[HTML][HTML] A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments
Y Li, Q Liu - Energy Reports, 2021 - Elsevier
At present, most of the economic, commercial, cultural, social and governmental activities
and interactions of countries, at all levels, including individuals, non-governmental …
and interactions of countries, at all levels, including individuals, non-governmental …
Security of networked control systems subject to deception attacks: A survey
ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …
utilising communication networks, is a complex intelligent control system with high flexibility …
Hybrid‐driven‐based fuzzy secure filtering for nonlinear parabolic partial differential equation systems with cyber attacks
Z Zhang, X Song, X Sun… - International Journal of …, 2023 - Wiley Online Library
The problem of hybrid‐driven fuzzy filtering for nonlinear semi‐linear parabolic partial
differential equation systems with dual cyber attacks is investigated. First, a Takagi‐Sugeno …
differential equation systems with dual cyber attacks is investigated. First, a Takagi‐Sugeno …
Dynamic event-triggered output feedback control for networked systems subject to multiple cyber attacks
This article is concerned with the problem of the output feedback control for a class of event-
triggered networked systems subject to multiple cyber attacks. Two dynamic event-triggered …
triggered networked systems subject to multiple cyber attacks. Two dynamic event-triggered …
An adaptive torus‐event‐based controller design for networked T‐S fuzzy systems under deception attacks
This article addresses the adaptive torus‐event‐based control problem for a class of
networked Takagi‐Sugeno (T‐S) fuzzy systems under deception attacks. Due to the inherent …
networked Takagi‐Sugeno (T‐S) fuzzy systems under deception attacks. Due to the inherent …
Novel attack‐defense framework for nonlinear complex networks: An important‐data‐based method
This article addresses the state estimation problem for a class of nonlinear complex
networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is …
networks (CNs) under attack. First, a novel important‐data‐based (IDB) attack strategy is …
Recent advances in event-triggered security control of networked systems: A survey
J Wu, C Peng, H Yang, YL Wang - International Journal of Systems …, 2022 - Taylor & Francis
Security control of networked control systems (NCSs) under vulnerable communication
environments has become an important topic both in theory and in practice. Due to …
environments has become an important topic both in theory and in practice. Due to …
Event-based security tracking control for networked control systems against stochastic cyber-attacks
This paper investigates the security tracking controller design for discrete-time networked
control systems (NCSs) with stochastic cyber-attacks via dynamic event-triggered …
control systems (NCSs) with stochastic cyber-attacks via dynamic event-triggered …
Outlier-resistant recursive security filtering for multirate networked systems under fading measurements and round-robin protocol
J Liu, E Gong, L Zha, X Xie… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This article investigates the recursive filtering problem with fading measurements and
cyberattacks for multisensor multirate networked systems (MRNSs) the under the round …
cyberattacks for multisensor multirate networked systems (MRNSs) the under the round …
Performance error estimation and elastic integral event triggering mechanism design for T–S fuzzy networked control system under DoS attacks
X Cai, K Shi, K She, S Zhong… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
This article analyzes the mechanism of denial-of-service (DoS) attacks initiated by hackers
from the perspective of computer networks. In order to effectively estimate the performance …
from the perspective of computer networks. In order to effectively estimate the performance …