State estimators in soft sensing and sensor fusion for sustainable manufacturing
State estimators, including observers and Bayesian filters, are a class of model-based
algorithms for estimating variables in a dynamical system given the sensor measurements of …
algorithms for estimating variables in a dynamical system given the sensor measurements of …
Challenges and opportunities in cyberphysical systems security: A physics-based perspective
Cyberphysical systems (CPSs) are part of the critical infrastructure. CPS security is
challenging because the system can be attacked from both cyber and physical domains. In …
challenging because the system can be attacked from both cyber and physical domains. In …
Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in cps
A novel scheme is proposed to authenticate sensors and detect data integrity attacks in a
Cyber Physical System (CPS). The proposed technique uses the hardware characteristics of …
Cyber Physical System (CPS). The proposed technique uses the hardware characteristics of …
NoisePrint Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-
Physical Systems (CPSs). A combined fingerprint for sensor and process noise is created …
Physical Systems (CPSs). A combined fingerprint for sensor and process noise is created …
Defending cyber–physical systems through reverse-engineering-based memory sanity check
Y Geng, Y Chen, R Ma, Q Wei, J Pan… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Cyber–physical systems (CPSs) are ubiquitous in critical infrastructures, where
programmable logic controllers (PLCs) and physical components intertwine. However …
programmable logic controllers (PLCs) and physical components intertwine. However …
Model-based attack detection scheme for smart water distribution networks
In this manuscript, we present a detailed case study about model-based attack detection
procedures for Cyber-Physical Systems (CPSs). In particular, using EPANET (a simulation …
procedures for Cyber-Physical Systems (CPSs). In particular, using EPANET (a simulation …
Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks
C Liang, F Wen, Z Wang - Information Fusion, 2019 - Elsevier
As one of the widely used applications in wireless sensor networks, target tracking has
attracted considerable attention. Although many tracking techniques have been developed …
attracted considerable attention. Although many tracking techniques have been developed …
A secure strategy for a cyber physical system with multi-sensor under linear deception attack
C Wang, J Huang, D Wang, F Li - Journal of the Franklin Institute, 2021 - Elsevier
Linear deception attacks can bypass the χ 2 detector by tampering with data. In this paper,
we provide a secure strategy for a cyber physical system (CPS) against such attacks. In …
we provide a secure strategy for a cyber physical system (CPS) against such attacks. In …
AI for cyberbiosecurity in water systems—A survey
Abstract The use of Artificial Intelligence (AI) is growing in areas where decisions and
consequences have high-stakes such as larger scale software, critical infrastructure, and …
consequences have high-stakes such as larger scale software, critical infrastructure, and …
Distributed grid state estimation under cyber attacks using optimal filter and Bayesian approach
Smart grid is built by combination of electric and information technologies and achieves the
two-way interaction between power utilization and power generation. Unfortunately, new …
two-way interaction between power utilization and power generation. Unfortunately, new …