Sign Up to like & get
recommendations!
0
Published in 2025 at "International Journal of Robust and Nonlinear Control"
DOI: 10.1002/rnc.70160
Abstract: This article focuses on the detection of false data injection (FDI) attacks in nonlinear cyber‐physical systems with uncertain parameters, aiming to improve both the speed and accuracy of actuator detection affected by FDI attacks. First,…
read more here.
Keywords:
detection;
nonlinear cyber;
physical systems;
attack detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "International Journal of Robust and Nonlinear Control"
DOI: 10.1002/rnc.7699
Abstract: The attack detection and data‐driven resilient control problem for heterogeneous nonlinear nonaffine multi‐agent systems (MASs) in the presence of intermittent false data injection (FDI) attacks is investigated in this article. First, an attack detection and…
read more here.
Keywords:
driven resilient;
attack;
control;
attack detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Applied Intelligence"
DOI: 10.1007/s10489-024-05275-7
Abstract: Detecting malicious attacks presents a major challenge in the field of reinforcement learning (RL), as such attacks can force the victim to perform abnormal actions, with potentially severe consequences. To mitigate these risks, current research…
read more here.
Keywords:
detection;
clustering based;
attack;
attack detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-021-11390-1
Abstract: Computer network systems are often subject to several types of attacks. For example, an excessive traffic load sent to a web server for making it unusable is the main technique introduced by the Distributed Denial…
read more here.
Keywords:
cyber attack;
address;
attack detection;
non linear ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "Wireless Personal Communications"
DOI: 10.1007/s11277-021-08855-9
Abstract: Wireless sensor network occupies an inevitable role in various applications that requires data collection and transmission. The tiny wireless sensor nodes are responsible for data collection and transmission. However, these randomly deployed nodes are vulnerable…
read more here.
Keywords:
attack detection;
detection;
wireless sensor;
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-020-01916-0
Abstract: Highly scalable services are enabled by cloud computing and easily consumed over the Internet. User data is normally stored remotely in cloud services. Users do not own or operate the machines. This is a key…
read more here.
Keywords:
information;
attack detection;
centralized cloud;
cloud ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-024-09140-0
Abstract: Cross-Site Scripting (XSS) attacks continue to be a significant threat to web application security, necessitating robust detection mechanisms to safeguard user data and ensure system integrity. In this study, we present a novel approach for…
read more here.
Keywords:
detection;
xss attack;
xss attacks;
attack detection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Ad Hoc Networks"
DOI: 10.1016/j.adhoc.2019.01.010
Abstract: Abstract Vehicular Ad Hoc Networks (VANETs) are expected to play an important role in our lives. They will improve traffic safety and bring a revolution on the driving experience. However, these benefits are counterbalanced by…
read more here.
Keywords:
model;
sybil attack;
traffic;
attack detection ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Scientific Reports"
DOI: 10.1038/s41598-025-06719-x
Abstract: An intelligent transportation system consists of a variety of applications that analyze and exchange information to reduce traffic, enhance traffic management, lessen the impact on the environment, and boost the advantages of transportation for both…
read more here.
Keywords:
system;
attack detection;
transportation;
intelligent transportation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Scientific Reports"
DOI: 10.1038/s41598-025-10826-0
Abstract: The Internet of Things (IoT) consists of physical objects and devices embedded with network connectivity, software, and sensors to collect and transmit data. The development of the Internet of Things (IoT) has led to various…
read more here.
Keywords:
detection;
attack detection;
privacy;
federated learning ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Scientific Reports"
DOI: 10.1038/s41598-025-14808-0
Abstract: With the rapid development of Internet of Things (IoT) technology, the number of network attack methods it faces is also increasing, and the malicious network traffic generated is growing exponentially. To identify attack traffic for…
read more here.
Keywords:
attack;
attack detection;
internet things;
iot ... See more keywords