A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems
Potential malicious cyber-attacks to power systems which are connected to a wide range of
stakeholders from the top to tail will impose significant societal risks and challenges. The …
stakeholders from the top to tail will impose significant societal risks and challenges. The …
Trust and reputation in the internet of things: State-of-the-art and research challenges
This paper deals with the principal aspects emerging from the application of trust techniques
to the IoT domains with respect to the particular viewpoint of an IoT environment. We …
to the IoT domains with respect to the particular viewpoint of an IoT environment. We …
A survey on model-based distributed control and filtering for industrial cyber-physical systems
Industrial cyber-physical systems (CPSs) are large-scale, geographically dispersed, and life-
critical systems, in which lots of sensors and actuators are embedded and networked …
critical systems, in which lots of sensors and actuators are embedded and networked …
Security control for T–S fuzzy systems with adaptive event-triggered mechanism and multiple cyber-attacks
This article focuses on the security control for Takagi-Sugeno (TS) fuzzy systems with
adaptive event-triggered mechanism (AETM) and multiple cyber-attacks, which include …
adaptive event-triggered mechanism (AETM) and multiple cyber-attacks, which include …
Multi-agent systems and complex networks: Review and applications in systems engineering
Systems engineering is an ubiquitous discipline of Engineering overlap** industrial,
chemical, mechanical, manufacturing, control, software, electrical, and civil engineering. It …
chemical, mechanical, manufacturing, control, software, electrical, and civil engineering. It …
Energy-aware geographic routing for real-time workforce monitoring in industrial informatics
AK Sangaiah, AS Rostami… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Workforce monitoring is a vital activity in large factories in order to oversee the worker's
concentration on their duty and increase productivity. Workforces are kind of moving targets …
concentration on their duty and increase productivity. Workforces are kind of moving targets …
Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks
To improve the data arrival ratio and the transmission delay and considering that the
capacity for determining malicious nodes and energy are limited, a security disjoint routing …
capacity for determining malicious nodes and energy are limited, a security disjoint routing …
Robust Kalman filter for position estimation of automated guided vehicles under cyberattacks
Automated guided vehicles (AGVs) have become a key part of many industries, where they
handle the task of managing material flows. As a result, they are very important targets for …
handle the task of managing material flows. As a result, they are very important targets for …
Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs
Early attack detection is essential to ensure the security of complex networks, especially
those in critical infrastructures. This is particularly crucial in networks with multi-stage …
those in critical infrastructures. This is particularly crucial in networks with multi-stage …
Attack-resilient event-triggered fuzzy interval type-2 filter design for networked nonlinear systems under sporadic denial-of-service jamming attacks
This article is concerned with attack-resilient event-triggered filtering for a class of networked
nonlinear systems described by an interval type-2 (IT2) fuzzy model. Suppose that data …
nonlinear systems described by an interval type-2 (IT2) fuzzy model. Suppose that data …