Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey
H Pirayesh, H Zeng - IEEE communications surveys & tutorials, 2022 - ieeexplore.ieee.org
Wireless networks are a key component of the telecommunications infrastructure in our
society, and wireless services become increasingly important as the applications of wireless …
society, and wireless services become increasingly important as the applications of wireless …
[HTML][HTML] A comprehensive review of recent advances in smart grids: A sustainable future with renewable energy resources
The smart grid is an unprecedented opportunity to shift the current energy industry into a
new era of a modernized network where the power generation, transmission, and …
new era of a modernized network where the power generation, transmission, and …
A survey on attack detection, estimation and control of industrial cyber–physical systems
Cyber–physical systems (CPSs) are complex systems that involve technologies such as
control, communication, and computing. Nowadays, CPSs have a wide range of applications …
control, communication, and computing. Nowadays, CPSs have a wide range of applications …
A survey on security control and attack detection for industrial cyber-physical systems
Abstract Cyber-physical systems (CPSs), which are an integration of computation,
networking, and physical processes, play an increasingly important role in critical …
networking, and physical processes, play an increasingly important role in critical …
Security of networked control systems subject to deception attacks: A survey
ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …
utilising communication networks, is a complex intelligent control system with high flexibility …
Brief survey on attack detection methods for cyber-physical systems
In recent years, cyber-physical systems (CPSs) have attracted intense attention due to their
potential applications in many areas. However, the strong reliance on communication …
potential applications in many areas. However, the strong reliance on communication …
Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges
Abstract Cyber Physical Systems (CPS) are almost everywhere; they can be accessed and
controlled remotely. These features make them more vulnerable to cyber attacks. Since …
controlled remotely. These features make them more vulnerable to cyber attacks. Since …
Security and privacy vulnerabilities of 5G/6G and WiFi 6: Survey and research directions from a coexistence perspective
Spectrum scarcity has been a major concern for achieving the desired quality of experience
(QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of …
(QoE) in next-generation (5G/6G and beyond) networks supporting a massive volume of …
Research on a covert communication model realized by using smart contracts in blockchain environment
The traditional covert communication channel relying on a third-party node is vulnerable to
attack. The data are easily tampered with and the identity information of the communication …
attack. The data are easily tampered with and the identity information of the communication …
Distributed cyber attacks detection and recovery mechanism for vehicle platooning
This paper is concerned with the distributed attack detection and recovery in a vehicle
platooning control system, wherein inter-vehicle information is propagated via a wireless …
platooning control system, wherein inter-vehicle information is propagated via a wireless …