|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 48 occurrences of 34 keywords
|
|
|
Results
Found 566 publication records. Showing 566 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
85 | Jong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn |
Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
80 | Nong Ye, Toni Farley, Deepak Lakshminarasimhan |
An attack-norm separation approach for detecting cyber attacks. |
Inf. Syst. Frontiers |
2006 |
DBLP DOI BibTeX RDF |
Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks |
78 | Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung |
Modeling Active Cyber Attack for Network Vulnerability Assessment. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana |
PrISM: Automatic Detection and Prevention from Cyber Attacks. |
IMTIC |
2008 |
DBLP DOI BibTeX RDF |
Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention |
70 | Nong Ye, Yebin Zhang, Connie M. Borror |
Robustness of the Markov-chain model for cyber-attack detection. |
IEEE Trans. Reliab. |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi |
Linux-Based System Modelling for Cyber-attack Simulation. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
58 | Peeter Lorents, Rain Ottis, Raul Rikk |
Cyber Society and Cooperative Cyber Defence. |
HCI (14) |
2009 |
DBLP DOI BibTeX RDF |
cyber society, cooperative cyber defence, CCD COE, Knowledge, information, cyber attacks |
53 | Michael E. Kuhl, Jason Kistner, Kevin Costantini, Moises Sudit |
Cyber attack modeling and simulation for network security analysis. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Yimin Cui, Tao Zou, Lufeng Zhang, Jinjing Zhao |
Network security simulation and evaluation. |
CSTST |
2008 |
DBLP DOI BibTeX RDF |
attack impacts, cyber attack modeling, cyber attack simulation, network security evaluation, network modeling |
44 | Kun Xiao, Shangping Ren, Kevin A. Kwiat |
Retrofitting Cyber Physical Systems for Survivability through External Coordination. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Yusuke Hideshima, Hideki Koike |
STARMINE: a visualization system for cyber attacks. |
APVIS |
2006 |
DBLP DOI BibTeX RDF |
virus visualization, information visualization, intrusion detection, information security, internet worm |
44 | Carl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer |
Using Machine Learning Techniques to Identify Botnet Traffic. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
43 | Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee |
Network Security Modeling and Cyber Attack Simulation Methodology. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Shangping Ren, Kevin A. Kwiat |
A Non-Intrusive Approach to Enhance Legacy Embedded Control Systems with Cyber Protection Features. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
legacy control systems, behavior observation, feedback loop |
40 | Gregory B. White |
The Community Cyber Security Maturity Model. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Abhrajit Ghosh, Larry Wong, Giovanni Di Crescenzo, Rajesh Talpade |
InFilter: Predictive Ingress Filtering to Detect Spoofed IP Traffic. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Jong Sou Park, Jang-Se Lee, Hwan Kuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi |
SECUSIM: A Tool for the Cyber-Attack Simulation. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Scott O'Hare, Steven Noel, Kenneth Prole |
A Graph-Theoretic Visualization Approach to Network Risk Analysis. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
exploit analysis, visualization, network security, situational awareness, attack graph, vulnerability assessment |
30 | Felicia R. Doswell |
A case study on computer security for non-expert computer user. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, computer security |
28 | Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz |
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
attack tracks, visualization, intrusion detection |
28 | Steven Cheung, Ulf Lindqvist, Martin W. Fong |
Modeling Multistep Cyber Attacks for Scenario Recognition. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Kyungho Son, Byungik Kim, Taejin Lee 0002 |
Cyber-attack group analysis method based on association of cyber-attack information. |
KSII Trans. Internet Inf. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Varun Dutt, Amanjot Kaur |
Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection. |
Int. J. Trust. Manag. Comput. Commun. |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute |
Simulating cyber-attacks for fun and profit. |
SimuTools |
2009 |
DBLP DOI BibTeX RDF |
0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack |
24 | Shouhuai Xu |
Collaborative Attack vs. Collaborative Defense. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
collaborative attack, collaborative defense, cyber security, cyber attack |
22 | Rami Puzis, Marius David Klippel, Yuval Elovici, Shlomi Dolev |
Optimization of NIDS Placement for Protection of Intercommunicating Critical Infrastructures. |
EuroISI |
