Secure Output-Feedback Control of Transportation Cyber-Physical Systems for Emergency Medical Services Under Stealthy Attacks
The rapid integration of cyber-physical systems (CPS) in urban transportation networks has
revolutionized emergency medical services (EMS), enhancing response time and resource …
revolutionized emergency medical services (EMS), enhancing response time and resource …
Intrusion Detection for Cyber-Physical Systems and IoT Devices using Hybrid Deep Learning Algorithm
Many vital assets are increasingly using cyber-physical systems (CPSs), making the
detection of attacks on these systems crucial. CPSs and other domains like the Internet of …
detection of attacks on these systems crucial. CPSs and other domains like the Internet of …
Corrections to “Comparison and Investigation of AI-Based Approaches for Cyberattack Detection in Cyber-Physical Systems”
Corrections to “Comparison and Investigation of AI-Based Approaches for Cyberattack Detection in
Cyber-Physical Systems” | IEEE Journals & Magazine | IEEE Xplore Corrections to “Comparison …
Cyber-Physical Systems” | IEEE Journals & Magazine | IEEE Xplore Corrections to “Comparison …
Score and You Shall Find: A Novel Regularization Technique for Cyberattack Detection in Industrial Control Systems
T Oba, T Taniguchi, N Yanai - Proceedings of the 2024 Workshop on Re …, 2023 - dl.acm.org
In recent years, countermeasures against cyberattacks on industrial control systems (ICSs)
has included the use of machine learning models for their detection. However, the efficacy of …
has included the use of machine learning models for their detection. However, the efficacy of …
Tekoälypohjaisten uhkien vaikutus tietojärjestelmiin ja niiden torjunta
E Malvela - 2025 - jyx.jyu.fi
Tekoälyä integroitaessa kyberturvallisuuteen tuodaan esiin sekä ainutlaatuisia
mahdollisuuksia että merkittäviä haasteita tietojärjestelmien suojaamisessa. Tässä …
mahdollisuuksia että merkittäviä haasteita tietojärjestelmien suojaamisessa. Tässä …
[CITATION][C] Exploring the Relationship Between Cybersecurity Knowledge and HR Laws: A Practical Perspective
S Malik, D Boneh