Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2995939
Abstract: Recently, public attention is thoroughly aroused as to the security threats of Cyber-Physical Systems (CPS), which can seriously disrupt the system operation. In order to analyze the impact of potential cyber-attacks, one needs to investigate…
read more here.
Keywords:
attack scheduling;
optimal jamming;
interactive channels;
attack ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2020.3046483
Abstract: Recently, public attention is thoroughly aroused as to the security threats of Wireless Network Control System (WNCS), which can seriously disrupt the system operation. In order to achieve the attack effect that each sensor is…
read more here.
Keywords:
system;
evaluation;
attack;
attack system ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3146431
Abstract: When checking and sensing external communication data, wireless sensor networks are susceptible to interfering signals with different frequencies. In order to track the location of the jamming attack point and deploy security defense mechanism, a…
read more here.
Keywords:
wireless sensor;
algorithm;
sensor networks;
beetle antennae ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Instrumentation and Measurement"
DOI: 10.1109/tim.2022.3186360
Abstract: Jamming attack is one of the common malicious attacks in cyber-physical power systems (CPPSs) to intervene measurements and systems. Timely detection of jamming attacks is crucial for real-time monitoring and security of CPPSs. With this…
read more here.
Keywords:
power systems;
genetic algorithm;
physical power;
detection ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Vehicular Technology"
DOI: 10.1109/tvt.2022.3212966
Abstract: Jamming attack is one of the serious security breaches in the upcoming fifth-generation heterogeneous networks (5G HetNets). Most of the existing anti-jamming techniques, such as frequency hopping (FH) and direct sequence spread spectrum (DSSS) lack…
read more here.
Keywords:
federated deep;
reinforcement learning;
reinforcement;
deep reinforcement ... See more keywords