2008 |
DBLP DOI BibTeX RDF |
communication infrastructure protection, NIDS placement, epidemic models |
22 | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas |
Source Code Author Identification Based on N-gram Author Profiles. |
AIAI |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Georgia Frantzeskou, Efstathios Stamatatos, Stefanos Gritzalis, Sokratis K. Katsikas |
Effective identification of source code authors using byte-level information. |
ICSE |
2006 |
DBLP DOI BibTeX RDF |
software forensics, source code authorship identification |
21 | Yong-Jun You, Sung-Do Chi |
SIMVA: simulation-based network vulnerability analysis system. |
SpringSim |
2009 |
DBLP DOI BibTeX RDF |
SES/MB, vulnerability analysis system, simulation, network security, DEVS |
19 | Abbas Nemati, Saleh Mobayen, Seyed Hossein Rouhani, Chun-Lien Su |
Design of nonsingular second-order terminal sliding mode controller for cyber-physical systems with time-delays and cyber-attack on actuators. |
Int. J. Syst. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Efe C. Balta, Michael Pease, James R. Moyne, Kira Barton, Dawn M. Tilbury |
Digital Twin-Based Cyber-Attack Detection Framework for Cyber-Physical Manufacturing Systems. |
IEEE Trans Autom. Sci. Eng. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Fadwa M. Alrowais, Heba G. Mohamed, Fahd N. Al-Wesabi, Mesfer Al Duhayyim, Anwer Mustafa Hilal, Abdelwahed Motwakel |
Cyber attack detection in healthcare data using cyber-physical system with optimized algorithm. |
Comput. Electr. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Buxiang Zhou, Binjie Sun, Tianlei Zang, Yating Cai, Jiale Wu, Huan Luo |
Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. |
Entropy |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Hamed Kazemi, Khashayar Khorasani |
Sensor Cyber-Attack and Fault Detection and Isolation of Nonlinear Cyber-Physical Systems. |
CCTA |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ali Eslami, Khashayar Khorasani |
Cyber-Attack Detection by Using Event-Based Control in Multi-Agent Cyber-Physical Systems. |
ECC |
2023 |
DBLP BibTeX RDF |
|
19 | Youngmi Baek, Seo Hee Park |
Adaptive and Lightweight Cyber-Attack Detection in Modern Automotive Cyber-Physical Systems. |
CCNC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Romain Thibert, Gregory Faraut, Saïd Amari |
Construction of Model-based Diagnosis of Cyber-Attack in Cyber-Physical Systems Using Labeled Petri Nets. |
ETFA |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw, Miriam Armstrong |
Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. |
J. Multimodal User Interfaces |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Henry Akwetey Matey, Paul Danquah, Godfred Yaw Koi-Akrofi |
Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs). |
CoRR |
2022 |
DBLP BibTeX RDF |
|
19 | Muhammad Mudassar Yamin, Basel Katt |
Use of cyber attack and defense agents in cyber ranges: A case study. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yang-Cheng Huang, Jun-Yi Li, Hong-Xia Rao, Hui Chen |
Finite-time Cluster Synchronization Control of Cyber-Physical Systems under Cyber Attack. |
ICCA |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Sahin Kara |
Siber güvenlik analizi için yeni bir siber saldırı simülatörü geliştirilmesi (Design and implementation of a new cyber attack simulator for cyber security analysis) |
|
2022 |
RDF |
|
19 | Mohammad Ghiasi, Moslem Dehghani, Taher Niknam, Abdollah Kavousi-Fard, Pierluigi Siano, Hassan Haes Alhelou |
Cyber-Attack Detection and Cyber-Security Enhancement in Smart DC-Microgrid Based on Blockchain Technology and Hilbert Huang Transform. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Lei Li, Wenting Wang, Qiang Ma, Kunpeng Pan, Xin Liu, Lin Lin, Jian Li 0026 |
Cyber attack estimation and detection for cyber-physical power systems. |
Appl. Math. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Tanushree Roy, Satadru Dey |
Security of Distributed Parameter Cyber-Physical Systems: Cyber-Attack Detection in Linear Parabolic PDEs. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Lei Wang 0132, Pengcheng Xu 0006, Zhaoyang Qu, Xiaoyong Bo, Yunchang Dong, Zhenming Zhang, Yang Li 0011 |
Coordinated Cyber-Attack Detection Model of Cyber-Physical Power System Based on the Operating State Data Link. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Ahmad Ali AlZubi, Mohammed Al-Maitah, Abdulaziz Alarifi |
Cyber-attack detection in healthcare using cyber-physical system and machine learning techniques. |
Soft Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Suyun Lee, Sunjae Jung, Youngmi Baek |
Cyber-attack detection for automotive cyber-physical systems. |
BuildSys@SenSys |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Haicheng Tu, Yongxiang Xia, Chi K. Tse, Xi Chen 0014 |
A Hybrid Cyber Attack Model for Cyber-Physical Power Systems. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Mahdi Taheri, Khashayar Khorasani, Iman Shames, Nader Meskin |
