Articles with "cyber attacks" as a keyword



Photo from wikipedia

Finite‐time adaptive event‐triggered asynchronous state estimation for Markov jump systems with cyber‐attacks

Sign Up to like & get
recommendations!
Published in 2021 at "International Journal of Robust and Nonlinear Control"

DOI: 10.1002/rnc.5836

Abstract: This article considers the issue of finite‐time H∞ asynchronous state estimation for event‐triggered nonlinear Markovian jump systems subject to cyber‐attacks. An adaptive event‐triggered scheme is introduced to cope with the capacity constraint of the networked… read more here.

Keywords: time; finite time; estimation; cyber attacks ... See more keywords
Photo from wikipedia

Deterrence by Norms to Stop Interstate Cyber Attacks

Sign Up to like & get
recommendations!
Published in 2017 at "Minds and Machines"

DOI: 10.1007/s11023-017-9446-1

Abstract: In April 2017, the foreign ministers of the G7 countries approved a ‘Declaration on Responsible States Behaviour in Cyberspace’ (G7 Declaration 2017). The Declaration addresses a mounting concern about international stability and the security of… read more here.

Keywords: state; declaration; norms stop; cyber attacks ... See more keywords
Photo from wikipedia

Security Against Communication Network Attacks of Cyber-Physical Systems

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Control, Automation and Electrical Systems"

DOI: 10.1007/s40313-018-0420-9

Abstract: Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive… read more here.

Keywords: network; communication; cyber attacks; cyber physical ... See more keywords
Photo from wikipedia

Non-linear state recovery in power system under bad data and cyber attacks

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Modern Power Systems and Clean Energy"

DOI: 10.1007/s40565-019-0561-2

Abstract: The problems of recovering the state of power systems and detecting the instances of bad data have been widely studied in literature. Nevertheless, these two operations have been designed and optimized for the most part… read more here.

Keywords: bad data; power; state estimators; state ... See more keywords
Photo from wikipedia

A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

Sign Up to like & get
recommendations!
Published in 2021 at "Energy Reports"

DOI: 10.1016/j.egyr.2021.08.126

Abstract: Abstract At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Recently,… read more here.

Keywords: cyber attacks; study; cyber security; security ... See more keywords
Photo from wikipedia

Cyber-attacks and stock market activity

Sign Up to like & get
recommendations!
Published in 2021 at "International Review of Financial Analysis"

DOI: 10.1016/j.irfa.2021.101795

Abstract: Abstract I study how financial markets react to unexpected corporate security breaches in the short and the long-term. The main results show that daily excess returns drop, trading volume increases due to selling pressure, and… read more here.

Keywords: market; market activity; security; attacks stock ... See more keywords
Photo from wikipedia

Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks.

Sign Up to like & get
recommendations!
Published in 2020 at "ISA transactions"

DOI: 10.1016/j.isatra.2020.10.002

Abstract: The paper discusses the cooperative tracking problem of partially known cyber-physical multi-agent networked systems. In this system, there exist two cascaded chances for cyber-attacks. The local agent is of networked system type that is subjected… read more here.

Keywords: false data; control; data injection; cyber attacks ... See more keywords
Photo by susangkomen3day from unsplash

Dual-terminal decentralized event-triggered control for switched systems with cyber attacks and quantization.

Sign Up to like & get
recommendations!
Published in 2020 at "ISA transactions"

DOI: 10.1016/j.isatra.2020.10.050

Abstract: This article concerns dual-terminal event-triggered communication and decentralized control of switched systems that are the target of cyber attacks. Due to different properties of physical system, this system uses decentralized communication channels to transmit feedback… read more here.

Keywords: cyber attacks; control switched; event; dual terminal ... See more keywords
Photo from wikipedia

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

Sign Up to like & get
recommendations!
Published in 2019 at "Nuclear Engineering and Technology"

DOI: 10.1016/j.net.2018.09.009

Abstract: Abstract With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious… read more here.

Keywords: cyber attacks; importance analysis; cyber; safety ... See more keywords
Photo by thinkmagically from unsplash

Comparing Kalman Filters and Observers for Power System Dynamic State Estimation With Model Uncertainty and Malicious Cyber Attacks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2876883

Abstract: Kalman filters (KFs) and dynamic observers are two main classes of the dynamic state estimation (DSE) routines. The Power system DSE has been implemented by various KFs, such as the extended KF (EKF) and the… read more here.

Keywords: power system; cyber attacks; model uncertainty;
Photo by saadahmad_umn from unsplash

Multivariate Gaussian-Based False Data Detection Against Cyber-Attacks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2936816

Abstract: Modern distribution power system has become a typical cyber-physical system (CPS), where reliable automation control process is heavily depending on the accurate measurement data. However, the cyber-attacks on CPS may manipulate the measurement data and… read more here.

Keywords: tex math; cyber attacks; inline formula;