AI for cyberbiosecurity in water systems—A survey

D Sobien, MO Yardimci, MBT Nguyen, WY Mao… - … : A new field to deal with …, 2023 - Springer
Abstract The use of Artificial Intelligence (AI) is growing in areas where decisions and
consequences have high-stakes such as larger scale software, critical infrastructure, and …

Responsible digital security behaviour: Definition and assessment model

C Maathuis, S Chockalingam - European Conference on Cyber …, 2022 - books.google.com
Digital landscape transforms remarkably and grows exponentially tackling important societal
challenges and needs. In the modern age, futuristic digital concepts are ideated and …

An ontology for effective security incident management

S Chockalingam, C Maathuis - International Conference on …, 2022 - books.google.com
With the evolution of technologies like Internet of Things (IoTs), there will be more and more
connected devices in use around the world. This is one of the reasons why cyber security is …

Cyberattack and Machine-Induced Fault Detection and Isolation Methodologies for Cyber-Physical Systems

M Taheri, K Khorasani, I Shames… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this article, the problem of simultaneous cyberattack and fault detection and isolation
(CAFDI) for both centralized and large-scale interconnected cyber-physical systems (CPSs) …

[HTML][HTML] Probability elicitation for Bayesian networks to distinguish between intentional attacks and accidental technical failures

S Chockalingam, W Pieters, AMH Teixeira… - Journal of Information …, 2023 - Elsevier
Both intentional attacks and accidental technical failures can lead to abnormal behaviour in
components of industrial control systems. In our previous work, we developed a framework …

A passive isolation of sensor faults from un-stealthy attacks in uncertain nonlinear systems

M Ramadan, F Abdollahi - ISA transactions, 2023 - Elsevier
In this paper, a novel nonlinear observer-based approach is established to cast light on the
problem of isolating sensor faults from un-stealthy attacks for Lipschitz affine nonlinear …

A Hierarchical approach for isolating sensor faults from un-stealthy attacks in large-scale systems

M Ramadan, F Abdollahi - Journal of the Franklin Institute, 2024 - Elsevier
This paper proposes a novel hierarchical-adaptive threshold abnormal behavior
discrimination scheme (HATAD) for Lipschitz nonlinear large-scale systems with …

[Retracted] Application of Blockchain Technology in Water Rights Trading in the Irrigation Area under the Internet‐of‐Things Environment

Y Li, J Xie, J Yang, J Ren, N Zhai - Security and …, 2022 - Wiley Online Library
Water rights trading is an important way to solve the shortage of water resources. Combined
with the characteristics of water resources and the requirements of the market economy, the …

Enhanced stochastic coding framework for discriminating faults and cyber incidents in hybrid systems

M Badr, HA Talebi, MA Khosravi - IET Control Theory & …, 2024 - Wiley Online Library
This article presents an innovative approach for distinguishing replay attacks from faults in
hybrid systems. To develop the idea at first, a novel technique for replay attack detection …

Coding-based abnormal behavior differentiation approach for industrial systems

M Ramadan, F Abdollahi - Journal of Industrial Information Integration, 2024 - Elsevier
This paper deals with the problem of sensor faults isolation from overlapping un-stealthy
attacks based on coding sensor outputs for industrial systems represented by Lipschitz …