Artificial neural network-based stealth attack on battery energy storage systems

M Pasetti, P Ferrari, P Bellagente… - … on Smart Grid, 2021 - ieeexplore.ieee.org
As the number of installed Battery Energy Storage Systems (BESSs) increases, the concerns
related to possible cyber-attacks to these systems rise accordingly. The most of BESS …

Physical anomaly detection in ev charging stations: Physics-based vs resnet ae

HS Mavikumbure, V Cobilean… - 2023 IEEE 32nd …, 2023 - ieeexplore.ieee.org
The number of electric car users has grown in recent years, increasing the demand for
reliable electric vehicle charging stations (EVCS). The safety of EVCSs is very important as …

Achieving Cyber-Informed Engineering Through Bayesian Belief Network and Sensitivity Analysis

C Agbo, H Mehrpouyan - 2023 10th International Conference …, 2023 - ieeexplore.ieee.org
The security of critical infrastructures is a challenge facing nations and states today as a
result of the increased complexity and interconnectivity of these systems and their control …

Cooperative Verification of PLC Programs Using CoVeriTeam: Towards a reliable and secure Industrial Control Systems

C Ukegbu, H Mehrpouyan - … of Cyber-Physical Systems and Internet of …, 2023 - dl.acm.org
It is important that the programmed logic controller (PLC), the heart of industrial control
systems (ICS), is formally verified to ensure that its safety and security requirements are met …

Conditions for parameter unidentifiability of linear ARX systems for enhancing security

X Mao, J He, C Yu, C Fang - 6th Annual Learning for …, 2024 - proceedings.mlr.press
For an adversarial observer of parametric systems, the identifiability of parameters reflects
the possibility of inferring the system dynamics and then affects the performance of attacks …

Resilience of Industrial Control Systems Using Signal Temporal Logic And Autotuning Mechanism

C Agbo, H Mehrpouyan - 2023 IEEE Intl Conf on Dependable …, 2023 - ieeexplore.ieee.org
Building robust, reliable, and resilient safety critical systems is a major challenge facing
nations and states today. The reason is that the complexity and technological advancement …

System identification with variance minimization via input design

X Mao, J He, C Zhao - arXiv preprint arXiv:2202.01102, 2022 - arxiv.org
The subspace method is one of the mainstream system identification method of linear
systems, and its basic idea is to estimate the system parameter matrices by projecting them …

IIOT Cyberattacks in Industrial Field Control Systems: PID Attack and Hardware Trojan Effects

A Massaro, N Epicoco, G Loseto… - 2024 IEEE 20th …, 2024 - ieeexplore.ieee.org
This work analyzes hardware manumissions and attacks in the controller field of industrial
Operational Technology (OT) networks. Specifically, the paper models and simulates the …

Unidentifiability of System Dynamics: Conditions and Controller Design

X Mao, J He - IEEE Transactions on Automatic Control, 2024 - ieeexplore.ieee.org
How to make a dynamic system unidentifiable is an important but still open issue. It not only
requires that the parameters of the systems but also the equivalent systems cannot be …

Intelligent Attacks on Cyber-Physical Systems and Critical Infrastructures

AO de Sá, CB Prado, ML Flavio… - … Innovative Methods for …, 2024 - ebooks.iospress.nl
This chapter provides an overview of the evolving landscape of attacks in cyber-physical
systems (CPS) and critical infrastructures, highlighting the possible use of Artificial …