• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4617939)   Today's Articles (8)   Subscriber (49401)
For: Li B, Zhou X, Ning Z, Guan X, Yiu KFC. Dynamic Event-Triggered Security Control for Networked Control Systems with Cyber-Attacks: A Model Predictive Control Approach. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.08.093] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
Number Cited by Other Article(s)
1
Tadhani JR, Vekariya V, Sorathiya V, Alshathri S, El-Shafai W. Securing web applications against XSS and SQLi attacks using a novel deep learning approach. Sci Rep 2024;14:1803. [PMID: 38245563 PMCID: PMC10799887 DOI: 10.1038/s41598-023-48845-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/23/2023] [Accepted: 11/30/2023] [Indexed: 01/22/2024]  Open
2
K V, Al-onazi BB, Simic V, Tirkolaee EB, Jana C. DeepFND: an ensemble-based deep learning approach for the optimization and improvement of fake news detection in digital platform. PeerJ Comput Sci 2023;9:e1666. [PMID: 38192452 PMCID: PMC10773750 DOI: 10.7717/peerj-cs.1666] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/21/2023] [Accepted: 10/05/2023] [Indexed: 01/10/2024]
3
Alohali MA, Elsadig M, Hilal AM, Mutwakel A. Emerging framework for attack detection in cyber-physical systems using heuristic-based optimization algorithm. PeerJ Comput Sci 2023;9:e1596. [PMID: 38192469 PMCID: PMC10773567 DOI: 10.7717/peerj-cs.1596] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/02/2023] [Accepted: 08/28/2023] [Indexed: 01/10/2024]
4
Alalhareth M, Hong SC. An Adaptive Intrusion Detection System in the Internet of Medical Things Using Fuzzy-Based Learning. SENSORS (BASEL, SWITZERLAND) 2023;23:9247. [PMID: 38005635 PMCID: PMC10674369 DOI: 10.3390/s23229247] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/22/2023] [Revised: 11/13/2023] [Accepted: 11/16/2023] [Indexed: 11/26/2023]
5
Cui Q, Liu F. A new technique for influence maximization on social networks using a moth-flame optimization algorithm. Heliyon 2023;9:e22191. [PMID: 38058635 PMCID: PMC10695977 DOI: 10.1016/j.heliyon.2023.e22191] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2023] [Revised: 10/26/2023] [Accepted: 11/06/2023] [Indexed: 12/08/2023]  Open
6
Onu IJ, Omolara AE, Alawida M, Abiodun OI, Alabdultif A. Detection of Ponzi scheme on Ethereum using machine learning algorithms. Sci Rep 2023;13:18403. [PMID: 37891244 PMCID: PMC10611762 DOI: 10.1038/s41598-023-45275-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/20/2023] [Accepted: 10/17/2023] [Indexed: 10/29/2023]  Open
7
Rui K, Pan H, Shu S. Secure routing in the Internet of Things (IoT) with intrusion detection capability based on software-defined networking (SDN) and Machine Learning techniques. Sci Rep 2023;13:18003. [PMID: 37865650 PMCID: PMC10590437 DOI: 10.1038/s41598-023-44764-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/07/2023] [Accepted: 10/12/2023] [Indexed: 10/23/2023]  Open
8
Li X, Lin Z, Lv H, Yu L, Heidari AA, Zhang Y, Chen H, Liang G. Advanced slime mould algorithm incorporating differential evolution and Powell mechanism for engineering design. iScience 2023;26:107736. [PMID: 37810256 PMCID: PMC10558746 DOI: 10.1016/j.isci.2023.107736] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/30/2023] [Revised: 07/21/2023] [Accepted: 08/23/2023] [Indexed: 10/10/2023]  Open
9
Oladimeji D, Rasheed A, Varol C, Baza M, Alshahrani H, Baz A. CANAttack: Assessing Vulnerabilities within Controller Area Network. SENSORS (BASEL, SWITZERLAND) 2023;23:8223. [PMID: 37837053 PMCID: PMC10575265 DOI: 10.3390/s23198223] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/09/2023] [Revised: 09/23/2023] [Accepted: 09/30/2023] [Indexed: 10/15/2023]
10
Li Z, Xu H, Lin Z, Dong L, Chen Y. Event-triggered robust distributed output feedback model predictive control for nonlinear MASs against false data injection attacks. ISA TRANSACTIONS 2023;141:197-211. [PMID: 37481438 DOI: 10.1016/j.isatra.2023.06.039] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/08/2023] [Revised: 06/18/2023] [Accepted: 06/30/2023] [Indexed: 07/24/2023]
11
Wu Y, Zhang Z, Luo H, Deng L, Yang Q, Dai X, Liu D, Gao X, Yu Y, Cheng M. 100Gb/s coherent optical secure communication over 1000 km based on analog-digital hybrid chaos. OPTICS EXPRESS 2023;31:33200-33211. [PMID: 37859105 DOI: 10.1364/oe.499634] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 07/03/2023] [Accepted: 09/13/2023] [Indexed: 10/21/2023]
12
Luo K. A distributed SDN-based intrusion detection system for IoT using optimized forests. PLoS One 2023;18:e0290694. [PMID: 37647336 PMCID: PMC10468089 DOI: 10.1371/journal.pone.0290694] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/21/2023] [Accepted: 08/15/2023] [Indexed: 09/01/2023]  Open
13
Sharma RK, Issac B, Xin Q, Gadekallu TR, Nath K. Plant and Salamander Inspired Network Attack Detection and Data Recovery Model. SENSORS (BASEL, SWITZERLAND) 2023;23:5562. [PMID: 37420729 DOI: 10.3390/s23125562] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/15/2023] [Revised: 04/24/2023] [Accepted: 06/01/2023] [Indexed: 07/09/2023]
14
Begum MB, Deepa N, Uddin M, Kaluri R, Abdelhaq M, Alsaqour R. An efficient and secure compression technique for data protection using burrows-wheeler transform algorithm. Heliyon 2023;9:e17602. [PMID: 37457815 PMCID: PMC10347677 DOI: 10.1016/j.heliyon.2023.e17602] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/18/2023] [Revised: 06/21/2023] [Accepted: 06/22/2023] [Indexed: 07/18/2023]  Open
15
Fernández-Alcalá RM, Jiménez-López JD, Le Bihan N, Cheong Took C. An Optimal Linear Fusion Estimation Algorithm of Reduced Dimension for T-Proper Systems with Multiple Packet Dropouts. SENSORS (BASEL, SWITZERLAND) 2023;23:4047. [PMID: 37112387 PMCID: PMC10143670 DOI: 10.3390/s23084047] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 03/14/2023] [Revised: 04/13/2023] [Accepted: 04/14/2023] [Indexed: 06/19/2023]
16
MPSC for Networked Switched Systems Based on Timing-Response Event-Triggering Scheme. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.10.088] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA