Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2019 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-019-01481-7
Abstract: Internet of Things (IoT) makes possible diverse smart applications through incorporating information from various sensors and enabling interoperability among different control systems. Adopting IoT in smart building paradigm enables efficient design, control, and management of…
read more here.
Keywords:
networks jamming;
smart buildings;
buildings oriented;
wireless networks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IFAC-PapersOnLine"
DOI: 10.1016/j.ifacol.2020.12.1528
Abstract: Abstract Control of a platoon of vehicles subject to jamming attacks is addressed in this paper. Because of jamming attacks, some communicated information and radio data are assumed to be lost or delayed in a…
read more here.
Keywords:
control vehicular;
control;
stochastic robustness;
jamming attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "ISA transactions"
DOI: 10.1016/j.isatra.2019.12.014
Abstract: In this paper, considering two typical attack strategies of a DoS jammer, a new kind of H∞ control problem is studied for Cyber-Physical Systems (CPSs) with different transmission mechanism encountering DoS jamming attacks. By defining…
read more here.
Keywords:
attack strategies;
control;
cyber physical;
dos jamming ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Nonlinear Analysis: Hybrid Systems"
DOI: 10.1016/j.nahs.2019.03.005
Abstract: Abstract The problem of event-triggered quantized H ∞ control of networked control systems (NCSs) under denial-of-service (DoS) jamming attacks is investigated in this paper. Firstly, a new resilient event-triggering transmission scheme is proposed to lighten…
read more here.
Keywords:
control;
event triggered;
quantized control;
jamming attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2020.3045365
Abstract: Wireless connections are more and more used in different applications and in public areas for services to consumers but also for handling (sometimes) sensitive communications (for instance, in railway systems or for remote video monitoring…
read more here.
Keywords:
study;
power jamming;
jamming attacks;
low power ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Aerospace and Electronic Systems"
DOI: 10.1109/taes.2021.3135014
Abstract: The presence of malicious jamming attacks is disruptive for global navigation satellite system (GNSS) applications requiring high robustness. The situational awareness aims to timely detect the jamming attacks and characterize the information of the jamming…
read more here.
Keywords:
chirp jamming;
situational awareness;
machine learning;
jamming attacks ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Transactions on Cognitive Communications and Networking"
DOI: 10.1109/tccn.2019.2933816
Abstract: Although in-band full-duplex (IBFD) radios promise to double the throughput of a wireless link, they are more vulnerable to jamming attacks than their out-of-band full-duplex (OBFD) counterparts. For two communicating OBFD nodes, a jammer needs…
read more here.
Keywords:
full duplex;
jamming attacks;
band full;
ibfd radios ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE transactions on cybernetics"
DOI: 10.1109/tcyb.2022.3219987
Abstract: The problem of the model-free adaptive resilient control (MFARC) for nonlinear cyber-physical systems (CPSs) suffered from aperiodic jamming attacks is investigated in this article. First, the MFARC framework subject to aperiodic jamming attacks is established,…
read more here.
Keywords:
free adaptive;
control;
jamming attacks;
model free ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Systems, Man, and Cybernetics: Systems"
DOI: 10.1109/tsmc.2019.2896249
Abstract: This paper focuses on the resilient ${H_{\infty }}$ filter design for event-triggered networked systems subject to nonperiodic denial-of-service (DoS) jamming attacks. In this paper, a new resilient event-triggered transmission strategy is first proposed to improve…
read more here.
Keywords:
event triggered;
inline formula;
nonperiodic dos;
jamming attacks ... See more keywords
Photo from academic.microsoft.com
Sign Up to like & get
recommendations!
1
Published in 2017 at "Defence Science Journal"
DOI: 10.14429/dsj.67.10051
Abstract: Cyberspace plays a prominent role in our social, economic and civic welfare and cyber security issues are of paramount importance today. Growing reliance of the intertwined military and civilian applications on wireless computer networks makes…
read more here.
Keywords:
game;
delay tolerant;
theoretic approach;
game theoretic ... See more keywords