A review on cybersecurity analysis, attack detection, and attack defense methods in cyber-physical power systems

D Du, M Zhu, X Li, M Fei, S Bu, L Wu… - Journal of Modern …, 2022 - ieeexplore.ieee.org
Potential malicious cyber-attacks to power systems which are connected to a wide range of
stakeholders from the top to tail will impose significant societal risks and challenges. The …

Trust and reputation in the internet of things: State-of-the-art and research challenges

G Fortino, L Fotia, F Messina, D Rosaci… - IEEE Access, 2020 - ieeexplore.ieee.org
This paper deals with the principal aspects emerging from the application of trust techniques
to the IoT domains with respect to the particular viewpoint of an IoT environment. We …

A survey on model-based distributed control and filtering for industrial cyber-physical systems

D Ding, QL Han, Z Wang, X Ge - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Industrial cyber-physical systems (CPSs) are large-scale, geographically dispersed, and life-
critical systems, in which lots of sensors and actuators are embedded and networked …

Security control for T–S fuzzy systems with adaptive event-triggered mechanism and multiple cyber-attacks

J Liu, T Yin, J Cao, D Yue… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article focuses on the security control for Takagi-Sugeno (TS) fuzzy systems with
adaptive event-triggered mechanism (AETM) and multiple cyber-attacks, which include …

Energy-aware geographic routing for real-time workforce monitoring in industrial informatics

AK Sangaiah, AS Rostami… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
Workforce monitoring is a vital activity in large factories in order to oversee the worker's
concentration on their duty and increase productivity. Workforces are kind of moving targets …

Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks

X Liu, A Liu, T Wang, K Ota, M Dong, Y Liu… - Journal of Parallel and …, 2020 - Elsevier
To improve the data arrival ratio and the transmission delay and considering that the
capacity for determining malicious nodes and energy are limited, a security disjoint routing …

Robust Kalman filter for position estimation of automated guided vehicles under cyberattacks

M Elsisi, M Altius, SF Su, CL Su - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Automated guided vehicles (AGVs) have become a key part of many industries, where they
handle the task of managing material flows. As a result, they are very important targets for …

Optimal monitoring and attack detection of networks modeled by Bayesian attack graphs

A Kazeminajafabadi, M Imani - Cybersecurity, 2023 - Springer
Early attack detection is essential to ensure the security of complex networks, especially
those in critical infrastructures. This is particularly crucial in networks with multi-stage …

Attack-resilient event-triggered fuzzy interval type-2 filter design for networked nonlinear systems under sporadic denial-of-service jamming attacks

S Hu, D Yue, C Dou, X **e, Y Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This article is concerned with attack-resilient event-triggered filtering for a class of networked
nonlinear systems described by an interval type-2 (IT2) fuzzy model. Suppose that data …