Game-theory-based active defense for intrusion detection in cyber-physical embedded systems

K Wang, M Du, D Yang, C Zhu, J Shen, Y Zhang - 2016 - dl.acm.org
Cyber-Physical Embedded Systems (CPESs) are distributed embedded systems integrated
with various actuators and sensors. When it comes to the issue of CPES security, the most …

Attack parameter dependent resilient H∞ path-following control design for autonomous vehicles under cyber attacks

S Hu, W Yu, J Yang, X Chen, X **e, Y Ma - Control Engineering Practice, 2023 - Elsevier
Autonomous vehicles typically transmit information over wireless communication network,
which is vulnerable to malicious cyber attacks and poses huge security threats for …

DoS-Resilient Load Frequency Control of Multi-Area Power Systems: An Attack-Parameter-Dependent Approach

S Hu, X Ge, W Zhang, D Yue - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
This paper is concerned with a resilient load frequency control (LFC) of multi-area power
systems subject to unknown load disturbances and intermittent denial-of-service (DoS) …

Stabilization of networked singular control systems under double-channel quantization and DoS attacks

J Lin, X Wu, M **ao, J Ding - Journal of the Franklin Institute, 2022 - Elsevier
This paper is concerned with the asymptotic stabilization of discrete singular systems over a
bandwidth limited digital network, when the state measurements are periodically sampled …

Research on intrusion response strategy based on static Bayesian game in mobile edge computing network.

FAN Wei, P Cheng, ZHU Dali… - Journal on …, 2023 - search.ebscohost.com
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.
It is difficult to detect the intrusion process accurately, and there is no effective intrusion …

[PDF][PDF] An efficient technique for detection of flooding and jamming attacks in wireless sensor networks

S **dal, R Maini - International journal of computer applications, 2014 - Citeseer
Distributed denial of service attacks are a major threat for wireless sensor network. The aim
of these attacks is that genuine users can not use network such as bandwidth, computing …

Game theoretic model for jamming attack mitigation in wireless sensor networks

DC Clifford - UNIZIK Journal of Engineering and Applied …, 2021 - journals.unizik.edu.ng
Jamming attack is a form of denial of service attack that disrupts normal network operations.
These attacks which are broadly categorized as constant jamming, deceptive jamming …

Sampled-Data Based Attack Parameter-Dependent Load Frequency Control for Multi-Area Power Systems Under Time-Constraint DoS Attacks

W Zhang, S Hu, X Chen, X **e - 2023 42nd Chinese Control …, 2023 - ieeexplore.ieee.org
In this paper, the design of a sampled-data based attack parameter-dependent H_∞ load
frequency control (LFC) scheme is concerned for multi-area power system with time …

[PDF][PDF] Energy efficient witness based clone and jamming attack detection in wsn

M Jeyaselvi, S Suchitra, M Sathya… - Journal of Green …, 2021 - researchgate.net
The nature of broad cast medium of transmission causes wireless vulnerability to sensor
networks in terms of security attacks. The nodes are not physically protected due to their …

[引用][C] Survey on Delay Attack Detection and Prevention in WSN Data Transport

P Bhushan Jichkar, DC Mehetre