Articles with "cyber attacks" as a keyword



Disturbance Suppression‐Based Secured Resilient Control Design for Delayed Korteweg‐De Vries‐Burgers Equation With Hybrid Cyber Attacks

Sign Up to like & get
recommendations!
Published in 2025 at "Mathematical Methods in the Applied Sciences"

DOI: 10.1002/mma.11199

Abstract: The paper examines the disturbance estimator‐based secured control design for the delayed Korteweg‐de Vries‐Burgers equation subject to hybrid cyber attacks, nonlinear multisource disturbances, and gain variations. In detail, nonlinear multisource disturbance encompasses the disturbances brought… read more here.

Keywords: control design; control; cyber attacks; disturbance ... See more keywords

Finite‐time adaptive event‐triggered asynchronous state estimation for Markov jump systems with cyber‐attacks

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Robust and Nonlinear Control"

DOI: 10.1002/rnc.5836

Abstract: This article considers the issue of finite‐time H∞ asynchronous state estimation for event‐triggered nonlinear Markovian jump systems subject to cyber‐attacks. An adaptive event‐triggered scheme is introduced to cope with the capacity constraint of the networked… read more here.

Keywords: time; finite time; estimation; cyber attacks ... See more keywords

Observer‐Based Adaptive Resilient Control for Nonlinear Cyber‐Physical Systems With Unknown Cyber‐Attacks: A Self‐Triggered Approach

Sign Up to like & get
recommendations!
Published in 2025 at "International Journal of Robust and Nonlinear Control"

DOI: 10.1002/rnc.70200

Abstract: This paper studies the resilient control problem for a class of nonlinear cyber‐physical systems (CPSs) under sensor and actuator attacks. Different from those in the existing literature, both the additive and multiplicative cyber‐attacks imposed on… read more here.

Keywords: nonlinear cyber; self triggered; control; cyber attacks ... See more keywords

A Survey of Recent Breakthroughs in Networked Cascade Control Systems

Sign Up to like & get
recommendations!
Published in 2025 at "International Journal of Robust and Nonlinear Control"

DOI: 10.1002/rnc.70299

Abstract: Cascade control systems (CCSs) consist of at least two nested control loops. This type of control system is widely used in industrial processes, power plants, and chemical processes. A CCS in which the control loops… read more here.

Keywords: cascade control; system; control; cyber attacks ... See more keywords

Deterrence by Norms to Stop Interstate Cyber Attacks

Sign Up to like & get
recommendations!
Published in 2017 at "Minds and Machines"

DOI: 10.1007/s11023-017-9446-1

Abstract: In April 2017, the foreign ministers of the G7 countries approved a ‘Declaration on Responsible States Behaviour in Cyberspace’ (G7 Declaration 2017). The Declaration addresses a mounting concern about international stability and the security of… read more here.

Keywords: state; declaration; norms stop; cyber attacks ... See more keywords

Security Against Communication Network Attacks of Cyber-Physical Systems

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Control, Automation and Electrical Systems"

DOI: 10.1007/s40313-018-0420-9

Abstract: Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive… read more here.

Keywords: network; communication; cyber attacks; cyber physical ... See more keywords

Non-linear state recovery in power system under bad data and cyber attacks

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Modern Power Systems and Clean Energy"

DOI: 10.1007/s40565-019-0561-2

Abstract: The problems of recovering the state of power systems and detecting the instances of bad data have been widely studied in literature. Nevertheless, these two operations have been designed and optimized for the most part… read more here.

Keywords: bad data; power; state estimators; state ... See more keywords
Photo from wikipedia

A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

Sign Up to like & get
recommendations!
Published in 2021 at "Energy Reports"

DOI: 10.1016/j.egyr.2021.08.126

Abstract: Abstract At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Recently,… read more here.

Keywords: cyber attacks; study; cyber security; security ... See more keywords
Photo from wikipedia

Cyber-attacks and stock market activity

Sign Up to like & get
recommendations!
Published in 2021 at "International Review of Financial Analysis"

DOI: 10.1016/j.irfa.2021.101795

Abstract: Abstract I study how financial markets react to unexpected corporate security breaches in the short and the long-term. The main results show that daily excess returns drop, trading volume increases due to selling pressure, and… read more here.

Keywords: market; market activity; security; attacks stock ... See more keywords
Photo from wikipedia

Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.

Sign Up to like & get
recommendations!
Published in 2020 at "ISA transactions"

DOI: 10.1016/j.isatra.2020.10.002

Abstract: The paper discusses the cooperative tracking problem of partially known cyber-physical multi-agent networked systems. In this system, there exist two cascaded chances for cyber-attacks. The local agent is of networked system type that is subjected… read more here.

Keywords: false data; control; data injection; cyber attacks ... See more keywords

Dual-terminal decentralized event-triggered control for switched systems with cyber attacks and quantization.

Sign Up to like & get
recommendations!
Published in 2020 at "ISA transactions"

DOI: 10.1016/j.isatra.2020.10.050

Abstract: This article concerns dual-terminal event-triggered communication and decentralized control of switched systems that are the target of cyber attacks. Due to different properties of physical system, this system uses decentralized communication channels to transmit feedback… read more here.

Keywords: cyber attacks; control switched; event; dual terminal ... See more keywords