Cyber Attack and Machine Induced Fault Detection and Isolation Methodologies for Cyber-Physical Systems. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Hetong Jiang, Taejun Choi, Ryan K. L. Ko |
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Hetong Jiang, Taejun Choi, Ryan K. L. Ko |
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. |
SSCC |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Romuald Hoffmann |
Stochastic Model of the Simple Cyber Kill Chain: Cyber Attack Process as a Regenerative Process. |
CISIM |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Dan Ye 0001, Shengping Luo |
A co-design methodology for cyber-physical systems under actuator fault and cyber attack. |
J. Frankl. Inst. |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Marco A. Gamarra, Sachin Shetty, Oscar R. González, Laurent Njilla, Marcus Pendleton, Charles A. Kamhoua |
Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems. |
ICC |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Xiaochen Hao, Mingsong Lv, Jiesheng Zheng, Zhengkui Zhang, Wang Yi 0001 |
Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems. |
ICCD |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Barry M. Horowitz |
Policy Issues Regarding Implementations of Cyber Attack Resilience Solutions for Cyber Physical Systems. |
AAAI Spring Symposia |
2018 |
DBLP BibTeX RDF |
|
19 | Roland E. Haas, Dietmar P. F. Möller |
Automotive connectivity, cyber attack scenarios and automotive cyber security. |
EIT |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Yinan Wang, Wei Li 0114, Gangfeng Yan, Sumian Song |
Towards a framework for cyber attack impact analysis of electric cyber physical systems. |
ICIT |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Ming Feng, Hao Xu 0002 |
Deep reinforecement learning based optimal defense for cyber-physical system in presence of unknown cyber-attack. |
SSCI |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Koustav Sadhukhan, Arvind Mallari Rao, Tarun Yadav |
Cyber Attack Thread: A Control-flow Based Approach to Deconstruct and Mitigate Cyber Threats. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
19 | Sujit Rokka Chhetri, Arquimedes Canedo, Mohammad Abdullah Al Faruque |
KCAD: kinetic cyber-attack detection method for cyber-physical additive manufacturing systems. |
ICCAD |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Julian Droogan, Lise Waldek |
Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences. |
CCC |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Cheolhyeon Kwon, Inseok Hwang 0002 |
Hybrid robust controller design: Cyber attack attenuation for Cyber-Physical Systems. |
CDC |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Gabriel Jakobson |
Mission-centricity in cyber security: Architecting cyber attack resilient missions. |
CyCon |
2013 |
DBLP BibTeX RDF |
|
19 | Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez |
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Ana Maria Pirca, Harjinder Singh Lallie 0001 |
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers. |
Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Dengfeng Pan, Xiaohua Ge, Derui Ding, Qing-Long Han |
Simultaneous Cyber Attack Estimation and Radar Spoofing Attack Detection for Connected Automated Vehicles. |
IECON |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura |
Cyber Attack Stage Tracing System based on Attack Scenario Comparison. |
ICISSP |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jiming Qi, Jiazheng Zhang, Qingxia Liu, Bang Wang |
A Flow Attack Strategy based on Critical Links for Cyber-attack. |
TrustCom |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Moslem Dehghani, Mohammad Ghiasi, Taher Niknam, Abdollah Kavousi-Fard, Elham Tajik, Sanjeevikumar Padmanaban, Hamdulah Aliev |
Cyber Attack Detection Based on Wavelet Singular Entropy in AC Smart Islands: False Data Injection Attack. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
19 | P. Varsha Suresh, Minu Lalitha Madhavu |
Insider Attack: Internal Cyber Attack Detection Using Machine Learning. |
ICCCNT |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Nikolaos Polatidis, Elias Pimenidis, Michalis Pavlidis, Spyridon Papastergiou, Haralambos Mouratidis |
From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks. |
Evol. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Nikolaos Polatidis, Elias Pimenidis, Michalis Pavlidis, Spyridon Papastergiou, Haralambos Mouratidis |
From product recommendation to cyber-attack prediction: Generating attack graphs and predicting future attacks. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
19 | Harjinder Singh Lallie 0001, Kurt Debattista, Jay Bal |
An Empirical Evaluation of the Effectiveness of Attack Graphs and Fault Trees in Cyber-Attack Perception. |
IEEE Trans. Inf. Forensics Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Ercan Nurcan Yilmaz, Serkan Gönen |
Attack detection/prevention system against cyber attack in industrial control systems. |
Comput. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Bao U. Nguyen |
A Simultaneous Cyber-attack and a Missile Attack. |
