Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Robust and Nonlinear Control"
DOI: 10.1002/rnc.5836
Abstract: This article considers the issue of finite‐time H∞ asynchronous state estimation for event‐triggered nonlinear Markovian jump systems subject to cyber‐attacks. An adaptive event‐triggered scheme is introduced to cope with the capacity constraint of the networked…
read more here.
Keywords:
time;
finite time;
estimation;
cyber attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "Minds and Machines"
DOI: 10.1007/s11023-017-9446-1
Abstract: In April 2017, the foreign ministers of the G7 countries approved a ‘Declaration on Responsible States Behaviour in Cyberspace’ (G7 Declaration 2017). The Declaration addresses a mounting concern about international stability and the security of…
read more here.
Keywords:
state;
declaration;
norms stop;
cyber attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Control, Automation and Electrical Systems"
DOI: 10.1007/s40313-018-0420-9
Abstract: Communication networks are commonly used to connect sensors, actuators, and controllers to monitor and control cyber-physical systems (CPS). The use of communication networks increases the vulnerability of the CPS to cyber attacks that can drive…
read more here.
Keywords:
network;
communication;
cyber attacks;
cyber physical ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Modern Power Systems and Clean Energy"
DOI: 10.1007/s40565-019-0561-2
Abstract: The problems of recovering the state of power systems and detecting the instances of bad data have been widely studied in literature. Nevertheless, these two operations have been designed and optimized for the most part…
read more here.
Keywords:
bad data;
power;
state estimators;
state ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Energy Reports"
DOI: 10.1016/j.egyr.2021.08.126
Abstract: Abstract At present, most of the economic, commercial, cultural, social and governmental activities and interactions of countries, at all levels, including individuals, non-governmental organizations and government and governmental institutions, are carried out in cyberspace. Recently,…
read more here.
Keywords:
cyber attacks;
study;
cyber security;
security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Review of Financial Analysis"
DOI: 10.1016/j.irfa.2021.101795
Abstract: Abstract I study how financial markets react to unexpected corporate security breaches in the short and the long-term. The main results show that daily excess returns drop, trading volume increases due to selling pressure, and…
read more here.
Keywords:
market;
market activity;
security;
attacks stock ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "ISA transactions"
DOI: 10.1016/j.isatra.2020.10.002
Abstract: The paper discusses the cooperative tracking problem of partially known cyber-physical multi-agent networked systems. In this system, there exist two cascaded chances for cyber-attacks. The local agent is of networked system type that is subjected…
read more here.
Keywords:
false data;
control;
data injection;
cyber attacks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "ISA transactions"
DOI: 10.1016/j.isatra.2020.10.050
Abstract: This article concerns dual-terminal event-triggered communication and decentralized control of switched systems that are the target of cyber attacks. Due to different properties of physical system, this system uses decentralized communication channels to transmit feedback…
read more here.
Keywords:
cyber attacks;
control switched;
event;
dual terminal ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Nuclear Engineering and Technology"
DOI: 10.1016/j.net.2018.09.009
Abstract: Abstract With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious…
read more here.
Keywords:
cyber attacks;
importance analysis;
cyber;
safety ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2876883
Abstract: Kalman filters (KFs) and dynamic observers are two main classes of the dynamic state estimation (DSE) routines. The Power system DSE has been implemented by various KFs, such as the extended KF (EKF) and the…
read more here.
Keywords:
power system;
cyber attacks;
model uncertainty;
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2936816
Abstract: Modern distribution power system has become a typical cyber-physical system (CPS), where reliable automation control process is heavily depending on the accurate measurement data. However, the cyber-attacks on CPS may manipulate the measurement data and…
read more here.
Keywords:
tex math;
cyber attacks;
inline formula;