Sign Up to like & get
recommendations!
0
Published in 2025 at "Mathematical Methods in the Applied Sciences"
DOI: 10.1002/mma.11199
Abstract: The paper examines the disturbance estimator‐based secured control design for the delayed Korteweg‐de Vries‐Burgers equation subject to hybrid cyber attacks, nonlinear multisource disturbances, and gain variations. In detail, nonlinear multisource disturbance encompasses the disturbances brought…
read more here.
Keywords:
control design;
control;
cyber attacks;
disturbance ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Robust and Nonlinear Control"
DOI: 10.1002/rnc.5836
Abstract: This article considers the issue of finite‐time H∞ asynchronous state estimation for event‐triggered nonlinear Markovian jump systems subject to cyber‐attacks. An adaptive event‐triggered scheme is introduced to cope with the capacity constraint of the networked…
read more here.
Keywords:
time;
finite time;
estimation;
cyber attacks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "International Journal of Robust and Nonlinear Control"
DOI: 10.1002/rnc.70200
Abstract: This paper studies the resilient control problem for a class of nonlinear cyber‐physical systems (CPSs) under sensor and actuator attacks. Different from those in the existing literature, both the additive and multiplicative cyber‐attacks imposed on…
read more here.
Keywords:
nonlinear cyber;
self triggered;
control;
cyber attacks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "International Journal of Robust and Nonlinear Control"
DOI: 10.1002/rnc.70299
Abstract: Cascade control systems (CCSs) consist of at least two nested control loops. This type of control system is widely used in industrial processes, power plants, and chemical processes. A CCS in which the control loops…
read more here.
Keywords:
cascade control;
system;
control;
cyber attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Minds and Machines"
DOI: 10.1007/s11023-017-9446-1
Abstract: In April 2017, the foreign ministers of the G7 countries approved a ‘Declaration on Responsible States Behaviour in Cyberspace’ (G7 Declaration 2017). The Declaration addresses a mounting concern about international stability and the security of…
read more here.
Keywords:
state;
declaration;
norms stop;
cyber attacks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Control, Automation and Electrical Systems"
DOI: 10.1007/s40313-018-0420-9
Abstract: Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive…
read more here.
Keywords:
network;
communication;
cyber attacks;
cyber physical ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Modern Power Systems and Clean Energy"
DOI: 10.1007/s40565-019-0561-2
Abstract: The problems of recovering the state of power systems and detecting the instances of bad data have been widely studied in literature. Nevertheless, these two operations have been designed and optimized for the most part…
read more here.
Keywords:
bad data;
power;
state estimators;
state ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Energy Reports"
DOI: 10.1016/j.egyr.2021.08.126
Abstract: Abstract At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Recently,…
read more here.
Keywords:
cyber attacks;
study;
cyber security;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Review of Financial Analysis"
DOI: 10.1016/j.irfa.2021.101795
Abstract: Abstract I study how financial markets react to unexpected corporate security breaches in the short and the long-term. The main results show that daily excess returns drop, trading volume increases due to selling pressure, and…
read more here.
Keywords:
market;
market activity;
security;
attacks stock ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "ISA transactions"
DOI: 10.1016/j.isatra.2020.10.002
Abstract: The paper discusses the cooperative tracking problem of partially known cyber-physical multi-agent networked systems. In this system, there exist two cascaded chances for cyber-attacks. The local agent is of networked system type that is subjected…
read more here.
Keywords:
false data;
control;
data injection;
cyber attacks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "ISA transactions"
DOI: 10.1016/j.isatra.2020.10.050
Abstract: This article concerns dual-terminal event-triggered communication and decentralized control of switched systems that are the target of cyber attacks. Due to different properties of physical system, this system uses decentralized communication channels to transmit feedback…
read more here.
Keywords:
cyber attacks;
control switched;
event;
dual terminal ... See more keywords