SIMULTECH |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Wenjun Sun, Liqun Lv, Yang Su, Xu An Wang 0001 |
Cyber-Attack Risks Analysis Based on Attack-Defense Trees. |
EIDWT |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Kevin L. McLaughlin |
Cyber Attack! Is a Counter Attack Warranted? |
Inf. Secur. J. A Glob. Perspect. |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Clayton Bolz, Gordon W. Romney, Brandon L. Rogers |
Safely train security engineers regarding the dangers presented by denial of service attacks. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
DoS lab, isolated lab, network security, information technology, DDoS |
13 | Yacov Y. Haimes, Joost R. Santos, Kenneth G. Crowther, Matthew Henry, Chenyang Lian, Zhenyu Yan 0001 |
Risk Analysis in Interdependent Infrastructures. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
interdependent systems, systems engineering, Risk analysis |
13 | Yih Huang, David Arsenault, Arun Sood |
Securing DNS Services through System Self Cleansing and Hardware Enhancements. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Norman F. Schneidewind |
Reliability - Security Model. |
ICECCS |
2006 |
DBLP DOI BibTeX RDF |
Integration of security and reliability, Conditional probability of security failures, Policy implications resulting from model results |
13 | Jeffery E. Payne |
Regulation and Information Security: Can Y2K Lessons Help Us? |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Sarbannes Oxley, software regulation, Y2K lessons, software security |
13 | Andrew K. Wright, John A. Kinast, Joe McCarty |
Low-Latency Cryptographic Protection for SCADA Communications. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Sung-Do Chi, Jong Sou Park, Jang-Se Lee |
A Role of DEVS Simulation for Information Assurance. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Axel W. Krings, Paul W. Oman |
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
13 | John J. Shaw |
Predicting the Impact of Cyber-Attacks on BMC3 Enterprises. |
DISCEX (2) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Sepideh Bahadoripour, Hadis Karimipour, Amir Namavar Jahromi, Anik Islam |
An explainable multi-modal model for advanced cyber-attack detection in industrial control systems. |
Internet Things |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Marzieh Samimiat, Ali-Akbar Ahmadi |
Secure message recovery in presence of the cyber-attack using discrete-time chaotic modulation approach. |
Inf. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Hui Ge, Lei Zhao, Dong Yue 0001, Xiangpeng Xie, Linghai Xie, Sergey Gorbachev, Iakov Korovin, Yuan Ge |
A game theory based optimal allocation strategy for defense resources of smart grid under cyber-attack. |
Inf. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Saad Hammood Mohammed, Abdulmajeed Al-Jumaily, Jit Singh Mandeep Singh, Víctor P. Gil Jiménez, Aqeel S. Jaber, Yaseein Soubhi Hussein, Mudhar Mustafa Abdul Kader Al-Najjar, Dhiya Al-Jumeily |
A Review on the Evaluation of Feature Selection Using Machine Learning for Cyber-Attack Detection in Smart Grid. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Mengni Du, Xiangpeng Xie, Hui Wang, Jianwei Xia, Jiayue Sun |
Relaxed Set-Membership Estimation and Cyber Attack Detection for LPV Systems Under Multiple Attacks via A Switching-Type Scheme Design. |
IEEE Trans. Instrum. Meas. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Esma Uflaz, Sukru Ilke Sezer, Ahmet Lutfi Tunçel, Muhammet Aydin, Emre Akyuz, Özcan Arslan |
Quantifying potential cyber-attack risks in maritime transportation under Dempster-Shafer theory FMECA and rule-based Bayesian network modelling. |
Reliab. Eng. Syst. Saf. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ahmed H. El-Ebiary, Mahmoud Abdallah Attia, Fathy H. Awad, Mostafa I. Marei, Mohamed Mokhtar |
Kalman Filters Based Distributed Cyber-Attack Mitigation Layers for DC Microgrids. |
IEEE Trans. Circuits Syst. I Regul. Pap. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhaoyuan Wang, Siqi Bu |
Design and Defense of Modal Resonance-Oriented Cyber-Attack Against Wide-Area Damping Control. |
IEEE Trans. Smart Grid |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yang Xia, Yan Xu 0005, Suman Mondal, Amit Kumar Gupta |
A Transfer Learning-Based Method for Cyber-Attack Tolerance in Distributed Control of Microgrids. |
IEEE Trans. Smart Grid |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tanushree Roy, Sara Sattarzadeh, Satadru Dey |
Cyber-Attack Detection in Socio-Technical Transportation Systems Exploiting Redundancies Between Physical and Social Data. |
IEEE Trans. Syst. Man Cybern. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Tosin Ige, Christopher Kiekintveld, Aritran Piplai |
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ezekia Gilliard, Jinshuo Liu, Ahmed Abubakar Aliyu |
Knowledge graph reasoning for cyber attack detection. |
IET Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 566 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|