Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3081587
Abstract: A malicious attack may endanger human life or pollute environment on a cyber-physical system (CPS). However, successfully attacking a CPS needs not only the knowledge of information technology (IT) but also the domain knowledge of…
read more here.
Keywords:
security constraints;
model;
using model;
security ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Cognitive Communications and Networking"
DOI: 10.1109/tccn.2022.3225165
Abstract: This paper investigates the throughput of a non-orthogonal multiple access (NOMA)-based cognitive radio (CR) system with multiple unmanned aerial vehicle (UAV)-assisted relays under system performance and security constraints. We propose a communication protocol that includes…
read more here.
Keywords:
security constraints;
communication;
uav assisted;
energy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Smart Grid"
DOI: 10.1109/tsg.2022.3146193
Abstract: When planning the investment in Microgrids (MGs), usually static security constraints are included to ensure their resilience and ability to operate in islanded mode. However, unscheduled islanding events may trigger cascading disconnections of Distributed Energy…
read more here.
Keywords:
transient;
stochastic robust;
static transient;
security constraints ... See more keywords