Search
Now showing items 1-10 of 19
A comprehensive review of the cyber-attacks and cyber-security on load frequency control of power systems
(
MDPI AG
, 2020 , Article Review)
Power systems are complex systems that have great importance to socio-economic development due to the fact that the entire world relies on the electric network power supply for day-to-day life. Therefore, for the stable ...
Monitoring and detection of malicious adversarial zero dynamics attacks in cyber-physical systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper is mainly concerned with monitoring and detection of zero dynamics (ZD) cyber attacks that are injected by malicious hackers and adversaries to safety critical cyber-physical systems (CPS). We consider a CPS ...
Iterative per Group Feature Selection for Intrusion Detection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Network security is an critical subject in any distributed network. Recently, machine learning has proven their efficiency for intrusion detection. By using a comprehensive dataset with multiple attack types, a well-trained ...
Dynamical observer for continuous linear Roesser systems
(
Elsevier B.V.
, 2020 , Conference Paper)
Monitoring of industrial systems for anomalies such as faults and cyber-attacks as unknown and extremely undesirable inputs in the presence of other inputs (like disturbances) is an important issue for ensuring the safety ...
Mitigation and resiliency of multi-agent systems subject to malicious cyber attacks on communication links
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper aims at investigating a novel type of cyber attack that is injected to multi-agent systems (MAS) having an underlying directed graph. The cyber attack, which is designated as the controllability attack, is ...
Traffic Analysis Attacks on Tor: A Survey
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...
Cyber-attacks against voltage profile in smart distribution grids with highly-dispersed pv generators: Detection and protection
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
In this work, we study the effect of cyber-attacks on voltage regulation in smart grids with highly dispersed photovoltaic (PV) power generators. We picture how the cyberattacks in the distribution network with the existence ...
Undetectable Cyber Attacks on Communication Links in Multi-Agent Cyber-Physical Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The objective in this paper is to study and develop conditions for a network of multi-agent cyber-physical systems (MAS) where a malicious adversary can utilize vulnerabilities in order to ensure and maintain cyber attacks ...
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ...
Secure Transmission of IoT mHealth Patient Monitoring Data from Remote Areas Using DTN
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In remote rural areas without continuous Internet connectivity, it is hard to envisage the use of mHealth applications for remote patient monitoring. In such areas, patients need to travel long distances to reach the nearest ...