Search
Now showing items 1-10 of 15
Monitoring and detection of malicious adversarial zero dynamics attacks in cyber-physical systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper is mainly concerned with monitoring and detection of zero dynamics (ZD) cyber attacks that are injected by malicious hackers and adversaries to safety critical cyber-physical systems (CPS). We consider a CPS ...
Towards Privacy Preserving Consensus Control in Multi-Agent Cyber-Physical Systems Subject to Cyber Attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
Multi-agent systems (MAS) require sharing their information with their neighboring agents to reach a consensus in a distributed manner. In this paper, a transformation-based consensus control methodology is developed and ...
Iterative per Group Feature Selection for Intrusion Detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained ...
Dynamical observer for continuous linear Roesser systems
(
Elsevier B.V.
, 2020 , Conference Paper)
Monitoring of industrial systems for anomalies such as faults and cyber-attacks as unknown and extremely undesirable inputs in the presence of other inputs (like disturbances) is an important issue for ensuring the safety ...
Mitigation and resiliency of multi-agent systems subject to malicious cyber attacks on communication links
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper aims at investigating a novel type of cyber attack that is injected to multi-agent systems (MAS) having an underlying directed graph. The cyber attack, which is designated as the controllability attack, is ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Cyber-attacks against voltage profile in smart distribution grids with highly-dispersed pv generators: Detection and protection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this work, we study the effect of cyber-attacks on voltage regulation in smart grids with highly dispersed photovoltaic (PV) power generators. We picture how the cyberattacks in the distribution network with the existence ...
Performance Analysis of PLS key generation-based Secure NOMA-enabled IoT Networks in the presence of Untrusted Users
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
In Internet of Things (IoT), a massive amount of sensitive data is generated and transmitted by IoT devices. Security risks represent a major concern in IoT, especially when using innovative techniques such as Non-Orthogonal ...
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The objective in this paper is to study and develop conditions for a network of multi-agent cyber-physical systems (MAS) where a malicious adversary can utilize vulnerabilities in order to ensure and maintain cyber attacks ...
Integrating Blockchain Technology in 5G enabled IoT: A Review
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In the digitized world, Internet of thing(IoT) is growing rapidly and most of the devices are connected by internet technology. IoT connected more than 5 million devices across the world and it needs high power internet ...