WSNs), which draws attention from various fields of science, such as medicine …