Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …
society, and wireless services become increasingly important as the applications of wireless …
A comprehensive review of recent advances in smart grids: A sustainable future with renewable energy resources
The smart grid is an unprecedented opportunity to shift the current energy industry into a
new era of a modernized network where the power generation, transmission, and …
new era of a modernized network where the power generation, transmission, and …
A survey on attack detection, estimation and control of industrial cyber–physical systems
Cyber–physical systems (CPSs) are complex systems that involve technologies such as
control, communication, and computing. Nowadays, CPSs have a wide range of applications …
control, communication, and computing. Nowadays, CPSs have a wide range of applications …
A survey on security control and attack detection for industrial cyber-physical systems
Abstract Cyber-physical systems (CPSs), which are an integration of computation,
networking, and physical processes, play an increasingly important role in critical …
networking, and physical processes, play an increasingly important role in critical …
Security of networked control systems subject to deception attacks: A survey
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …
utilising communication networks, is a complex intelligent control system with high flexibility …
Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges
Abstract Cyber Physical Systems (CPS) are almost everywhere; they can be accessed and
controlled remotely. These features make them more vulnerable to cyber attacks. Since …
controlled remotely. These features make them more vulnerable to cyber attacks. Since …
Brief survey on attack detection methods for cyber-physical systems
In recent years, cyber-physical systems (CPSs) have attracted intense attention due to their
potential applications in many areas. However, the strong reliance on communication …
potential applications in many areas. However, the strong reliance on communication …
Research on a covert communication model realized by using smart contracts in blockchain environment
The traditional covert communication channel relying on a third-party node is vulnerable to
attack. The data are easily tampered with and the identity information of the communication …
attack. The data are easily tampered with and the identity information of the communication …
A novel cyber attack detection method in networked control systems
This paper is concerned with cyber attack detection in a networked control system. A novel
cyber attack detection method, which consists of two steps: 1) a prediction step and 2) a …
cyber attack detection method, which consists of two steps: 1) a prediction step and 2) a …
Distributed cyber attacks detection and recovery mechanism for vehicle platooning
This paper is concerned with the distributed attack detection and recovery in a vehicle
platooning control system, wherein inter-vehicle information is propagated via a wireless …
platooning control system, wherein inter-vehicle information is propagated via a wireless …