A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future

M Ghiasi, T Niknam, Z Wang, M Mehrandezh… - Electric Power Systems …, 2023 - Elsevier
Due to the advancement in communication networks, metering and smart control systems,
as well as the prevalent use of Internet-based structures, new forms of power systems have …

Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges

MS Mahmoud, MM Hamdan, UA Baroudi - Neurocomputing, 2019 - Elsevier
Abstract Cyber Physical Systems (CPS) are almost everywhere; they can be accessed and
controlled remotely. These features make them more vulnerable to cyber attacks. Since …

Smo-dnn: Spider monkey optimization and deep neural network hybrid classifier model for intrusion detection

N Khare, P Devan, CL Chowdhary, S Bhattacharya… - Electronics, 2020 - mdpi.com
The enormous growth in internet usage has led to the development of different malicious
software posing serious threats to computer security. The various computational activities …

An overview on denial-of-service attacks in control systems: Attack models and security analyses

A Cetinkaya, H Ishii, T Hayakawa - Entropy, 2019 - mdpi.com
In this paper, we provide an overview of recent research efforts on networked control
systems under denial-of-service attacks. Our goal is to discuss the utility of different attack …

A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems

AM Mohan, N Meskin, H Mehrjerdi - Energies, 2020 - mdpi.com
Power systems are complex systems that have great importance to socio-economic
development due to the fact that the entire world relies on the electric network power supply …

A deep autoencoder trust model for mitigating jamming attack in IoT assisted by cognitive radio

MS Abdalzaher, M Elwekeil, T Wang… - IEEE Systems …, 2021 - ieeexplore.ieee.org
This article proposes deep learning (DL) framework constructed using deep autoencoder
(DAE) to detect the malicious nodes in an Internet of Things (IoT) network assisted by the …

Data offloading techniques through vehicular ad hoc networks: A survey

H Zhou, H Wang, X Chen, X Li, S Xu - IEEE Access, 2018 - ieeexplore.ieee.org
Recently, for satisfying users' various mobile Internet service requests for data exchange
anytime and anywhere even in their moving vehicles, the generated mobile data traffic has …

Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks

H Zhou, VCM Leung, C Zhu, S Xu… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we predict nodes' social contact patterns from the temporal perspective, and
propose a novel approach to improve the performance of data forwarding in opportunistic …

Reinforcement learning solution for cyber-physical systems security against replay attacks

Y Yu, W Yang, W Ding, J Zhou - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The security problem of state estimation plays a critical role in monitoring and managing
operation of cyber-physical systems (CPS). This paper considers the problem of network …

Robust and efficient energy harvested-aware routing protocol with clustering approach in body area networks

Z Ullah, I Ahmed, T Ali, N Ahmad, F Niaz, Y Cao - IEEE Access, 2019 - ieeexplore.ieee.org
Wireless body area network (WBAN) is one of the specialized branches of wireless sensor
networks (WSNs), which draws attention from various fields of science, such as medicine …