Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A survey on machine-learning based security design for cyber-physical systems
A cyber-physical system (CPS) is the integration of a physical system into the real world and
control applications in a computing system, interacting through a communications network …
control applications in a computing system, interacting through a communications network …
SoK: Security in real-time systems
Security is an increasing concern for real-time systems (RTS). Over the last decade or so,
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
researchers have demonstrated attacks and defenses aimed at such systems. In this article …
Fault detection filter and controller co-design for unmanned surface vehicles under DoS attacks
This paper addresses the co-design problem of a fault detection filter and controller for a
networked-based unmanned surface vehicle (USV) system subject to communication …
networked-based unmanned surface vehicle (USV) system subject to communication …
Design and analysis of lightweight authentication protocol for securing IoD
The Internet-of-drones (IoD) environment is a layered network control architecture designed
to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) …
to maintain, coordinate, access, and control drones (or Unmanned Aerial vehicles UAVs) …
Stealthy sensor attack detection and real-time performance recovery for resilient CPS
Cyber-physical attacks exploit intrinsic natures of physical systems and can severely
damage cyber-physical systems (CPSs) without being detected by the conventional …
damage cyber-physical systems (CPSs) without being detected by the conventional …
Stability and performance analysis of control systems subject to bursts of deadline misses
Control systems are by design robust to various disturbances, ranging from noise to
unmodelled dynamics. Recent work on the weakly hard model---applied to controllers---has …
unmodelled dynamics. Recent work on the weakly hard model---applied to controllers---has …
A privacy-preserving algorithm for AC microgrid cyber-physical system against false data injection attacks
J Yang, Y Zhang - Journal of Modern Power Systems and …, 2022 - ieeexplore.ieee.org
A new privacy-preserving algorithm based on the Paillier cryptosystem including a new
cooperative control strategy is proposed in this paper, which can resist the false data …
cooperative control strategy is proposed in this paper, which can resist the false data …
Software rejuvenation for safe operation of cyber–physical systems in the presence of run-time cyberattacks
Software rejuvenation refers to the periodic restoration of a computing system's software and
data with a previously saved image to eliminate undesired behavior due to unknown or …
data with a previously saved image to eliminate undesired behavior due to unknown or …
[HTML][HTML] A robot operating system framework for secure uav communications
H Lee, J Yoon, MS Jang, KJ Park - Sensors, 2021 - mdpi.com
To perform advanced operations with unmanned aerial vehicles (UAVs), it is crucial that
components other than the existing ones such as flight controller, network devices, and …
components other than the existing ones such as flight controller, network devices, and …
Design of countermeasure to packet falsification in vehicle platooning by explainable artificial intelligence
M Mongelli - Computer Communications, 2021 - Elsevier
In view of system reliability, extraction of knowledge from models of artificial intelligence may
be more important than their forecasting ability. The elaboration of rules found by …
be more important than their forecasting ability. The elaboration of rules found by …