Sequential detection of replay attacks
One of the most studied forms of attacks on the cyber-physical systems is the replay attack.
The statistical similarities of the replayed signal and the true observations make the replay …
The statistical similarities of the replayed signal and the true observations make the replay …
Replay attack detection for cyber-physical control systems: A dynamical delay estimation method
Cyber attack detection plays a crucial role in ensuring cyber security of control systems.
However, the reported methods for cyber attack detection often rely on large-scale upgrades …
However, the reported methods for cyber attack detection often rely on large-scale upgrades …
[HTML][HTML] Quickest detection of deception attacks on cyber–physical systems with a parsimonious watermarking policy
Adding a physical watermarking signal to the control input of a networked control system
increases the detection probability of data deception attacks at the expense of increased …
increases the detection probability of data deception attacks at the expense of increased …
Integrated approach to diagnostics of failures and cyber-attacks in industrial control systems
This paper is concerned with the issue of the diagnostics of process faults and the detection
of cyber-attacks in industrial control systems. This problem is of significant importance to …
of cyber-attacks in industrial control systems. This problem is of significant importance to …
Controller cyber-attack detection and isolation
This article deals with the cyber security of industrial control systems. Methods for detecting
and isolating process faults and cyber-attacks, consisting of elementary actions named …
and isolating process faults and cyber-attacks, consisting of elementary actions named …
Replay attack detection based on parity space method for cyber-physical systems
The replay attack detection problem is studied from a new perspective based on the parity
space method in this paper. The proposed detection methods can distinguish system fault …
space method in this paper. The proposed detection methods can distinguish system fault …
Detection and analysis of cybersecurity challenges for processing systems
Due to cyber threats, Process Control Systems (PCS) are increasingly at risk in the
interconnected world. This review elucidates PCS's mounting cybersecurity challenges …
interconnected world. This review elucidates PCS's mounting cybersecurity challenges …
Resilient Event Triggered Interval Type‐2 Fuzzy Sliding Mode Control for Connected and Autonomous Vehicles Subjected to Multiple Cyber Attacks
A Mohammed, C Ramlal, L Marine… - Journal of Advanced …, 2024 - Wiley Online Library
Connected and autonomous vehicles (CAVs) are considered a hot area of research in the
field of intelligent transportation systems. However, over the past few years, cybersecurity …
field of intelligent transportation systems. However, over the past few years, cybersecurity …
Machine Learning based Early Detection of Ongoing Cyber-Attacks
A Bhagyalakshmi, CDS Laya… - … on Applied Artificial …, 2024 - ieeexplore.ieee.org
The need for sophisticated detection and response systems to counteract cyber threats has
grown in importance as the cybersecurity landscape changes. In order to improve …
grown in importance as the cybersecurity landscape changes. In order to improve …
Deception attack detection using reduced watermarking
The addition of physical watermarking to the control input is a well-adopted technique to
detect the data deception attacks on the cyber-physical systems. However, the addition of …
detect the data deception attacks on the cyber-physical systems. However, the addition of …