State estimators in soft sensing and sensor fusion for sustainable manufacturing

M McAfee, M Kariminejad, A Weinert, S Huq, JD Stigter… - Sustainability, 2022 - mdpi.com
State estimators, including observers and Bayesian filters, are a class of model-based
algorithms for estimating variables in a dynamical system given the sensor measurements of …

Challenges and opportunities in cyberphysical systems security: A physics-based perspective

CM Ahmed, J Zhou - IEEE Security & Privacy, 2020 - ieeexplore.ieee.org
Cyberphysical systems (CPSs) are part of the critical infrastructure. CPS security is
challenging because the system can be attacked from both cyber and physical domains. In …

Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in cps

CM Ahmed, J Zhou, AP Mathur - … of the 34th Annual Computer Security …, 2018 - dl.acm.org
A novel scheme is proposed to authenticate sensors and detect data integrity attacks in a
Cyber Physical System (CPS). The proposed technique uses the hardware characteristics of …

NoisePrint Attack Detection Using Sensor and Process Noise Fingerprint in Cyber Physical Systems

CM Ahmed, M Ochoa, J Zhou, AP Mathur… - Proceedings of the …, 2018 - dl.acm.org
An attack detection scheme is proposed to detect data integrity attacks on sensors in Cyber-
Physical Systems (CPSs). A combined fingerprint for sensor and process noise is created …

Defending cyber–physical systems through reverse-engineering-based memory sanity check

Y Geng, Y Chen, R Ma, Q Wei, J Pan… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Cyber–physical systems (CPSs) are ubiquitous in critical infrastructures, where
programmable logic controllers (PLCs) and physical components intertwine. However …

Model-based attack detection scheme for smart water distribution networks

CM Ahmed, C Murguia, J Ruths - Proceedings of the 2017 ACM on Asia …, 2017 - dl.acm.org
In this manuscript, we present a detailed case study about model-based attack detection
procedures for Cyber-Physical Systems (CPSs). In particular, using EPANET (a simulation …

Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks

C Liang, F Wen, Z Wang - Information Fusion, 2019 - Elsevier
As one of the widely used applications in wireless sensor networks, target tracking has
attracted considerable attention. Although many tracking techniques have been developed …

A secure strategy for a cyber physical system with multi-sensor under linear deception attack

C Wang, J Huang, D Wang, F Li - Journal of the Franklin Institute, 2021 - Elsevier
Linear deception attacks can bypass the χ 2 detector by tampering with data. In this paper,
we provide a secure strategy for a cyber physical system (CPS) against such attacks. In …

AI for cyberbiosecurity in water systems—A survey

D Sobien, MO Yardimci, MBT Nguyen, WY Mao… - … : A new field to deal with …, 2023 - Springer
Abstract The use of Artificial Intelligence (AI) is growing in areas where decisions and
consequences have high-stakes such as larger scale software, critical infrastructure, and …

Distributed grid state estimation under cyber attacks using optimal filter and Bayesian approach

MM Rana, R Bo, A Abdelhadi - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Smart grid is built by combination of electric and information technologies and achieves the
two-way interaction between power utilization and power generation. Unfortunately, new …