Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A review of anomaly detection strategies to detect threats to cyber-physical systems
N Jeffrey, Q Tan, JR Villar - Electronics, 2023 - mdpi.com
Cyber-Physical Systems (CPS) are integrated systems that combine software and physical
components. CPS has experienced rapid growth over the past decade in fields as disparate …
components. CPS has experienced rapid growth over the past decade in fields as disparate …
Cybersecurity of autonomous vehicles: A systematic literature review of adversarial attacks and defense models
Autonomous driving (AD) has developed tremendously in parallel with the ongoing
development and improvement of deep learning (DL) technology. However, the uptake of …
development and improvement of deep learning (DL) technology. However, the uptake of …
Cyber resilience of power electronics-enabled power systems: A review
The demand for carbon neutrality leads to the transition from traditional synchronous
generator-based power systems to power electronics-enabled power systems. The …
generator-based power systems to power electronics-enabled power systems. The …
[HTML][HTML] Threat modeling of industrial control systems: A systematic literature review
Threat modeling is the process of identifying and mitigating potential threats to a system. It
was originally developed to enhance software security during the design phase but has …
was originally developed to enhance software security during the design phase but has …
Evaluation framework for electric vehicle security risk assessment
Electric Vehicles (EVs) seem promising for future transportation to solve environmental
concerns and energy management problems. According to Reuters, global car makers plan …
concerns and energy management problems. According to Reuters, global car makers plan …
Post-accident cyberattack event analysis for connected and automated vehicles
Smart mobility is an imperative facet of smart cities, and the transition of conventional
automotive systems to connected and automated vehicles (CAVs) is envisioned as one of …
automotive systems to connected and automated vehicles (CAVs) is envisioned as one of …
[HTML][HTML] A comprehensive survey of cyberattacks on EVs: Research domains, attacks, defensive mechanisms, and verification methods
With the continuous development of transportation electrification, the cybersecurity of energy
infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool …
infrastructure has become increasingly prominent. Explicitly, EVs resemble a significant tool …
Study of smart grid cyber-security, examining architectures, communication networks, cyber-attacks, countermeasure techniques, and challenges
Smart Grid (SG) technology utilizes advanced network communication and monitoring
technologies to manage and regulate electricity generation and transport. However, this …
technologies to manage and regulate electricity generation and transport. However, this …
Impact of cyber-attacks on EV charging coordination: The case of single point of failure
Expanding adoption of electric vehicles (EVs) and broad deployment of charging stations
push the limits of distribution grid infrastructure and increase the importance of effective …
push the limits of distribution grid infrastructure and increase the importance of effective …
On TinyML and cybersecurity: Electric vehicle charging infrastructure use case
As technology advances, the use of Machine Learning (ML) in cybersecurity is becoming
increasingly crucial to tackle the growing complexity of cyber threats. While traditional ML …
increasingly crucial to tackle the growing complexity of cyber threats. While traditional ML …