Articles with "security constraints" as a keyword



Photo from wikipedia

Security Verification for Cyber-Physical Systems Using Model Checking

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3081587

Abstract: A malicious attack may endanger human life or pollute environment on a cyber-physical system (CPS). However, successfully attacking a CPS needs not only the knowledge of information technology (IT) but also the domain knowledge of… read more here.

Keywords: security constraints; model; using model; security ... See more keywords
Photo by ldxcreative from unsplash

Throughput Optimization for Noma Energy Harvesting Cognitive Radio With Multi-UAV-Assisted Relaying Under Security Constraints

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Cognitive Communications and Networking"

DOI: 10.1109/tccn.2022.3225165

Abstract: This paper investigates the throughput of a non-orthogonal multiple access (NOMA)-based cognitive radio (CR) system with multiple unmanned aerial vehicle (UAV)-assisted relays under system performance and security constraints. We propose a communication protocol that includes… read more here.

Keywords: security constraints; communication; uav assisted; energy ... See more keywords
Photo by ericgilkes from unsplash

A Stochastic-Robust Approach for Resilient Microgrid Investment Planning Under Static and Transient Islanding Security Constraints

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2022.3146193

Abstract: When planning the investment in Microgrids (MGs), usually static security constraints are included to ensure their resilience and ability to operate in islanded mode. However, unscheduled islanding events may trigger cascading disconnections of Distributed Energy… read more here.

Keywords: transient; stochastic robust; static transient; security constraints ... See more keywords