Game-theory-based active defense for intrusion detection in cyber-physical embedded systems
Cyber-Physical Embedded Systems (CPESs) are distributed embedded systems integrated
with various actuators and sensors. When it comes to the issue of CPES security, the most …
with various actuators and sensors. When it comes to the issue of CPES security, the most …
Attack parameter dependent resilient H∞ path-following control design for autonomous vehicles under cyber attacks
S Hu, W Yu, J Yang, X Chen, X **e, Y Ma - Control Engineering Practice, 2023 - Elsevier
Autonomous vehicles typically transmit information over wireless communication network,
which is vulnerable to malicious cyber attacks and poses huge security threats for …
which is vulnerable to malicious cyber attacks and poses huge security threats for …
DoS-Resilient Load Frequency Control of Multi-Area Power Systems: An Attack-Parameter-Dependent Approach
This paper is concerned with a resilient load frequency control (LFC) of multi-area power
systems subject to unknown load disturbances and intermittent denial-of-service (DoS) …
systems subject to unknown load disturbances and intermittent denial-of-service (DoS) …
Stabilization of networked singular control systems under double-channel quantization and DoS attacks
J Lin, X Wu, M **ao, J Ding - Journal of the Franklin Institute, 2022 - Elsevier
This paper is concerned with the asymptotic stabilization of discrete singular systems over a
bandwidth limited digital network, when the state measurements are periodically sampled …
bandwidth limited digital network, when the state measurements are periodically sampled …
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network.
FAN Wei, P Cheng, ZHU Dali… - Journal on …, 2023 - search.ebscohost.com
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.
It is difficult to detect the intrusion process accurately, and there is no effective intrusion …
It is difficult to detect the intrusion process accurately, and there is no effective intrusion …
[PDF][PDF] An efficient technique for detection of flooding and jamming attacks in wireless sensor networks
S **dal, R Maini - International journal of computer applications, 2014 - Citeseer
Distributed denial of service attacks are a major threat for wireless sensor network. The aim
of these attacks is that genuine users can not use network such as bandwidth, computing …
of these attacks is that genuine users can not use network such as bandwidth, computing …
Game theoretic model for jamming attack mitigation in wireless sensor networks
DC Clifford - UNIZIK Journal of Engineering and Applied …, 2021 - journals.unizik.edu.ng
Jamming attack is a form of denial of service attack that disrupts normal network operations.
These attacks which are broadly categorized as constant jamming, deceptive jamming …
These attacks which are broadly categorized as constant jamming, deceptive jamming …
Sampled-Data Based Attack Parameter-Dependent Load Frequency Control for Multi-Area Power Systems Under Time-Constraint DoS Attacks
W Zhang, S Hu, X Chen, X **e - 2023 42nd Chinese Control …, 2023 - ieeexplore.ieee.org
In this paper, the design of a sampled-data based attack parameter-dependent H_∞ load
frequency control (LFC) scheme is concerned for multi-area power system with time …
frequency control (LFC) scheme is concerned for multi-area power system with time …
[PDF][PDF] Energy efficient witness based clone and jamming attack detection in wsn
The nature of broad cast medium of transmission causes wireless vulnerability to sensor
networks in terms of security attacks. The nodes are not physically protected due to their …
networks in terms of security attacks. The nodes are not physically protected due to their …